SlideShare a Scribd company logo
1 of 13
PROJECT TITLE
Presented By,
Guided By,
BATCH NO:1
OBJECTIVES OF PROJECT
Topics to be Covered
 Abstract
 Existing System - Dis-adv
 Literature Survey
 Proposed System – Adv
 Architecture diagram
 REF PAPER
ABSTRACT
 SHOULD BE PARAGRAPH FORMAT.
EXISTING SYSTEM
 Data are produced at a large number of sensor node sources
and processed in-network at intermediate hops on their way
to a base station (BS) that performs decision-making.
 Existing system employs separate transmission channels for
data and provenance.
 The traditional provenance security solutions use intensively
cryptography and digital signatures and they employ
append-based data structures to store provenance, leading to
prohibitive costs.
DISADVANTAGES
 It is not intended as a security mechanism. So It does not
deal with malicious attacks.
 Provenance in sensor networks has not been properly
addressed.
 Sensors often operate in an untrusted environment,
where they may be subject to attacks. Hence, it is
necessary to address security requirements such as
confidentiality, integrity and freshness of provenance.
Literature Survey
Secure Provenance Transmission for Streaming Data: ( Aug
2013)
 The process of Keeping track of data provenance in such highly dynamic
context is an important requirement, since data provenance is a key factor
in assessing data trustworthiness which is crucial for many applications.
 Provenance management for streaming data requires addressing several
challenges, including the assurance of high processing throughput, low
bandwidth consumption, storage efficiency and secure transmission.
Provenance-Aware Storage systems:(June 2012)
 A Provenance-Aware Storage System (PASS) is a storage system that
automatically collects and maintains provenance or lineage, the complete
history or ancestry of an item.
 The advantages of treating provenance as meta-data collected and
maintained by the storage system, rather than as manual annotations
stored in a separately administered database.
 A PASS implementation, discussing the challenges it presents,
performance cost it incurs, and the new functionality it enables. The
reasonable overhead, provide useful functionality not available in today's
A Survey of Data Provenance in E-Science:(2011)
 Data management is growing in complexity as large scale applications take
advantage of the loosely coupled resources brought together by grid
middleware and by abundant storage capacity.
 The main aspect of our taxonomy categorizes provenance systems based
on why they record provenance, what they describe, how they represent and
store proven
Provenance-Based Trustworthiness Assessment in Sensor
Networks:(2011)
 A systematic method for assessing the trustworthiness of data items is created . Our
approach uses the data provenance as well as their values in com-putting trust scores,
that is, quantitative measures of trust worthiness.
 To obtain trust scores, a cyclic framework which well reflects the Inter
dependency property: the trust score of the data affects the trust score of the network
nodes that created and manipulated the data, and vice-versa.
 The trust scores of data items are computed from their value similarity and
provenance similarity.
 The value similarity comes from the principle that “the more similar values for the
same event, the higher the trust scores”. The provenance similarity is based on the
principle that “the more different data provenances with similar values, the higher the
trust scores”.
Chimera: A Virtual Data System for Representing, Querying,
and Automating Data Derivation:(2010)
 A lot of scientific data is not obtained from measurements but
rather derived from other data by the application of computational
procedures.
The hypothesize that explicit representation of these procedures
can enable documentation of data provenance, discovery of
available methods, and on-demand data generation (so-called
"virtual data").
To explore this idea, we have developed the Chimera virtual data
system, which combines a virtual data catalog for representing data
derivation procedures and derived data, with a virtual data language
interpreter that translates user requests into data definition and query
operations on the database.
The Chimera system with distributed "data grid" services to
enable on-demand execution of computation schedules constructed
from database queries.
PROPOSED SYSTEM
 The proposed technique relies on in-packet Bloom filters to
encode provenance.
 The secure provenance scheme with functionality to detect
packet drop attacks staged by malicious data forwarding
nodes.
 For transmitting data and provenance we require only single
channel.
 Bloom filters make efficient usage of bandwidth, and they
yield low error rates in practice.
 The efficient techniques for provenance decoding and
verification at the base station is done .
ADVANTAGES
 The security mechanism is improved.
 Malicious attacks are handled.
 Sensor network in provenance is addressed properly.
 The detailed security analysis and performance
evaluation of the proposed provenance encoding scheme
and packet loss detection mechanism.
Architecture diagram
References
 S. Sultana, M. Shehab, and E. Bertino, “Secure Provenance Transmission
for Streaming Data,” IEEE Trans. Knowledge and Data Eng., vol. 25, no.
8, pp. 1890-1903, Aug. 2013.
 S. Roy, M. Conti, S. Setia, and S. Jajodia, “Secure Data Aggregation in
Wireless Sensor Networks,” IEEE Trans. Information Forensics and
Security, vol. 7, no. 3, pp. 1040-1052, June 2012.
 S. Sultana, E. Bertino, and M. Shehab, “A Provenance Based Mechanism
to Identify Malicious Packet Dropping Adversaries in Sensor Networks,”
Proc. Int’l Conf. Distributed Computing Systems (ICDCS) Workshops,
pp. 332-338, 2011.
 S. Papadopoulos, A. Kiayias, and D. Papadias, “Secure and Efficient In-
Network Processing of Exact Sum Queries,” Proc. Int’l Conf. Data Eng.,
pp. 517-528, 2011.
 W. Zhou, M. Sherr, T. Tao, X. Li, B. Loo, and Y. Mao, “Efficient
Querying and Maintenance of Network Provenance at Internet- Scale,”
Proc. ACM SIGMOD Int’l Conf. Management of Data, pp. 615-626,
2010.

