SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1008
Private and Secured data Transmission and Analysis for Wireless
Ad-hoc Network
Shrikant Kadam1, Pramod Lad2, Devendra Vavekar3
1,2,3 Students, DEPT. of Computer Engineering ISB&M School of Technology, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - A lot of work has been done to secure sensitive
data. The existing solutions can protect the organizational
data during transmission, but cannot stop the inside attack
where the administrator of the organizational database
reveals the sensitive data. We propose a practical approachto
prevent the inside attack by using multiple data servers to
store data by securely distributing the dataonto multiple data
servers. These contributions are essentially different from the
solution, which relies on the Sharemind system for data
analysis without considering the collusion of data servers to
preserve the privacy of the organizational data in statistical
analysis .We propose some new privacy-preserving statistical
analysis protocols on the basis of the Paillier and ElGamal
cryptosystems. These protocols allow the user to perform
statistical analysis on the datawithoutcompromisingthedata
privacy.
The development of Privacy Protection for organizational
database was motivated by business applications; today such
networks are used in many organizational, educational and
consumer applications, such as business process monitoring
and control, and so on.What has received less attention,
however, is the critical privacy concern on information being
collected, transmitted, andanalyzed. Suchprivateinformation
may include payload data transmitted throughthenetworkto
a centralized data processing server.
To keep the privacy of the user’s data, we proposedanewdata
collection protocol which splits the user’s data into three
numbers and stores them in threedataservers, respectively. As
long as one data server is not compromised, the privacy of the
user’s data can be preserved. For the legitimate user e.g.
receiver to access the user’s data, we proposed an access
control protocol, where three data servers cooperate to
provide the user with the user’s data, but do not know what it
is
Key Words: : Encryption, Cyphertext, and Pillier
cryptography
1. INTRODUCTION
The development of Privacy Protection for organizational
database wasmotivatedby businessapplications;todaysuch
networks are used in many organizational, educational and
consumer applications, such as businessprocessmonitoring
and control, and so on.What has received less attention,
however, is the critical privacyconcernoninformation being
collected, transmitted, and analyzed. Such private
information may include payload data transmitted through
the network to a centralized data processing server.
Our objective is: Protect the user data during transmission
.Reliable data transmission, node mobility support and fast
event detection. Timelydeliveryofdata,powermanagement,
node computation and middleware.
Stop the inside attack where the administrator of the user
database reveals the sensitive information of users.The
existing solutions can protect the data during transmission,
but cannot stop the inside attack where the administratorof
the organizational database reveals the sensitive user data.
In this, we propose a practical approachtopreventtheinside
attack by using multiple data servers to store data. Themain
scopes is securely distributing the data in multiple data
servers and employing the Paillier and ElGamal
cryptosystems to perform statistical analysis on the data
without compromising theinformationprivacy.Thesolution
can protect the data privacy as long as the number of the
compromised data servers is at most one. The data privacy
can be preserved as long as at least one of three data servers
is not compromised. Even if two data servers are
compromised but one data server is not compromised, our
solution is still secure.
2. SYSTEM ARCHITECHTURE
Like most of the application with wireless sensor
network,our architecture has four system as follows
A wireless ad-hoc network which sense the user data and
transmit user data to user database system
A user data access control system which is used by the user
To access the user data and to monitor it.
User data analysis system which is used by the user to query
