SlideShare uma empresa Scribd logo
1 de 32
Submitted to
I.Anitha Rani
Submitted by
Y.Keerthi Reddy(10JM1517),
V.Triveni(10JM1A0530),
K.T.V.N.Lakshmi(10JM1A0527).
PRIVACY- AND INTEGRITY-
PRESERVING RANGE QUERIES
IN SENSOR NETWORKS
ABSTRACT
• two-tiered sensor networks
• benefits of power and storage
saving for sensors as well as the
efficiency of query processing
• Attackers attracted on storage nodes
• SafeQ also allows a sink to detect
compromised storage nodes
• To preserve integrity and privacy,
SafeQ
• propose two schemes—one using
Merkle hash trees and another
using a new data structure called
neighborhood chains
• To reduce communication cost we
use bloom filters
EXISTING SYSTEM
Existing Wireless sensor networks once sensor nodes have been
deployed, there will be minimal manual intervention and
monitoring. But, when nodes are deployed in a hostile
environment and there is no manual monitoring.
DRAWBACKS
• First, the attacker may obtain sensitive data that has been,
or will be, stored in the storage node.
• Second, the compromised storage node may return forged
data for a query.
• Third, this storage node may not include all data items that
satisfy the query.
PROPOSED SYSTEM
To preserve the privacy and integrity of range queries in
sensor networks
uses the bucket-partitioning for database privacy.
The basic idea is to divide the domain of data values into
multiple buckets.
SafeQ also allows a sink to detect compromised storage nodes
when they misbehave.
The sink is the point of contact for users of the sensor
network.
REQUIREMENTS
Software Requirements:
• O S : Windows XP or more
• Technology :JAVA, Swing
• Database : MS- Access
Hardware Requirements:
• Processor : Pentium IV
• Hard Disk : 40 GB.
• RAM :256 Mb.
MODULES
• SafeQ
• Integrity
• Privacy
• Range Queries
• Sink
• Storage Node
SAFEQ
• SafeQ is a protocol that prevents attackers from gaining
information from both sensor collected data and sink issued
queries.
• SafeQ also allows a sink to detect compromised storage nodes
when they misbehave.
• To preserve privacy, SafeQ uses a novel technique to encode
both data and queries such that a storage node can correctly
process encoded queries over encoded data without knowing
their values.
INTEGRITY
The sink needs to detect whether a query result from a
storage node includes forged data items or does not include all
the data that satisfy the query.
There are two key challenges in solving the privacyand
integrity-preserving range query problem.
 First, a storage node needs to correctly process encoded
queries over encoded data without knowing their actual
values.
 Second, a sink needs to verify that the result of a query
contains all the data items that satisfy the query and does not
contain any forged data.
PRIVACY
To preserve privacy, SafeQ uses a novel technique to encode
both data and queries such that a storage node can correctly
process encoded queries over encoded data without knowing
their actual values.
A compromised storage node cannot gain information from
sensor collected data and sink issued queries
A storage node can perform query processing
RANGE QURIES
The queries from the sink are range queries. A range query “is
a common database operation finding all the data items
collected at time-slot in the range”.
Note that the queries in most sensor network applications can
be easily modelled as range queries.
SINK
The sink is the point of contact for users of the sensor
network.
 Each time the sink receives a question from a user, it first
translates the question into multiple queries and then
disseminates the queries to the corresponding storage nodes
The sink unifies the query results from multiple storage nodes
into the final answer and sends it back to the user.
Sink can detect compromised storage nodes when they
misbehave.
STORAGE NODE
 Storage nodes are powerful wireless devices that are
equipped with much more storage capacity and computing
power than sensors.
The storage node collects all data from the sensor nodes.
The storage node can’t view the actual value of sensor node
data.
If the storage node trying to view the sensor node data, sink
detect misbehave of storage node.
DATAFLOW DIAGRAM
DATAFLOW DIAGRAM
SINK
USECASE DIAGRAM
CLASS DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
SCREEN SHOTS
Sensor node sends file
Negative acknowledgement
False Positive
File stores in Storage Node
Sink
View File Details
Receive File
Authentication to View
Authentication Valid
Authentication Invalid
CONCLUSION
We make three key contributions in this paper.
SafeQ significantly strengthens the security of two-tiered
sensor networks.
We used Merkle Hash trees and neighbourhood chain to
preserve integrity
we propose an optimization technique using Bloom filters to
significantly reduce the communication cost between sensors
and storage nodes.
we propose a solution to adapt SafeQ for event-driven sensor
networks.
Any Queries????????

