SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Submitted to
I.Anitha Rani
Submitted by
Y.Keerthi Reddy(10JM1517),
V.Triveni(10JM1A0530),
K.T.V.N.Lakshmi(10JM1A0527).
PRIVACY- AND INTEGRITY-
PRESERVING RANGE QUERIES
IN SENSOR NETWORKS
ABSTRACT
• two-tiered sensor networks
• benefits of power and storage
saving for sensors as well as the
efficiency of query processing
• Attackers attracted on storage nodes
• SafeQ also allows a sink to detect
compromised storage nodes
• To preserve integrity and privacy,
SafeQ
• propose two schemes—one using
Merkle hash trees and another
using a new data structure called
neighborhood chains
• To reduce communication cost we
use bloom filters
EXISTING SYSTEM
Existing Wireless sensor networks once sensor nodes have been
deployed, there will be minimal manual intervention and
monitoring. But, when nodes are deployed in a hostile
environment and there is no manual monitoring.
DRAWBACKS
• First, the attacker may obtain sensitive data that has been,
or will be, stored in the storage node.
• Second, the compromised storage node may return forged
data for a query.
• Third, this storage node may not include all data items that
satisfy the query.
PROPOSED SYSTEM
To preserve the privacy and integrity of range queries in
sensor networks
uses the bucket-partitioning for database privacy.
The basic idea is to divide the domain of data values into
multiple buckets.
SafeQ also allows a sink to detect compromised storage nodes
when they misbehave.
The sink is the point of contact for users of the sensor
network.
REQUIREMENTS
Software Requirements:
• O S : Windows XP or more
• Technology :JAVA, Swing
• Database : MS- Access
Hardware Requirements:
• Processor : Pentium IV
• Hard Disk : 40 GB.
• RAM :256 Mb.
MODULES
• SafeQ
• Integrity
• Privacy
• Range Queries
• Sink
• Storage Node
SAFEQ
• SafeQ is a protocol that prevents attackers from gaining
information from both sensor collected data and sink issued
queries.
• SafeQ also allows a sink to detect compromised storage nodes
when they misbehave.
• To preserve privacy, SafeQ uses a novel technique to encode
both data and queries such that a storage node can correctly
process encoded queries over encoded data without knowing
their values.
INTEGRITY
The sink needs to detect whether a query result from a
storage node includes forged data items or does not include all
the data that satisfy the query.
There are two key challenges in solving the privacyand
integrity-preserving range query problem.
 First, a storage node needs to correctly process encoded
queries over encoded data without knowing their actual
values.
 Second, a sink needs to verify that the result of a query
contains all the data items that satisfy the query and does not
contain any forged data.
PRIVACY
To preserve privacy, SafeQ uses a novel technique to encode
both data and queries such that a storage node can correctly
process encoded queries over encoded data without knowing
their actual values.
A compromised storage node cannot gain information from
sensor collected data and sink issued queries
A storage node can perform query processing
RANGE QURIES
The queries from the sink are range queries. A range query “is
a common database operation finding all the data items
collected at time-slot in the range”.
Note that the queries in most sensor network applications can
be easily modelled as range queries.
SINK
The sink is the point of contact for users of the sensor
network.
 Each time the sink receives a question from a user, it first
translates the question into multiple queries and then
disseminates the queries to the corresponding storage nodes
The sink unifies the query results from multiple storage nodes
into the final answer and sends it back to the user.
Sink can detect compromised storage nodes when they
misbehave.
STORAGE NODE
 Storage nodes are powerful wireless devices that are
equipped with much more storage capacity and computing
power than sensors.
The storage node collects all data from the sensor nodes.
The storage node can’t view the actual value of sensor node
data.
If the storage node trying to view the sensor node data, sink
detect misbehave of storage node.
DATAFLOW DIAGRAM
DATAFLOW DIAGRAM
SINK
USECASE DIAGRAM
CLASS DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
SCREEN SHOTS
Sensor node sends file
Negative acknowledgement
False Positive
File stores in Storage Node
Sink
View File Details
Receive File
Authentication to View
Authentication Valid
Authentication Invalid
CONCLUSION
We make three key contributions in this paper.
SafeQ significantly strengthens the security of two-tiered
sensor networks.
We used Merkle Hash trees and neighbourhood chain to
preserve integrity
we propose an optimization technique using Bloom filters to
significantly reduce the communication cost between sensors
and storage nodes.
we propose a solution to adapt SafeQ for event-driven sensor
networks.
Any Queries????????

