SlideShare a Scribd company logo
Submitted to
I.Anitha Rani
Submitted by
Y.Keerthi Reddy(10JM1517),
V.Triveni(10JM1A0530),
K.T.V.N.Lakshmi(10JM1A0527).
PRIVACY- AND INTEGRITY-
PRESERVING RANGE QUERIES
IN SENSOR NETWORKS
ABSTRACT
• two-tiered sensor networks
• benefits of power and storage
saving for sensors as well as the
efficiency of query processing
• Attackers attracted on storage nodes
• SafeQ also allows a sink to detect
compromised storage nodes
• To preserve integrity and privacy,
SafeQ
• propose two schemes—one using
Merkle hash trees and another
using a new data structure called
neighborhood chains
• To reduce communication cost we
use bloom filters
EXISTING SYSTEM
Existing Wireless sensor networks once sensor nodes have been
deployed, there will be minimal manual intervention and
monitoring. But, when nodes are deployed in a hostile
environment and there is no manual monitoring.
DRAWBACKS
• First, the attacker may obtain sensitive data that has been,
or will be, stored in the storage node.
• Second, the compromised storage node may return forged
data for a query.
• Third, this storage node may not include all data items that
satisfy the query.
PROPOSED SYSTEM
To preserve the privacy and integrity of range queries in
sensor networks
uses the bucket-partitioning for database privacy.
The basic idea is to divide the domain of data values into
multiple buckets.
SafeQ also allows a sink to detect compromised storage nodes
when they misbehave.
The sink is the point of contact for users of the sensor
network.
REQUIREMENTS
Software Requirements:
• O S : Windows XP or more
• Technology :JAVA, Swing
• Database : MS- Access
Hardware Requirements:
• Processor : Pentium IV
• Hard Disk : 40 GB.
• RAM :256 Mb.
MODULES
• SafeQ
• Integrity
• Privacy
• Range Queries
• Sink
• Storage Node
SAFEQ
• SafeQ is a protocol that prevents attackers from gaining
information from both sensor collected data and sink issued
queries.
• SafeQ also allows a sink to detect compromised storage nodes
when they misbehave.
• To preserve privacy, SafeQ uses a novel technique to encode
both data and queries such that a storage node can correctly
process encoded queries over encoded data without knowing
their values.
INTEGRITY
The sink needs to detect whether a query result from a
storage node includes forged data items or does not include all
the data that satisfy the query.
There are two key challenges in solving the privacyand
integrity-preserving range query problem.
 First, a storage node needs to correctly process encoded
queries over encoded data without knowing their actual
values.
 Second, a sink needs to verify that the result of a query
contains all the data items that satisfy the query and does not
contain any forged data.
PRIVACY
To preserve privacy, SafeQ uses a novel technique to encode
both data and queries such that a storage node can correctly
process encoded queries over encoded data without knowing
their actual values.
A compromised storage node cannot gain information from
sensor collected data and sink issued queries
A storage node can perform query processing
RANGE QURIES
The queries from the sink are range queries. A range query “is
a common database operation finding all the data items
collected at time-slot in the range”.
Note that the queries in most sensor network applications can
be easily modelled as range queries.
SINK
The sink is the point of contact for users of the sensor
network.
 Each time the sink receives a question from a user, it first
translates the question into multiple queries and then
disseminates the queries to the corresponding storage nodes
The sink unifies the query results from multiple storage nodes
into the final answer and sends it back to the user.
Sink can detect compromised storage nodes when they
misbehave.
STORAGE NODE
 Storage nodes are powerful wireless devices that are
equipped with much more storage capacity and computing
power than sensors.
The storage node collects all data from the sensor nodes.
The storage node can’t view the actual value of sensor node
data.
If the storage node trying to view the sensor node data, sink
detect misbehave of storage node.
DATAFLOW DIAGRAM
DATAFLOW DIAGRAM
SINK
USECASE DIAGRAM
CLASS DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
SCREEN SHOTS
Sensor node sends file
Negative acknowledgement
False Positive
File stores in Storage Node
Sink
View File Details
Receive File
Authentication to View
Authentication Valid
Authentication Invalid
CONCLUSION
We make three key contributions in this paper.
SafeQ significantly strengthens the security of two-tiered
sensor networks.
We used Merkle Hash trees and neighbourhood chain to
preserve integrity
we propose an optimization technique using Bloom filters to
significantly reduce the communication cost between sensors
and storage nodes.
we propose a solution to adapt SafeQ for event-driven sensor
networks.
Any Queries????????