More Related Content

What's hot

Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Naveena N
 
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsA Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsDrjabez
 
Final review m score
Final review m scoreFinal review m score
Final review m scoreazhar4010
 
IRJET- Swift Retrieval of DNA Databases by Aggregating Queries
IRJET- Swift Retrieval of DNA Databases by Aggregating QueriesIRJET- Swift Retrieval of DNA Databases by Aggregating Queries
IRJET- Swift Retrieval of DNA Databases by Aggregating QueriesIRJET Journal
 
Conjunctive keyword search with designated tester and timing enabled proxy re...
Conjunctive keyword search with designated tester and timing enabled proxy re...Conjunctive keyword search with designated tester and timing enabled proxy re...
Conjunctive keyword search with designated tester and timing enabled proxy re...ieeepondy
 
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...Wright State University, Dayton, OH, USA
 
An Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksAn Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksM H
 
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...IJNSA Journal
 
A Survey On Ontology Agent Based Distributed Data Mining
A Survey On Ontology Agent Based Distributed Data MiningA Survey On Ontology Agent Based Distributed Data Mining
A Survey On Ontology Agent Based Distributed Data MiningEditor IJMTER
 
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...Editor IJMTER
 
data Fusion and log correlation
data Fusion and log correlationdata Fusion and log correlation
data Fusion and log correlationMahdi Sayyad
 
MINI Electrophysiology and CARMEN
MINI Electrophysiology and CARMENMINI Electrophysiology and CARMEN
MINI Electrophysiology and CARMENguest469de8
 
Cryptography for privacy preserving data mining
Cryptography for privacy preserving data miningCryptography for privacy preserving data mining
Cryptography for privacy preserving data miningMesbah Uddin Khan
 
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachPrivacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachNarendra Dhadhal
 
User friendly pattern search paradigm
User friendly pattern search paradigmUser friendly pattern search paradigm
User friendly pattern search paradigmMigrant Systems
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data miningNeeda Multani
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data miningeSAT Publishing House
 

What's hot (20)

C3602021025
C3602021025C3602021025
C3602021025
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsA Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
 
DLD_SYNOPSIS
DLD_SYNOPSISDLD_SYNOPSIS
DLD_SYNOPSIS
 
Final review m score
Final review m scoreFinal review m score
Final review m score
 
IRJET- Swift Retrieval of DNA Databases by Aggregating Queries
IRJET- Swift Retrieval of DNA Databases by Aggregating QueriesIRJET- Swift Retrieval of DNA Databases by Aggregating Queries
IRJET- Swift Retrieval of DNA Databases by Aggregating Queries
 
Conjunctive keyword search with designated tester and timing enabled proxy re...
Conjunctive keyword search with designated tester and timing enabled proxy re...Conjunctive keyword search with designated tester and timing enabled proxy re...
Conjunctive keyword search with designated tester and timing enabled proxy re...
 