the user database system and analyze the user data
statically.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1009
System Architecture
3. PROPOSED ALGORITHM
Paillier Public-Key Cryptosystem: It is composed of key
generation, encryptionanddecryptionalgorithms asfollows.
Step 1: Key generation The key generation algorithm
works as follows.
Choose two large prime numbers p and q randomly and
independently of each other such that
gcd(pq,(p-1)(q-1) )=1
Compute
N=pq,=lcm(p-1,q-1)
Where lcm stands for the least common multiple.
Select random integer g where and ensure N divides the
order of g by checking the existenceofthefollowingmodular
multiplicative inverse:
where function L is dined as
L(u)=(u-1)/N
Note that the notation a/b does not denote the modular
multiplication of a times the multiplicative inverse of b but
rather the quotient of divided by b
The public (encryption) key pk is (N,
The private (decryption) key sk is (,).
If using p,q of equivalent length, one can simply choose
where N = pq and(N)=(P-1)(q-1)
Step 2:Encryption:.
Plaintext data convert into cipertext form
Step 3: Decryption:
Let c be the ciphertext to decrypt, where the ciphertext
step 4: Homomorphic Properties A notable feature of the
Paillier cryp tosystem is its homomorphic properties. Given
two ciphertexts The product of a ciphertext with a plaintext
raising g will decrypt to the sum of the corresponding
plaintexts,An encrypted plaintext raised to a constant k will
decrypt to the product of the plaintext and the
constant,However, given the Paillier encryptions of two
messages, there is no known way to compute an encryption
of the product of these messages without knowing the
private key
4. RELEVENT MATHEMATICS
Let W be the whole system which consist
W= IP, PRO, OP
Where. IP is the input of the system.
A) IP= P, SD, SN, PD, U
1. P is the number of users in the system.
2. SN is the set of number of sensing nodes in the
system.
3. SD is the sensing data sensed from the
information SD.
4. PD is the users database system which consistsof
number databases.
5. U is the set of number of user in the systems that
are accessing the data from user database server.
B) PRO is the procedure of our proposed system:
Step 1: At first the wireless medical network which
senses the patient’s body and transmits the users
data to a users database system.
Step 2: A user’s database system which stores the
users data from distributed and provide squaring
services to users.
Step 3: A users data access control system which
issued by the user (e.g., physician) to access the
users data and monitor the users.
C) OP is the output of the system: OP is the output
of the system
The system provides the privacy to the users
sensible data available on the users database
system in the sense of inside attacks.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1010
5. CONCLUSIONS
We have investigated the security and privacy issues in the
wireless network data collection storage and queries and
presented a complete solution for privacy-preserving
wireless network. To secure the communication between
user and data servers.
To keep the privacy of the user’s data, we proposed a new
data collection protocol which splits the user’s data into
three numbers and stores them in three data servers,
respectively. As long as one data server is not compromised,
the privacy of the user’s data can be preserved. For the
legitimate user e.g. receiver to access the user’s data, we
proposed an access control protocol, where three data
servers cooperate to provide the user with the user’s data,
but do not know what it is.
REFERENCES
[1] Xun Yi, AthmanBouguettaya, DimitriosGeorgakopoulos,
Andy Song and Jan Willemson “Privacy Protection for
Wireless Medical Sensor Data”, in proc. IEEE
Transactions on Dependable and Secure Computing,
2015.
[2] In Proc. ESORICS’08, pages 192-206D. Bogdanov, S.
LaurSharemind: a Frameworkfor Fast Privacy-
Preserving Computations
[3] Wood, A.; Virone, G.; Doan, T.; Cao, Q.; Selavo, L.; Wu, Y.;
Fang, L.; He, Z.; Lin, S.; Stankovic, J. ALARM-NET:
Wireless Sensor Networks for Assisted-Living and
Residential Monitoring; Technical Report CS-2006-01;
Department of Computer Science, UniversityofVirginia:
Charlottesville, VA, USA, 2006.
[4] Cryptography And Network Security from William
Stallings. Reference 4.