More Related Content

What's hot

Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
Finalyearprojects Toall
 
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Abed Matini
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
IJET - International Journal of Engineering and Techniques
 
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
Pance Cavkovski
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
Tushar Anand
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
Shakas Technologies
 
WPA 3
WPA 3WPA 3
WPA 3
diggu22
 
WEP
WEPWEP
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Fábio Afonso
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
bhanu4ugood1
 
Big Brother: Kubernetes Edition
Big Brother: Kubernetes EditionBig Brother: Kubernetes Edition
Big Brother: Kubernetes Edition
Knox Anderson
 
Shmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security BriefShmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security Brief
openfly
 
Zonesec_ares
Zonesec_aresZonesec_ares
Security Onion
Security OnionSecurity Onion
Connect X IoT platform overview
Connect X IoT platform overviewConnect X IoT platform overview
Connect X IoT platform overview
Jay Lohokare
 
Importance of Network Performance Monitoring
Importance of Network Performance MonitoringImportance of Network Performance Monitoring
Importance of Network Performance Monitoring
cPacket Networks
 

What's hot (18)

Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
 
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Razorback slides-1.1
Razorback slides-1.1Razorback slides-1.1
Razorback slides-1.1
 
WPA 3
WPA 3WPA 3
WPA 3
 
WEP
WEPWEP
WEP
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
 
Big Brother: Kubernetes Edition
Big Brother: Kubernetes EditionBig Brother: Kubernetes Edition
Big Brother: Kubernetes Edition
 
WPA2
WPA2WPA2
WPA2
 
Shmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security BriefShmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security Brief
 
Zonesec_ares
Zonesec_aresZonesec_ares
Zonesec_ares
 
Security Onion
Security OnionSecurity Onion
Security Onion
 
Connect X IoT platform overview
Connect X IoT platform overviewConnect X IoT platform overview
Connect X IoT platform overview
 
Importance of Network Performance Monitoring
Importance of Network Performance MonitoringImportance of Network Performance Monitoring
Importance of Network Performance Monitoring
 

Viewers also liked

Paper Battery
Paper BatteryPaper Battery
Paper Battery
Keerthi Reddy Yeruva
 
Seminar
SeminarSeminar
Seminar
Amala Reddy
 
When “turn automatic update is on or off” is grayed out
When “turn automatic update is on or off” is grayed outWhen “turn automatic update is on or off” is grayed out
When “turn automatic update is on or off” is grayed out
Keerthi Reddy Yeruva
 
Footprint: Detecting Sybil Attacks in Urban Vehicular Network
Footprint: Detecting Sybil Attacks in Urban Vehicular NetworkFootprint: Detecting Sybil Attacks in Urban Vehicular Network
Footprint: Detecting Sybil Attacks in Urban Vehicular NetworkKeerthi Reddy Yeruva
 
The Genomics Revolution: The Good, The Bad, The Ugly
The Genomics Revolution: The Good, The Bad, The UglyThe Genomics Revolution: The Good, The Bad, The Ugly
The Genomics Revolution: The Good, The Bad, The Ugly
Emiliano De Cristofaro
 
paper batteries presented by tejaswini and tarun
paper batteries presented by tejaswini and tarunpaper batteries presented by tejaswini and tarun
paper batteries presented by tejaswini and tarun
Pillu Tejaswini
 
PAPER BATTERY BY Ramachandra seminar ppt
PAPER BATTERY BY Ramachandra seminar pptPAPER BATTERY BY Ramachandra seminar ppt
PAPER BATTERY BY Ramachandra seminar ppt
RAMA CHANDRA MUDULI
 
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachPrivacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approach
Narendra Dhadhal
 
Deepak paperbattery mahhh
Deepak paperbattery mahhhDeepak paperbattery mahhh
Deepak paperbattery mahhhDeepak Patel
 
Shankar
ShankarShankar
Shankar
Shankar Patro
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data Mining
Vrushali Malvadkar
 
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and ApproachesA Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
14894
 