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
 
An Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksAn Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor Networks
 
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
 
A Survey On Ontology Agent Based Distributed Data Mining
A Survey On Ontology Agent Based Distributed Data MiningA Survey On Ontology Agent Based Distributed Data Mining
A Survey On Ontology Agent Based Distributed Data Mining
 
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
 
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSNA Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
 
data Fusion and log correlation
data Fusion and log correlationdata Fusion and log correlation
data Fusion and log correlation
 
MINI Electrophysiology and CARMEN
MINI Electrophysiology and CARMENMINI Electrophysiology and CARMEN
MINI Electrophysiology and CARMEN
 
Cryptography for privacy preserving data mining
Cryptography for privacy preserving data miningCryptography for privacy preserving data mining
Cryptography for privacy preserving data mining
 
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachPrivacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approach
 
User friendly pattern search paradigm
User friendly pattern search paradigmUser friendly pattern search paradigm
User friendly pattern search paradigm
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
 

Viewers also liked

XIII - L’appât
XIII - L’appâtXIII - L’appât
XIII - L’appâtLe Point
 
Xian Facebook
Xian FacebookXian Facebook
Xian FacebookCIS
 
Intro to US_Hitachi and Dr Peter
Intro to US_Hitachi and Dr PeterIntro to US_Hitachi and Dr Peter
Intro to US_Hitachi and Dr PeterEtudes, Inc
 
Linked In Portfolio Presentation - Residential- wspecs
Linked In Portfolio Presentation - Residential- wspecsLinked In Portfolio Presentation - Residential- wspecs
Linked In Portfolio Presentation - Residential- wspecsClaire Gudmanz
 
2016 04 k verslype infosession-privacy-analytics-print
2016 04 k verslype infosession-privacy-analytics-print2016 04 k verslype infosession-privacy-analytics-print
2016 04 k verslype infosession-privacy-analytics-printSmals
 
Viaductos elevados parte 3
Viaductos elevados parte 3Viaductos elevados parte 3
Viaductos elevados parte 3CESEIC
 
Tecnología e innovación ica ingenieria
Tecnología e innovación ica ingenieriaTecnología e innovación ica ingenieria
Tecnología e innovación ica ingenieriaCESEIC
 
Comparison of Home Depot and Lowes
Comparison of Home Depot and LowesComparison of Home Depot and Lowes
Comparison of Home Depot and Lowesjcc1710
 
Observation sheet for teachers
Observation sheet for teachersObservation sheet for teachers
Observation sheet for teachersJacqueline Blanco
 
TorreReforma-Etructurales
TorreReforma-EtructuralesTorreReforma-Etructurales
TorreReforma-EtructuralesCESEIC
 

Viewers also liked (14)

XIII - L’appât
XIII - L’appâtXIII - L’appât
XIII - L’appât
 
Xian Facebook
Xian FacebookXian Facebook
Xian Facebook
 
cisco certificate
cisco certificatecisco certificate
cisco certificate
 
Tugas4 gerian[2]
Tugas4 gerian[2]Tugas4 gerian[2]
Tugas4 gerian[2]
 
123
123123
123
 
Intro to US_Hitachi and Dr Peter
Intro to US_Hitachi and Dr PeterIntro to US_Hitachi and Dr Peter
Intro to US_Hitachi and Dr Peter
 
Linked In Portfolio Presentation - Residential- wspecs
Linked In Portfolio Presentation - Residential- wspecsLinked In Portfolio Presentation - Residential- wspecs
Linked In Portfolio Presentation - Residential- wspecs
 
2016 04 k verslype infosession-privacy-analytics-print
2016 04 k verslype infosession-privacy-analytics-print2016 04 k verslype infosession-privacy-analytics-print
2016 04 k verslype infosession-privacy-analytics-print
 
Viaductos elevados parte 3
Viaductos elevados parte 3Viaductos elevados parte 3
Viaductos elevados parte 3
 
Tecnología e innovación ica ingenieria
Tecnología e innovación ica ingenieriaTecnología e innovación ica ingenieria
Tecnología e innovación ica ingenieria
 
Comparison of Home Depot and Lowes
Comparison of Home Depot and LowesComparison of Home Depot and Lowes
Comparison of Home Depot and Lowes
 
What is Rack ?
What is Rack ?What is Rack ?
What is Rack ?
 