Mais conteúdo relacionado

Mais procurados

Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsFinalyearprojects Toall
 
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) Abed Matini
 
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)Pance Cavkovski
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2Tushar Anand
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsShakas Technologies
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Fábio Afonso
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-accessbhanu4ugood1
 
Big Brother: Kubernetes Edition
Big Brother: Kubernetes EditionBig Brother: Kubernetes Edition
Big Brother: Kubernetes EditionKnox Anderson
 
Shmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security BriefShmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security Briefopenfly
 
Connect X IoT platform overview
Connect X IoT platform overviewConnect X IoT platform overview
Connect X IoT platform overviewJay Lohokare
 
Importance of Network Performance Monitoring
Importance of Network Performance MonitoringImportance of Network Performance Monitoring
Importance of Network Performance MonitoringcPacket Networks
 

Mais procurados (18)

Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
 
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Razorback slides-1.1
Razorback slides-1.1Razorback slides-1.1
Razorback slides-1.1
 
WPA 3
WPA 3WPA 3
WPA 3
 
WEP
WEPWEP
WEP
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
 
Big Brother: Kubernetes Edition
Big Brother: Kubernetes EditionBig Brother: Kubernetes Edition
Big Brother: Kubernetes Edition
 
WPA2
WPA2WPA2
WPA2
 
Shmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security BriefShmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security Brief
 
Zonesec_ares
Zonesec_aresZonesec_ares
Zonesec_ares
 
Security Onion
Security OnionSecurity Onion
Security Onion
 
Connect X IoT platform overview
Connect X IoT platform overviewConnect X IoT platform overview
Connect X IoT platform overview
 
Importance of Network Performance Monitoring
Importance of Network Performance MonitoringImportance of Network Performance Monitoring
Importance of Network Performance Monitoring
 

Destaque

When “turn automatic update is on or off” is grayed out
When “turn automatic update is on or off” is grayed outWhen “turn automatic update is on or off” is grayed out
When “turn automatic update is on or off” is grayed outKeerthi Reddy Yeruva
 
Footprint: Detecting Sybil Attacks in Urban Vehicular Network
Footprint: Detecting Sybil Attacks in Urban Vehicular NetworkFootprint: Detecting Sybil Attacks in Urban Vehicular Network
Footprint: Detecting Sybil Attacks in Urban Vehicular NetworkKeerthi Reddy Yeruva
 
The Genomics Revolution: The Good, The Bad, The Ugly
The Genomics Revolution: The Good, The Bad, The UglyThe Genomics Revolution: The Good, The Bad, The Ugly
The Genomics Revolution: The Good, The Bad, The UglyEmiliano De Cristofaro
 
paper batteries presented by tejaswini and tarun
paper batteries presented by tejaswini and tarunpaper batteries presented by tejaswini and tarun
paper batteries presented by tejaswini and tarunPillu Tejaswini
 
PAPER BATTERY BY Ramachandra seminar ppt
PAPER BATTERY BY Ramachandra seminar pptPAPER BATTERY BY Ramachandra seminar ppt
PAPER BATTERY BY Ramachandra seminar pptRAMA CHANDRA MUDULI
 
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachPrivacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachNarendra Dhadhal
 
Deepak paperbattery mahhh
Deepak paperbattery mahhhDeepak paperbattery mahhh
Deepak paperbattery mahhhDeepak Patel
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data MiningVrushali Malvadkar
 