Paper battery
Paper battery Paper battery
Paper battery
tahseen shaikh
 
Paper Battery
Paper BatteryPaper Battery
Paper Battery
Rajesh Dunna
 
Paper battery ppt by kriti chaurasia
Paper battery ppt by kriti chaurasiaPaper battery ppt by kriti chaurasia
Paper battery ppt by kriti chaurasia
kriti chaurasia
 
Paper battery
Paper batteryPaper battery
Paper battery
Sivananda Reddy
 
Accounting concepts and conventions
Accounting concepts and conventionsAccounting concepts and conventions
Accounting concepts and conventionsSukirat Kaur
 

Viewers also liked (20)

Paper Battery
Paper BatteryPaper Battery
Paper Battery
 
Seminar
SeminarSeminar
Seminar
 
When “turn automatic update is on or off” is grayed out
When “turn automatic update is on or off” is grayed outWhen “turn automatic update is on or off” is grayed out
When “turn automatic update is on or off” is grayed out
 
Footprint: Detecting Sybil Attacks in Urban Vehicular Network
Footprint: Detecting Sybil Attacks in Urban Vehicular NetworkFootprint: Detecting Sybil Attacks in Urban Vehicular Network
Footprint: Detecting Sybil Attacks in Urban Vehicular Network
 
The Genomics Revolution: The Good, The Bad, The Ugly
The Genomics Revolution: The Good, The Bad, The UglyThe Genomics Revolution: The Good, The Bad, The Ugly
The Genomics Revolution: The Good, The Bad, The Ugly
 
paper batteries presented by tejaswini and tarun
paper batteries presented by tejaswini and tarunpaper batteries presented by tejaswini and tarun
paper batteries presented by tejaswini and tarun
 
Paper battery
Paper batteryPaper battery
Paper battery
 
PAPER BATTERY BY Ramachandra seminar ppt
PAPER BATTERY BY Ramachandra seminar pptPAPER BATTERY BY Ramachandra seminar ppt
PAPER BATTERY BY Ramachandra seminar ppt
 
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachPrivacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approach
 
Deepak paperbattery mahhh
Deepak paperbattery mahhhDeepak paperbattery mahhh
Deepak paperbattery mahhh
 
Shankar
ShankarShankar
Shankar
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data Mining
 
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and ApproachesA Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
 
Paper battery
Paper battery Paper battery
Paper battery
 
Paper battery
Paper batteryPaper battery
Paper battery
 
Paper battery
Paper batteryPaper battery
Paper battery
 
Paper Battery
Paper BatteryPaper Battery
Paper Battery
 
Paper battery ppt by kriti chaurasia
Paper battery ppt by kriti chaurasiaPaper battery ppt by kriti chaurasia
Paper battery ppt by kriti chaurasia
 
Paper battery
Paper batteryPaper battery
Paper battery
 
Accounting concepts and conventions
Accounting concepts and conventionsAccounting concepts and conventions
Accounting concepts and conventions
 

Similar to Privacy and integrity-preserving range queries

Privacy and integrity-preserving range queries in sensor networks
Privacy  and integrity-preserving range queries in sensor networksPrivacy  and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networks
IMPULSE_TECHNOLOGY
 
Gf3311081111
Gf3311081111Gf3311081111
Gf3311081111
IJERA Editor
 
30
3030
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...
eSAT Journals
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
Adit Pathak
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storageZTech Proje
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET Journal
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
EditorJST
 
Distributed System by Pratik Tambekar
Distributed System by Pratik TambekarDistributed System by Pratik Tambekar
Distributed System by Pratik Tambekar
Pratik Tambekar
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET Journal
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
IRJET Journal
 
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET Journal
 
Final 1st
Final 1stFinal 1st
Final 1st
gokulprema
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET Journal
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
IRJET Journal
 
MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013
Charith Perera
 
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET Journal
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET Journal
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security Architecture
AM Publications,India
 

Similar to Privacy and integrity-preserving range queries (20)

Privacy and integrity-preserving range queries in sensor networks
Privacy  and integrity-preserving range queries in sensor networksPrivacy  and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networks
 