Observation sheet for teachers
Observation sheet for teachersObservation sheet for teachers
Observation sheet for teachers
 
TorreReforma-Etructurales
TorreReforma-EtructuralesTorreReforma-Etructurales
TorreReforma-Etructurales
 

Similar to Lspnew (1)

A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...Pvrtechnologies Nellore
 
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...1crore projects
 
Trust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptxTrust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptxPoojaG86
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Dharmendrasingh417
 
Data repository for sensor network a data mining approach
Data repository for sensor network  a data mining approachData repository for sensor network  a data mining approach
Data repository for sensor network a data mining approachijdms
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
Secure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationIJMTST Journal
 
Outsourced similarity search on
Outsourced similarity search onOutsourced similarity search on
Outsourced similarity search onIMPULSE_TECHNOLOGY
 
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkA Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkIJERA Editor
 
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkA Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkIJERA Editor
 
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...IJCSIS Research Publications
 
A lightweight secure scheme for detecting
A lightweight secure scheme for detectingA lightweight secure scheme for detecting
A lightweight secure scheme for detectingjpstudcorner
 
A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...IJECEIAES
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
 
Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...M H
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET Journal
 
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 1   50+ AbstNcct   Ieee Software Abstract Collection Volume 1   50+ Abst
Ncct Ieee Software Abstract Collection Volume 1 50+ Abstncct
 
An efficeient privacy preserving ranked keyword search
An efficeient privacy preserving ranked keyword searchAn efficeient privacy preserving ranked keyword search
An efficeient privacy preserving ranked keyword searchredpel dot com
 

Similar to Lspnew (1) (20)

A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
 
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
 
Trust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptxTrust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptx
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network
 
Data repository for sensor network a data mining approach
Data repository for sensor network  a data mining approachData repository for sensor network  a data mining approach
Data repository for sensor network a data mining approach
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
Secure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End Communication
 
Outsourced similarity search on
Outsourced similarity search onOutsourced similarity search on
Outsourced similarity search on
 
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkA Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor network
 
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkA Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor network
 
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
 
A lightweight secure scheme for detecting
A lightweight secure scheme for detectingA lightweight secure scheme for detecting
A lightweight secure scheme for detecting
 
A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...
 
Proximate node aware optimal and secure data aggregation in wireless sensor ...
Proximate node aware optimal and secure data aggregation in  wireless sensor ...Proximate node aware optimal and secure data aggregation in  wireless sensor ...
Proximate node aware optimal and secure data aggregation in wireless sensor ...
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
 
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 1   50+ AbstNcct   Ieee Software Abstract Collection Volume 1   50+ Abst
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
 
An efficeient privacy preserving ranked keyword search
An efficeient privacy preserving ranked keyword searchAn efficeient privacy preserving ranked keyword search
An efficeient privacy preserving ranked keyword search
 

Recently uploaded

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spaintimesproduction05
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 

Recently uploaded (20)

Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 

Lspnew (1)

