Privacy and integrity-preserving range queries
-
Upload
keerthi-reddy-yeruva -
Category
Education
-
view
367 -
download
0
description
Transcript of Privacy and integrity-preserving range queries
![Page 1: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/1.jpg)
Submitted toI.Anitha Rani
Submitted byY.Keerthi Reddy(10JM1517),
V.Triveni(10JM1A0530),K.T.V.N.Lakshmi(10JM1A0527).
PRIVACY- AND INTEGRITY-PRESERVING RANGE QUERIES
IN SENSOR NETWORKS
![Page 2: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/2.jpg)
ABSTRACT• two-tiered sensor networks• benefits of power and storage saving
for sensors as well as the efficiency of query processing
• Attackers attracted on storage nodes• SafeQ also allows a sink to detect
compromised storage nodes• To preserve integrity and privacy,
SafeQ• propose two schemes—one using
Merkle hash trees and another using a new data structure called neighborhood chains
• To reduce communication cost we use bloom filters
![Page 3: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/3.jpg)
EXISTING SYSTEM
Existing Wireless sensor networks once sensor nodes have been deployed, there will be minimal manual intervention and monitoring. But, when nodes are deployed in a hostile environment and there is no manual monitoring.
DRAWBACKS
• First, the attacker may obtain sensitive data that has been, or will be, stored in the storage node.
• Second, the compromised storage node may return forged data for a query.
• Third, this storage node may not include all data items that satisfy the query.
![Page 4: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/4.jpg)
PROPOSED SYSTEM
To preserve the privacy and integrity of range queries in sensor networks
uses the bucket-partitioning for database privacy. The basic idea is to divide the domain of data values into
multiple buckets. SafeQ also allows a sink to detect compromised storage nodes
when they misbehave. The sink is the point of contact for users of the sensor
network.
![Page 5: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/5.jpg)
REQUIREMENTS
Software Requirements:• O S : Windows XP or
more
• Technology :JAVA, Swing
• Database : MS- Access
Hardware Requirements:• Processor : Pentium IV
• Hard Disk : 40 GB.
• RAM :256 Mb.
![Page 6: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/6.jpg)
MODULES
• SafeQ• Integrity• Privacy• Range Queries• Sink• Storage Node
![Page 7: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/7.jpg)
SAFEQ
• SafeQ is a protocol that prevents attackers from gaining information from both sensor collected data and sink issued queries.
• SafeQ also allows a sink to detect compromised storage nodes when they misbehave.
• To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values.
![Page 8: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/8.jpg)
INTEGRITY
The sink needs to detect whether a query result from a storage node includes forged data items or does not include all the data that satisfy the query.
There are two key challenges in solving the privacyand integrity-preserving range query problem.
First, a storage node needs to correctly process encoded queries over encoded data without knowing their actual values.
Second, a sink needs to verify that the result of a query contains all the data items that satisfy the query and does not contain any forged data.
![Page 9: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/9.jpg)
PRIVACY
To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their actual values.
A compromised storage node cannot gain information from sensor collected data and sink issued queries
A storage node can perform query processing
![Page 10: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/10.jpg)
RANGE QURIES
The queries from the sink are range queries. A range query “is a common database operation finding all the data items collected at time-slot in the range”.
Note that the queries in most sensor network applications can be easily modelled as range queries.
![Page 11: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/11.jpg)
SINK
The sink is the point of contact for users of the sensor network.
Each time the sink receives a question from a user, it first translates the question into multiple queries and then disseminates the queries to the corresponding storage nodes
The sink unifies the query results from multiple storage nodes into the final answer and sends it back to the user.
Sink can detect compromised storage nodes when they misbehave.
![Page 12: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/12.jpg)
STORAGE NODE
Storage nodes are powerful wireless devices that are equipped with much more storage capacity and computing power than sensors.
The storage node collects all data from the sensor nodes. The storage node can’t view the actual value of sensor node
data. If the storage node trying to view the sensor node data, sink
detect misbehave of storage node.
![Page 13: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/13.jpg)
SYSTEM DESIGN
UML DIAGRAMS
![Page 14: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/14.jpg)
DATAFLOW DIAGRAM
![Page 15: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/15.jpg)
DATAFLOW DIAGRAM
SINK
View Available File
View Misbehavior Details
End Process
View File Details
Sink
Send File Request
Receive File
![Page 16: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/16.jpg)
USECASE DIAGRAM
Send File
Storage node
Sink
View File Name
View File Datails
View File Details
Send Query Request
Response To Request
Sensor
View File Name
Receive File
View Misbehavior Details
![Page 17: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/17.jpg)
CLASS DIAGRAM
Sensor Node
Send File
Sensor node process()
Sink
View File NameView File DetailsView Misbehavaior DetailsReceive File
Sink Process()
Storage Node
Receive FileView File NameView File Details
Storage node process()
s
![Page 18: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/18.jpg)
SEQUENCE DIAGRAM
Click icon to add pictureSENSOR NODE
SINK
DATA BASE
STORAGE NODE
SEND FILE
View File Details
ViewMisbehavior Details
View Available File
Send Query Request
Receive File
![Page 19: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/19.jpg)
ACTIVITY DIAGRAM
Click icon to add picture
Send Files
View Files
Receive Files
Sink
Start
End Process
View File Details
Sensor Node
Storage Node
Receive Files
View File Names
View File Details
Response to Sink Request
View Misbehavior Details
Send Query Request
![Page 20: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/20.jpg)
SCREEN SHOTS
![Page 21: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/21.jpg)
Sensor node sends file
![Page 22: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/22.jpg)
Negative acknowledgement
![Page 23: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/23.jpg)
False Positive
![Page 24: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/24.jpg)
File stores in Storage Node
![Page 25: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/25.jpg)
Sink
![Page 26: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/26.jpg)
View File Details
![Page 27: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/27.jpg)
Receive File
![Page 28: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/28.jpg)
Authentication to View
![Page 29: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/29.jpg)
Authentication Valid
![Page 30: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/30.jpg)
Authentication Invalid
![Page 31: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/31.jpg)
CONCLUSION
We make three key contributions in this paper.SafeQ significantly strengthens the security of two-tiered
sensor networks.We used Merkle Hash trees and neighbourhood chain to
preserve integritywe propose an optimization technique using Bloom filters to
significantly reduce the communication cost between sensors and storage nodes.
we propose a solution to adapt SafeQ for event-driven sensor networks.
![Page 32: Privacy and integrity-preserving range queries](https://reader033.fdocuments.in/reader033/viewer/2022052905/55865556d8b42a6d128b46fb/html5/thumbnails/32.jpg)
Any Queries????????