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and ApproachesA Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches14894
 
Paper battery ppt by kriti chaurasia
Paper battery ppt by kriti chaurasiaPaper battery ppt by kriti chaurasia
Paper battery ppt by kriti chaurasiakriti chaurasia
 
Accounting concepts and conventions
Accounting concepts and conventionsAccounting concepts and conventions
Accounting concepts and conventionsSukirat Kaur
 

Destaque (20)

Paper Battery
Paper BatteryPaper Battery
Paper Battery
 
Seminar
SeminarSeminar
Seminar
 
When “turn automatic update is on or off” is grayed out
When “turn automatic update is on or off” is grayed outWhen “turn automatic update is on or off” is grayed out
When “turn automatic update is on or off” is grayed out
 
Footprint: Detecting Sybil Attacks in Urban Vehicular Network
Footprint: Detecting Sybil Attacks in Urban Vehicular NetworkFootprint: Detecting Sybil Attacks in Urban Vehicular Network
Footprint: Detecting Sybil Attacks in Urban Vehicular Network
 
The Genomics Revolution: The Good, The Bad, The Ugly
The Genomics Revolution: The Good, The Bad, The UglyThe Genomics Revolution: The Good, The Bad, The Ugly
The Genomics Revolution: The Good, The Bad, The Ugly
 
paper batteries presented by tejaswini and tarun
paper batteries presented by tejaswini and tarunpaper batteries presented by tejaswini and tarun
paper batteries presented by tejaswini and tarun
 
Paper battery
Paper batteryPaper battery
Paper battery
 
PAPER BATTERY BY Ramachandra seminar ppt
PAPER BATTERY BY Ramachandra seminar pptPAPER BATTERY BY Ramachandra seminar ppt
PAPER BATTERY BY Ramachandra seminar ppt
 
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachPrivacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approach
 
Deepak paperbattery mahhh
Deepak paperbattery mahhhDeepak paperbattery mahhh
Deepak paperbattery mahhh
 
Shankar
ShankarShankar
Shankar
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data Mining
 
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and ApproachesA Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
 
Paper battery
Paper battery Paper battery
Paper battery
 
Paper battery
Paper batteryPaper battery
Paper battery
 
Paper battery
Paper batteryPaper battery
Paper battery
 
Paper Battery
Paper BatteryPaper Battery
Paper Battery
 
Paper battery ppt by kriti chaurasia
Paper battery ppt by kriti chaurasiaPaper battery ppt by kriti chaurasia
Paper battery ppt by kriti chaurasia
 
Paper battery
Paper batteryPaper battery
Paper battery
 
Accounting concepts and conventions
Accounting concepts and conventionsAccounting concepts and conventions
Accounting concepts and conventions
 

Semelhante a Privacy and integrity-preserving range queries

Privacy and integrity-preserving range queries in sensor networks
Privacy  and integrity-preserving range queries in sensor networksPrivacy  and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networksIMPULSE_TECHNOLOGY
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...eSAT Journals
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storageZTech Proje
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET Journal
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...EditorJST
 
Distributed System by Pratik Tambekar
Distributed System by Pratik TambekarDistributed System by Pratik Tambekar
Distributed System by Pratik TambekarPratik Tambekar
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in CloudIRJET Journal
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...IRJET Journal
 
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET Journal
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...IRJET Journal
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...IRJET Journal
 
MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013Charith Perera
 
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET Journal
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET Journal
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
 

Semelhante a Privacy and integrity-preserving range queries (20)

Privacy and integrity-preserving range queries in sensor networks
Privacy  and integrity-preserving range queries in sensor networksPrivacy  and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networks
 
Gf3311081111
Gf3311081111Gf3311081111
Gf3311081111
 
30
3030
30
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
Distributed System by Pratik Tambekar
Distributed System by Pratik TambekarDistributed System by Pratik Tambekar
Distributed System by Pratik Tambekar
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
 
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
 
Final 1st
Final 1stFinal 1st
Final 1st
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
 
MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013
 
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security Architecture
 
Pp1t
Pp1tPp1t
Pp1t
 

Último

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Último (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Privacy and integrity-preserving range queries

  • 1. Submitted to I.Anitha Rani Submitted by Y.Keerthi Reddy(10JM1517), V.Triveni(10JM1A0530), K.T.V.N.Lakshmi(10JM1A0527). PRIVACY- AND INTEGRITY- PRESERVING RANGE QUERIES IN SENSOR NETWORKS
  • 2. ABSTRACT • two-tiered sensor networks • benefits of power and storage saving for sensors as well as the efficiency of query processing • Attackers attracted on storage nodes • SafeQ also allows a sink to detect compromised storage nodes • To preserve integrity and privacy, SafeQ • propose two schemes—one using Merkle hash trees and another using a new data structure called neighborhood chains • To reduce communication cost we use bloom filters
  • 3. EXISTING SYSTEM Existing Wireless sensor networks once sensor nodes have been deployed, there will be minimal manual intervention and monitoring. But, when nodes are deployed in a hostile environment and there is no manual monitoring. DRAWBACKS • First, the attacker may obtain sensitive data that has been, or will be, stored in the storage node. • Second, the compromised storage node may return forged data for a query. • Third, this storage node may not include all data items that satisfy the query.
  • 4. PROPOSED SYSTEM To preserve the privacy and integrity of range queries in sensor networks uses the bucket-partitioning for database privacy. The basic idea is to divide the domain of data values into multiple buckets. SafeQ also allows a sink to detect compromised storage nodes when they misbehave. The sink is the point of contact for users of the sensor network.
  • 5. REQUIREMENTS Software Requirements: • O S : Windows XP or more • Technology :JAVA, Swing • Database : MS- Access Hardware Requirements: • Processor : Pentium IV • Hard Disk : 40 GB. • RAM :256 Mb.
  • 6. MODULES • SafeQ • Integrity • Privacy • Range Queries • Sink • Storage Node
  • 7. SAFEQ • SafeQ is a protocol that prevents attackers from gaining information from both sensor collected data and sink issued queries. • SafeQ also allows a sink to detect compromised storage nodes when they misbehave. • To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values.
  • 8. INTEGRITY The sink needs to detect whether a query result from a storage node includes forged data items or does not include all the data that satisfy the query. There are two key challenges in solving the privacyand integrity-preserving range query problem.  First, a storage node needs to correctly process encoded queries over encoded data without knowing their actual values.  Second, a sink needs to verify that the result of a query contains all the data items that satisfy the query and does not contain any forged data.
  • 9. PRIVACY To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their actual values. A compromised storage node cannot gain information from sensor collected data and sink issued queries A storage node can perform query processing
  • 10. RANGE QURIES The queries from the sink are range queries. A range query “is a common database operation finding all the data items collected at time-slot in the range”. Note that the queries in most sensor network applications can be easily modelled as range queries.
  • 11. SINK The sink is the point of contact for users of the sensor network.  Each time the sink receives a question from a user, it first translates the question into multiple queries and then disseminates the queries to the corresponding storage nodes The sink unifies the query results from multiple storage nodes into the final answer and sends it back to the user. Sink can detect compromised storage nodes when they misbehave.
  • 12. STORAGE NODE  Storage nodes are powerful wireless devices that are equipped with much more storage capacity and computing power than sensors. The storage node collects all data from the sensor nodes. The storage node can’t view the actual value of sensor node data. If the storage node trying to view the sensor node data, sink detect misbehave of storage node.
  • 13.
  • 24. File stores in Storage Node
  • 25. Sink
  • 31. CONCLUSION We make three key contributions in this paper. SafeQ significantly strengthens the security of two-tiered sensor networks. We used Merkle Hash trees and neighbourhood chain to preserve integrity we propose an optimization technique using Bloom filters to significantly reduce the communication cost between sensors and storage nodes. we propose a solution to adapt SafeQ for event-driven sensor networks.