Gf3311081111
Gf3311081111Gf3311081111
Gf3311081111
 
30
3030
30
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
Distributed System by Pratik Tambekar
Distributed System by Pratik TambekarDistributed System by Pratik Tambekar
Distributed System by Pratik Tambekar
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
 
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
 
Final 1st
Final 1stFinal 1st
Final 1st
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
 
MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013
 
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security Architecture
 
Pp1t
Pp1tPp1t
Pp1t
 

Recently uploaded

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 

Recently uploaded (20)

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 

Privacy and integrity-preserving range queries

  • 1. Submitted to I.Anitha Rani Submitted by Y.Keerthi Reddy(10JM1517), V.Triveni(10JM1A0530), K.T.V.N.Lakshmi(10JM1A0527). PRIVACY- AND INTEGRITY- PRESERVING RANGE QUERIES IN SENSOR NETWORKS
  • 2. ABSTRACT • two-tiered sensor networks • benefits of power and storage saving for sensors as well as the efficiency of query processing • Attackers attracted on storage nodes • SafeQ also allows a sink to detect compromised storage nodes • To preserve integrity and privacy, SafeQ • propose two schemes—one using Merkle hash trees and another using a new data structure called neighborhood chains • To reduce communication cost we use bloom filters
  • 3. EXISTING SYSTEM Existing Wireless sensor networks once sensor nodes have been deployed, there will be minimal manual intervention and monitoring. But, when nodes are deployed in a hostile environment and there is no manual monitoring. DRAWBACKS • First, the attacker may obtain sensitive data that has been, or will be, stored in the storage node. • Second, the compromised storage node may return forged data for a query. • Third, this storage node may not include all data items that satisfy the query.
  • 4. PROPOSED SYSTEM To preserve the privacy and integrity of range queries in sensor networks uses the bucket-partitioning for database privacy. The basic idea is to divide the domain of data values into multiple buckets. SafeQ also allows a sink to detect compromised storage nodes when they misbehave. The sink is the point of contact for users of the sensor network.
  • 5. REQUIREMENTS Software Requirements: • O S : Windows XP or more • Technology :JAVA, Swing • Database : MS- Access Hardware Requirements: • Processor : Pentium IV • Hard Disk : 40 GB. • RAM :256 Mb.
  • 6. MODULES • SafeQ • Integrity • Privacy • Range Queries • Sink • Storage Node
  • 7. SAFEQ • SafeQ is a protocol that prevents attackers from gaining information from both sensor collected data and sink issued queries. • SafeQ also allows a sink to detect compromised storage nodes when they misbehave. • To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values.
  • 8. INTEGRITY The sink needs to detect whether a query result from a storage node includes forged data items or does not include all the data that satisfy the query. There are two key challenges in solving the privacyand integrity-preserving range query problem.  First, a storage node needs to correctly process encoded queries over encoded data without knowing their actual values.  Second, a sink needs to verify that the result of a query contains all the data items that satisfy the query and does not contain any forged data.
  • 9. PRIVACY To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their actual values. A compromised storage node cannot gain information from sensor collected data and sink issued queries A storage node can perform query processing
  • 10. RANGE QURIES The queries from the sink are range queries. A range query “is a common database operation finding all the data items collected at time-slot in the range”. Note that the queries in most sensor network applications can be easily modelled as range queries.
  • 11. SINK The sink is the point of contact for users of the sensor network.  Each time the sink receives a question from a user, it first translates the question into multiple queries and then disseminates the queries to the corresponding storage nodes The sink unifies the query results from multiple storage nodes into the final answer and sends it back to the user. Sink can detect compromised storage nodes when they misbehave.
  • 12. STORAGE NODE  Storage nodes are powerful wireless devices that are equipped with much more storage capacity and computing power than sensors. The storage node collects all data from the sensor nodes. The storage node can’t view the actual value of sensor node data. If the storage node trying to view the sensor node data, sink detect misbehave of storage node.
  • 13.
  • 24. File stores in Storage Node
  • 25. Sink
  • 31. CONCLUSION We make three key contributions in this paper. SafeQ significantly strengthens the security of two-tiered sensor networks. We used Merkle Hash trees and neighbourhood chain to preserve integrity we propose an optimization technique using Bloom filters to significantly reduce the communication cost between sensors and storage nodes. we propose a solution to adapt SafeQ for event-driven sensor networks.