Weitere ähnliche Inhalte

Was ist angesagt?

Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsFinalyearprojects Toall
 
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) Abed Matini
 
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)Pance Cavkovski
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2Tushar Anand
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsShakas Technologies
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Fábio Afonso
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-accessbhanu4ugood1
 
Big Brother: Kubernetes Edition
Big Brother: Kubernetes EditionBig Brother: Kubernetes Edition
Big Brother: Kubernetes EditionKnox Anderson
 
Shmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security BriefShmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security Briefopenfly
 
Connect X IoT platform overview
Connect X IoT platform overviewConnect X IoT platform overview
Connect X IoT platform overviewJay Lohokare
 
Importance of Network Performance Monitoring
Importance of Network Performance MonitoringImportance of Network Performance Monitoring
Importance of Network Performance MonitoringcPacket Networks
 

Was ist angesagt? (18)

Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) Securing interactions Among Cloud Systems and Internet of Things (IoT) 
Securing interactions Among Cloud Systems and Internet of Things (IoT) 
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
 
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Razorback slides-1.1
Razorback slides-1.1Razorback slides-1.1
Razorback slides-1.1
 
WPA 3
WPA 3WPA 3
WPA 3
 
WEP
WEPWEP
WEP
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
 
Big Brother: Kubernetes Edition
Big Brother: Kubernetes EditionBig Brother: Kubernetes Edition
Big Brother: Kubernetes Edition
 
WPA2
WPA2WPA2
WPA2
 
Shmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security BriefShmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security Brief
 
Zonesec_ares
Zonesec_aresZonesec_ares
Zonesec_ares
 
Security Onion
Security OnionSecurity Onion
Security Onion
 
Connect X IoT platform overview
Connect X IoT platform overviewConnect X IoT platform overview
Connect X IoT platform overview
 
Importance of Network Performance Monitoring
Importance of Network Performance MonitoringImportance of Network Performance Monitoring
Importance of Network Performance Monitoring
 

Andere mochten auch

When “turn automatic update is on or off” is grayed out
When “turn automatic update is on or off” is grayed outWhen “turn automatic update is on or off” is grayed out
When “turn automatic update is on or off” is grayed outKeerthi Reddy Yeruva
 
Footprint: Detecting Sybil Attacks in Urban Vehicular Network
Footprint: Detecting Sybil Attacks in Urban Vehicular NetworkFootprint: Detecting Sybil Attacks in Urban Vehicular Network
Footprint: Detecting Sybil Attacks in Urban Vehicular NetworkKeerthi Reddy Yeruva
 
The Genomics Revolution: The Good, The Bad, The Ugly
The Genomics Revolution: The Good, The Bad, The UglyThe Genomics Revolution: The Good, The Bad, The Ugly
The Genomics Revolution: The Good, The Bad, The UglyEmiliano De Cristofaro
 
paper batteries presented by tejaswini and tarun
paper batteries presented by tejaswini and tarunpaper batteries presented by tejaswini and tarun
paper batteries presented by tejaswini and tarunPillu Tejaswini
 
PAPER BATTERY BY Ramachandra seminar ppt
PAPER BATTERY BY Ramachandra seminar pptPAPER BATTERY BY Ramachandra seminar ppt
PAPER BATTERY BY Ramachandra seminar pptRAMA CHANDRA MUDULI
 
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachPrivacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachNarendra Dhadhal
 
Deepak paperbattery mahhh
Deepak paperbattery mahhhDeepak paperbattery mahhh
Deepak paperbattery mahhhDeepak Patel
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data MiningVrushali Malvadkar
 