  • 3. Topics to be Covered  Abstract  Existing System - Dis-adv  Literature Survey  Proposed System – Adv  Architecture diagram  REF PAPER
  • 4. ABSTRACT  SHOULD BE PARAGRAPH FORMAT.
  • 5. EXISTING SYSTEM  Data are produced at a large number of sensor node sources and processed in-network at intermediate hops on their way to a base station (BS) that performs decision-making.  Existing system employs separate transmission channels for data and provenance.  The traditional provenance security solutions use intensively cryptography and digital signatures and they employ append-based data structures to store provenance, leading to prohibitive costs.
  • 6. DISADVANTAGES  It is not intended as a security mechanism. So It does not deal with malicious attacks.  Provenance in sensor networks has not been properly addressed.  Sensors often operate in an untrusted environment, where they may be subject to attacks. Hence, it is necessary to address security requirements such as confidentiality, integrity and freshness of provenance.
  • 7. Literature Survey Secure Provenance Transmission for Streaming Data: ( Aug 2013)  The process of Keeping track of data provenance in such highly dynamic context is an important requirement, since data provenance is a key factor in assessing data trustworthiness which is crucial for many applications.  Provenance management for streaming data requires addressing several challenges, including the assurance of high processing throughput, low bandwidth consumption, storage efficiency and secure transmission. Provenance-Aware Storage systems:(June 2012)  A Provenance-Aware Storage System (PASS) is a storage system that automatically collects and maintains provenance or lineage, the complete history or ancestry of an item.  The advantages of treating provenance as meta-data collected and maintained by the storage system, rather than as manual annotations stored in a separately administered database.  A PASS implementation, discussing the challenges it presents, performance cost it incurs, and the new functionality it enables. The reasonable overhead, provide useful functionality not available in today's
  • 8. A Survey of Data Provenance in E-Science:(2011)  Data management is growing in complexity as large scale applications take advantage of the loosely coupled resources brought together by grid middleware and by abundant storage capacity.  The main aspect of our taxonomy categorizes provenance systems based on why they record provenance, what they describe, how they represent and store proven Provenance-Based Trustworthiness Assessment in Sensor Networks:(2011)  A systematic method for assessing the trustworthiness of data items is created . Our approach uses the data provenance as well as their values in com-putting trust scores, that is, quantitative measures of trust worthiness.  To obtain trust scores, a cyclic framework which well reflects the Inter dependency property: the trust score of the data affects the trust score of the network nodes that created and manipulated the data, and vice-versa.  The trust scores of data items are computed from their value similarity and provenance similarity.  The value similarity comes from the principle that “the more similar values for the same event, the higher the trust scores”. The provenance similarity is based on the principle that “the more different data provenances with similar values, the higher the trust scores”.
  • 9. Chimera: A Virtual Data System for Representing, Querying, and Automating Data Derivation:(2010)  A lot of scientific data is not obtained from measurements but rather derived from other data by the application of computational procedures. The hypothesize that explicit representation of these procedures can enable documentation of data provenance, discovery of available methods, and on-demand data generation (so-called "virtual data"). To explore this idea, we have developed the Chimera virtual data system, which combines a virtual data catalog for representing data derivation procedures and derived data, with a virtual data language interpreter that translates user requests into data definition and query operations on the database. The Chimera system with distributed "data grid" services to enable on-demand execution of computation schedules constructed from database queries.
  • 10. PROPOSED SYSTEM  The proposed technique relies on in-packet Bloom filters to encode provenance.  The secure provenance scheme with functionality to detect packet drop attacks staged by malicious data forwarding nodes.  For transmitting data and provenance we require only single channel.  Bloom filters make efficient usage of bandwidth, and they yield low error rates in practice.  The efficient techniques for provenance decoding and verification at the base station is done .
  • 11. ADVANTAGES  The security mechanism is improved.  Malicious attacks are handled.  Sensor network in provenance is addressed properly.  The detailed security analysis and performance evaluation of the proposed provenance encoding scheme and packet loss detection mechanism.
  • 13. References  S. Sultana, M. Shehab, and E. Bertino, “Secure Provenance Transmission for Streaming Data,” IEEE Trans. Knowledge and Data Eng., vol. 25, no. 8, pp. 1890-1903, Aug. 2013.  S. Roy, M. Conti, S. Setia, and S. Jajodia, “Secure Data Aggregation in Wireless Sensor Networks,” IEEE Trans. Information Forensics and Security, vol. 7, no. 3, pp. 1040-1052, June 2012.  S. Sultana, E. Bertino, and M. Shehab, “A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks,” Proc. Int’l Conf. Distributed Computing Systems (ICDCS) Workshops, pp. 332-338, 2011.  S. Papadopoulos, A. Kiayias, and D. Papadias, “Secure and Efficient In- Network Processing of Exact Sum Queries,” Proc. Int’l Conf. Data Eng., pp. 517-528, 2011.  W. Zhou, M. Sherr, T. Tao, X. Li, B. Loo, and Y. Mao, “Efficient Querying and Maintenance of Network Provenance at Internet- Scale,” Proc. ACM SIGMOD Int’l Conf. Management of Data, pp. 615-626, 2010.