In a two-tiered wireless sensor network, storage nodes act as an intermediate tier between sensors and the sink for storing data and processing queries. This architecture has been widely adopted because of the benefit...
详细信息
In a two-tiered wireless sensor network, storage nodes act as an intermediate tier between sensors and the sink for storing data and processing queries. This architecture has been widely adopted because of the benefits of power and storage saving for sensors as well as the efficiency of query processing. On the other hand, the importance of storage nodes also makes them attractive targets for compromise. A compromised storage node may leak sensitive information and breach data privacy. In this paper, we propose a privacy-preserving protocol specializing for top-k queries that prevents attackers from gaining sensitive information from sensor collected data. To preserve privacy, an orderpreserving encryption is employed to encrypt sensor data such that a storage node can correctly process top-k queries over encrypted data without knowing their actual values. Detailed theoretical and quantitative results confirm the high efficacy and efficiency of the proposed scheme.
In the face of a large number of task requests which are submitted by users, the cloud data centers need not only to finish these massive tasks but also to satisfy the user's service demand. How to allocate virtua...
详细信息
Partly dependent tasks (PDTs) scheduling with multi-objective optimization in cloud computing is an NP-hard problem. Taking the quality of service (QoS) requirements of users that use cloud computing into account, we ...
详细信息
Quantum blockchain can be understood as a decentralized, encrypted anddistributed database based on quantum computation and quantum information *** the data is recorded in the quantum blockchain, it will not be malici...
详细信息
Quantum blockchain can be understood as a decentralized, encrypted anddistributed database based on quantum computation and quantum information *** the data is recorded in the quantum blockchain, it will not be maliciously tamperedwith. In recent years, the development of quantum computation and quantum informationtheory makes more and more researchers focus on the research of quantum blockchain. Inthis paper, we review the developments in the field of quantum blockchain, and brieflyanalyze its advantages compared with the classical blockchain. The construction and theframework of the quantum blockchain are introduced. Then we introduce the method ofapplying quantum technology to a certain part of the general blockchain. In addition, theadvantages of quantum blockchain compared with classical blockchain and itsdevelopment prospects are summarized.
Quantum evolutionary algorithm (QEA) and particle swarm optimization (PSO) are two different types of intelligent optimization algorithm. Many efforts on these two algorithms have progressed actively in recent years. ...
详细信息
Quantum evolutionary algorithm (QEA) and particle swarm optimization (PSO) are two different types of intelligent optimization algorithm. Many efforts on these two algorithms have progressed actively in recent years. In this paper, six typical and complex benchmark testing functions are applied to verify their abilities for dealing with numerical optimization problems. The results show that QEA has better global search capability, which is manifested very outstandingly for the multi peak function optimization, but its convergence speed is slower. Contrarily, PSO has faster convergence speed, and it can solve certain optimization problem rapidly, especially for single peak functions.
In-network data aggregation has been adopted widely to reduce communication overhead and improve efficiency in wireless sensor networks. On the other hand, security is another basic requirement for wireless sensor net...
详细信息
In-network data aggregation has been adopted widely to reduce communication overhead and improve efficiency in wireless sensor networks. On the other hand, security is another basic requirement for wireless sensor network, and providing privacy without disrupting in-network data aggregation is a challenging problem. Although there have been extensive studies on privacy-preserving data aggregation for additive and multiplicative aggregation functions, nonlinear aggregation functions, such as maximum and minimum, have not been well addressed. In this paper, we present a privacy-preserving aggregation method specialized for MAX/MIN aggregation functions. To preserve privacy, encryption and the prefix membership verification scheme are employed, allowing an intermediate aggregator to correctly compare data without access to plaintext data, thus protect data privacy. Extensive simulations are conducted to evaluate the proposed schemes. The results show that our scheme provides privacy protection for both raw and aggregated data items, while achieving high efficiency in terms of energy consumption and time delay.
In market-based cloud environments, both resource consumers and providers are self-interested;additionally, they can come and leave the environment freely. Therefore, the environment is competitive and uncertain. Beca...
详细信息
With the rapid development of wireless communication technology, cloudlet-based wireless metropolitan area network, which provides people with more convenient network services, has become an effiective paradigm to mee...
详细信息
Motion blurs are pervasive in real captured video data, especially for hand-held cameras and smartphone cameras because of their low frame rate and material quality. This paper presents a novel Kernel-based motion-Blu...
详细信息
Short text is a popular text form, which is widely used in real-time network news, short commentary, micro-blog and many other fields. With the development of the application such as QQ, mobile phone text messages and...
详细信息
暂无评论