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and ApproachesA Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches14894
 
Paper battery ppt by kriti chaurasia
Paper battery ppt by kriti chaurasiaPaper battery ppt by kriti chaurasia
Paper battery ppt by kriti chaurasiakriti chaurasia
 
Accounting concepts and conventions
Accounting concepts and conventionsAccounting concepts and conventions
Accounting concepts and conventionsSukirat Kaur
 

Andere mochten auch (20)

Paper Battery
Paper BatteryPaper Battery
Paper Battery
 
Seminar
SeminarSeminar
Seminar
 
When “turn automatic update is on or off” is grayed out
When “turn automatic update is on or off” is grayed outWhen “turn automatic update is on or off” is grayed out
When “turn automatic update is on or off” is grayed out
 
Footprint: Detecting Sybil Attacks in Urban Vehicular Network
Footprint: Detecting Sybil Attacks in Urban Vehicular NetworkFootprint: Detecting Sybil Attacks in Urban Vehicular Network
Footprint: Detecting Sybil Attacks in Urban Vehicular Network
 
The Genomics Revolution: The Good, The Bad, The Ugly
The Genomics Revolution: The Good, The Bad, The UglyThe Genomics Revolution: The Good, The Bad, The Ugly
The Genomics Revolution: The Good, The Bad, The Ugly
 
paper batteries presented by tejaswini and tarun
paper batteries presented by tejaswini and tarunpaper batteries presented by tejaswini and tarun
paper batteries presented by tejaswini and tarun
 
Paper battery
Paper batteryPaper battery
Paper battery
 
PAPER BATTERY BY Ramachandra seminar ppt
PAPER BATTERY BY Ramachandra seminar pptPAPER BATTERY BY Ramachandra seminar ppt
PAPER BATTERY BY Ramachandra seminar ppt
 
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachPrivacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approach
 
Deepak paperbattery mahhh
Deepak paperbattery mahhhDeepak paperbattery mahhh
Deepak paperbattery mahhh
 
Shankar
ShankarShankar
Shankar
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data Mining
 
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and ApproachesA Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
 
Paper battery
Paper battery Paper battery
Paper battery
 
Paper battery
Paper batteryPaper battery
Paper battery
 
Paper battery
Paper batteryPaper battery
Paper battery
 
Paper Battery
Paper BatteryPaper Battery
Paper Battery
 
Paper battery ppt by kriti chaurasia
Paper battery ppt by kriti chaurasiaPaper battery ppt by kriti chaurasia
Paper battery ppt by kriti chaurasia
 
Paper battery
Paper batteryPaper battery
Paper battery
 
Accounting concepts and conventions
Accounting concepts and conventionsAccounting concepts and conventions
Accounting concepts and conventions
 

Ähnlich wie Privacy and integrity-preserving range queries

Privacy and integrity-preserving range queries in sensor networks
Privacy  and integrity-preserving range queries in sensor networksPrivacy  and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networksIMPULSE_TECHNOLOGY
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...eSAT Journals
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storageZTech Proje
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET Journal
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...EditorJST
 
Distributed System by Pratik Tambekar
Distributed System by Pratik TambekarDistributed System by Pratik Tambekar
Distributed System by Pratik TambekarPratik Tambekar
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in CloudIRJET Journal
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...IRJET Journal
 
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET Journal
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...IRJET Journal
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...IRJET Journal
 
MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013Charith Perera
 
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET Journal
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET Journal
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
 

Ähnlich wie Privacy and integrity-preserving range queries (20)

Privacy and integrity-preserving range queries in sensor networks
Privacy  and integrity-preserving range queries in sensor networksPrivacy  and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networks
 
Gf3311081111
Gf3311081111Gf3311081111
Gf3311081111
 
30
3030
30
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
Distributed System by Pratik Tambekar
Distributed System by Pratik TambekarDistributed System by Pratik Tambekar
Distributed System by Pratik Tambekar
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
 
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
 
Final 1st
Final 1stFinal 1st
Final 1st
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
 
MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013
 
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security Architecture
 
Pp1t
Pp1tPp1t
Pp1t
 

Kürzlich hochgeladen

REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 

Kürzlich hochgeladen (20)

REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

Privacy and integrity-preserving range queries

  • 1. Submitted to I.Anitha Rani Submitted by Y.Keerthi Reddy(10JM1517), V.Triveni(10JM1A0530), K.T.V.N.Lakshmi(10JM1A0527). PRIVACY- AND INTEGRITY- PRESERVING RANGE QUERIES IN SENSOR NETWORKS
  • 2. ABSTRACT • two-tiered sensor networks • benefits of power and storage saving for sensors as well as the efficiency of query processing • Attackers attracted on storage nodes • SafeQ also allows a sink to detect compromised storage nodes • To preserve integrity and privacy, SafeQ • propose two schemes—one using Merkle hash trees and another using a new data structure called neighborhood chains • To reduce communication cost we use bloom filters
  • 3. EXISTING SYSTEM Existing Wireless sensor networks once sensor nodes have been deployed, there will be minimal manual intervention and monitoring. But, when nodes are deployed in a hostile environment and there is no manual monitoring. DRAWBACKS • First, the attacker may obtain sensitive data that has been, or will be, stored in the storage node. • Second, the compromised storage node may return forged data for a query. • Third, this storage node may not include all data items that satisfy the query.
  • 4. PROPOSED SYSTEM To preserve the privacy and integrity of range queries in sensor networks uses the bucket-partitioning for database privacy. The basic idea is to divide the domain of data values into multiple buckets. SafeQ also allows a sink to detect compromised storage nodes when they misbehave. The sink is the point of contact for users of the sensor network.
  • 5. REQUIREMENTS Software Requirements: • O S : Windows XP or more • Technology :JAVA, Swing • Database : MS- Access Hardware Requirements: • Processor : Pentium IV • Hard Disk : 40 GB. • RAM :256 Mb.
  • 6. MODULES • SafeQ • Integrity • Privacy • Range Queries • Sink • Storage Node
  • 7. SAFEQ • SafeQ is a protocol that prevents attackers from gaining information from both sensor collected data and sink issued queries. • SafeQ also allows a sink to detect compromised storage nodes when they misbehave. • To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values.
  • 8. INTEGRITY The sink needs to detect whether a query result from a storage node includes forged data items or does not include all the data that satisfy the query. There are two key challenges in solving the privacyand integrity-preserving range query problem.  First, a storage node needs to correctly process encoded queries over encoded data without knowing their actual values.  Second, a sink needs to verify that the result of a query contains all the data items that satisfy the query and does not contain any forged data.
  • 9. PRIVACY To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their actual values. A compromised storage node cannot gain information from sensor collected data and sink issued queries A storage node can perform query processing
  • 10. RANGE QURIES The queries from the sink are range queries. A range query “is a common database operation finding all the data items collected at time-slot in the range”. Note that the queries in most sensor network applications can be easily modelled as range queries.
  • 11. SINK The sink is the point of contact for users of the sensor network.  Each time the sink receives a question from a user, it first translates the question into multiple queries and then disseminates the queries to the corresponding storage nodes The sink unifies the query results from multiple storage nodes into the final answer and sends it back to the user. Sink can detect compromised storage nodes when they misbehave.
  • 12. STORAGE NODE  Storage nodes are powerful wireless devices that are equipped with much more storage capacity and computing power than sensors. The storage node collects all data from the sensor nodes. The storage node can’t view the actual value of sensor node data. If the storage node trying to view the sensor node data, sink detect misbehave of storage node.
  • 13.
  • 24. File stores in Storage Node
  • 25. Sink
  • 31. CONCLUSION We make three key contributions in this paper. SafeQ significantly strengthens the security of two-tiered sensor networks. We used Merkle Hash trees and neighbourhood chain to preserve integrity we propose an optimization technique using Bloom filters to significantly reduce the communication cost between sensors and storage nodes. we propose a solution to adapt SafeQ for event-driven sensor networks.