Weitere Àhnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
 
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORMSECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
IRJET- Efficient Data Access Control for Multi-authority Cloud Storage
IRJET-  	  Efficient Data Access Control for Multi-authority Cloud StorageIRJET-  	  Efficient Data Access Control for Multi-authority Cloud Storage
IRJET- Efficient Data Access Control for Multi-authority Cloud Storage
 
Prompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data BrenchPrompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data Brench
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption System
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
 
A Study of Location and Date-Time Encryption of Cloud using Android Application
A Study of Location and Date-Time Encryption of Cloud using Android ApplicationA Study of Location and Date-Time Encryption of Cloud using Android Application
A Study of Location and Date-Time Encryption of Cloud using Android Application
 
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative StudyAsymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446
 
Paper2
Paper2Paper2
Paper2
 

Ähnlich wie Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network

Ähnlich wie Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network (20)

IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 

Mehr von IRJET Journal

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

KĂŒrzlich hochgeladen

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 

KĂŒrzlich hochgeladen (20)

GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
BhubaneswarđŸŒčCall Girls Bhubaneswar ❀Komal 9777949614 💟 Full Trusted CALL GIRL...
BhubaneswarđŸŒčCall Girls Bhubaneswar ❀Komal 9777949614 💟 Full Trusted CALL GIRL...BhubaneswarđŸŒčCall Girls Bhubaneswar ❀Komal 9777949614 💟 Full Trusted CALL GIRL...
BhubaneswarđŸŒčCall Girls Bhubaneswar ❀Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 

Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1008 Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network Shrikant Kadam1, Pramod Lad2, Devendra Vavekar3 1,2,3 Students, DEPT. of Computer Engineering ISB&M School of Technology, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - A lot of work has been done to secure sensitive data. The existing solutions can protect the organizational data during transmission, but cannot stop the inside attack where the administrator of the organizational database reveals the sensitive data. We propose a practical approachto prevent the inside attack by using multiple data servers to store data by securely distributing the dataonto multiple data servers. These contributions are essentially different from the solution, which relies on the Sharemind system for data analysis without considering the collusion of data servers to preserve the privacy of the organizational data in statistical analysis .We propose some new privacy-preserving statistical analysis protocols on the basis of the Paillier and ElGamal cryptosystems. These protocols allow the user to perform statistical analysis on the datawithoutcompromisingthedata privacy. The development of Privacy Protection for organizational database was motivated by business applications; today such networks are used in many organizational, educational and consumer applications, such as business process monitoring and control, and so on.What has received less attention, however, is the critical privacy concern on information being collected, transmitted, andanalyzed. Suchprivateinformation may include payload data transmitted throughthenetworkto a centralized data processing server. To keep the privacy of the user’s data, we proposedanewdata collection protocol which splits the user’s data into three numbers and stores them in threedataservers, respectively. As long as one data server is not compromised, the privacy of the user’s data can be preserved. For the legitimate user e.g. receiver to access the user’s data, we proposed an access control protocol, where three data servers cooperate to provide the user with the user’s data, but do not know what it is Key Words: : Encryption, Cyphertext, and Pillier cryptography 1. INTRODUCTION The development of Privacy Protection for organizational database wasmotivatedby businessapplications;todaysuch networks are used in many organizational, educational and consumer applications, such as businessprocessmonitoring and control, and so on.What has received less attention, however, is the critical privacyconcernoninformation being collected, transmitted, and analyzed. Such private information may include payload data transmitted through the network to a centralized data processing server. Our objective is: Protect the user data during transmission .Reliable data transmission, node mobility support and fast event detection. Timelydeliveryofdata,powermanagement, node computation and middleware. Stop the inside attack where the administrator of the user database reveals the sensitive information of users.The existing solutions can protect the data during transmission, but cannot stop the inside attack where the administratorof the organizational database reveals the sensitive user data. In this, we propose a practical approachtopreventtheinside attack by using multiple data servers to store data. Themain scopes is securely distributing the data in multiple data servers and employing the Paillier and ElGamal cryptosystems to perform statistical analysis on the data without compromising theinformationprivacy.Thesolution can protect the data privacy as long as the number of the compromised data servers is at most one. The data privacy can be preserved as long as at least one of three data servers is not compromised. Even if two data servers are compromised but one data server is not compromised, our solution is still secure. 2. SYSTEM ARCHITECHTURE Like most of the application with wireless sensor network,our architecture has four system as follows A wireless ad-hoc network which sense the user data and transmit user data to user database system A user data access control system which is used by the user To access the user data and to monitor it. User data analysis system which is used by the user to query the user database system and analyze the user data statically.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1009 System Architecture 3. PROPOSED ALGORITHM Paillier Public-Key Cryptosystem: It is composed of key generation, encryptionanddecryptionalgorithms asfollows. Step 1: Key generation The key generation algorithm works as follows. Choose two large prime numbers p and q randomly and independently of each other such that gcd(pq,(p-1)(q-1) )=1 Compute N=pq,=lcm(p-1,q-1) Where lcm stands for the least common multiple. Select random integer g where and ensure N divides the order of g by checking the existenceofthefollowingmodular multiplicative inverse: where function L is dined as L(u)=(u-1)/N Note that the notation a/b does not denote the modular multiplication of a times the multiplicative inverse of b but rather the quotient of divided by b The public (encryption) key pk is (N, The private (decryption) key sk is (,). If using p,q of equivalent length, one can simply choose where N = pq and(N)=(P-1)(q-1) Step 2:Encryption:. Plaintext data convert into cipertext form Step 3: Decryption: Let c be the ciphertext to decrypt, where the ciphertext step 4: Homomorphic Properties A notable feature of the Paillier cryp tosystem is its homomorphic properties. Given two ciphertexts The product of a ciphertext with a plaintext raising g will decrypt to the sum of the corresponding plaintexts,An encrypted plaintext raised to a constant k will decrypt to the product of the plaintext and the constant,However, given the Paillier encryptions of two messages, there is no known way to compute an encryption of the product of these messages without knowing the private key 4. RELEVENT MATHEMATICS Let W be the whole system which consist W= IP, PRO, OP Where. IP is the input of the system. A) IP= P, SD, SN, PD, U 1. P is the number of users in the system. 2. SN is the set of number of sensing nodes in the system. 3. SD is the sensing data sensed from the information SD. 4. PD is the users database system which consistsof number databases. 5. U is the set of number of user in the systems that are accessing the data from user database server. B) PRO is the procedure of our proposed system: Step 1: At first the wireless medical network which senses the patient’s body and transmits the users data to a users database system. Step 2: A user’s database system which stores the users data from distributed and provide squaring services to users. Step 3: A users data access control system which issued by the user (e.g., physician) to access the users data and monitor the users. C) OP is the output of the system: OP is the output of the system The system provides the privacy to the users sensible data available on the users database system in the sense of inside attacks.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1010 5. CONCLUSIONS We have investigated the security and privacy issues in the wireless network data collection storage and queries and presented a complete solution for privacy-preserving wireless network. To secure the communication between user and data servers. To keep the privacy of the user’s data, we proposed a new data collection protocol which splits the user’s data into three numbers and stores them in three data servers, respectively. As long as one data server is not compromised, the privacy of the user’s data can be preserved. For the legitimate user e.g. receiver to access the user’s data, we proposed an access control protocol, where three data servers cooperate to provide the user with the user’s data, but do not know what it is. REFERENCES [1] Xun Yi, AthmanBouguettaya, DimitriosGeorgakopoulos, Andy Song and Jan Willemson “Privacy Protection for Wireless Medical Sensor Data”, in proc. IEEE Transactions on Dependable and Secure Computing, 2015. [2] In Proc. ESORICS’08, pages 192-206D. Bogdanov, S. LaurSharemind: a Frameworkfor Fast Privacy- Preserving Computations [3] Wood, A.; Virone, G.; Doan, T.; Cao, Q.; Selavo, L.; Wu, Y.; Fang, L.; He, Z.; Lin, S.; Stankovic, J. ALARM-NET: Wireless Sensor Networks for Assisted-Living and Residential Monitoring; Technical Report CS-2006-01; Department of Computer Science, UniversityofVirginia: Charlottesville, VA, USA, 2006. [4] Cryptography And Network Security from William Stallings. Reference 4.