Privacy- and Integrity-Preserving Range Queries
In Sensor Networks
SCETW B.E-IV/IV-2nd Sem 1
BYB.C.SANGEETHA
R.No-160609737031
TABLE CONTENTS
1.Abstract
2.Introduction• Existing system
• Proposed system
• Modules
3.System Requirements• Software Requirements
• Hardware Requirements
SCETW B.E-IV/IV-2nd Sem 2
TABLE CONTENTS
4.Design Process • Process flow for Privacy- and Integrity-Preserving
Range Queries In Sensor Networks
• UML diagrams for Privacy- and Integrity-Preserving Range Queries In Sensor Networks
5.Screen shots
6.Conclusion
7.BibilographySCETW B.E-IV/IV-2nd Sem 3
Abstract
SCETW B.E-IV/IV-2nd Sem 4
• In wireless sensor security is the main concern to identify the range queries we are trying to implement privacy and integrity of the range queries.
• To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values.
IntroductionHere, storage nodes gather data from nearby
sensors(nodes) “Serve as an intermediate node
between Sensors and sink” and answer queries
from the sink of the network.
SCETW B.E-IV/IV-2nd Sem 5
Storage nodes has the 3 main advantages to
sensor networks :
• Save power
• Memory-limited
• More efficient
Definitions:
• Sensor node: It may contain data and files
• Storage Area: Where the files are stored.
• Sink: It’s a functionality. Checks the IP and batch code.
SCETW B.E-IV/IV-2nd Sem 6
Existing system
• There will be minimal manual intervention and monitoring.
• There is no manual monitoring.
SCETW B.E-IV/IV-2nd Sem 7
Proposed system
To preserve the privacy and integrity of range
queries in sensor networks it uses the bucket
partitioning for database privacy.
SCETW B.E-IV/IV-2nd Sem 8
SCETW B.E-IV/IV-2nd Sem 9
Modules
• SafeQ
• Integrity
• Privacy
• Range Queries
• Sink
• Storage Node
SCETW B.E-IV/IV-2nd Sem 10
SCETW B.E-IV/IV-II SEM 10
System Requirements
Software requirements:-Operating System :Windows XP Front End :JAVA(Swings)Database :Microsoft Access Database Connectivity :JDBC.
Hardware requirements:-Processor - Pentium –IV 2.5 GHZ RAM - 512 MBHard Disk - 80 GB
Process Flow
SCETW B.E-IV/IV-2nd Sem 11
1) The files are sent from Sensor Node1 to Storage Node.
2) The files are sent from sent from Sensor Node2 to Storage Node
3) The files are sent sent from Sensor Node3 to Storage Node
4) File received at Sink
5) Sink views the File name, Batch ID.
SCETW B.E-IV/IV-2nd Sem 12
ER-Diagram for Privacy- and Integrity-Preserving Range Queries In Sensor Networks
Class diagram for Privacy- and Integrity-Preserving Range Queries In Sensor Networks
SCETW B.E-IV/IV-2nd Sem 13
13
Sequence diagram for Privacy- and Integrity-Preserving Range Queries In Sensor Networks
SCETW B.E-IV/IV-2nd Sem 14
Sensor node Storage node Sink
Data base
1 : View avaialable file()2 : Send file()
3 : View file details()
4 : View misbehavior details()
5 : Send request()
6 : Receive file()
Use case diagram for Privacy and integrity preserving range queries in Sensor networks
SCETW B.E-IV/IV-2nd Sem 15
Sensor
Storage node
Sink
Send file
View file name
View File details
View filename
View filedetails
View misbehavior details
Send query request
Response to Request
Receive file
Screen Shot for storage node
SCETW B.E-IV/IV-2nd Sem 16
Screen shot for Sensor node 1
SCETW B.E-IV/IV-2nd Sem 17
Screen shot for Sensor node 2
SCETW B.E-IV/IV-2nd Sem 18
Screen shot for Sensor node 3
SCETW B.E-IV/IV-2nd Sem 19
Conclusion
1)SafeQ:efficient protocol for handling range
queries in two-tiered sensor networks in a
privacy- and integrity- preserving.
2)Bucket partioning: To preserve privacy and range queries in sensor networks.
2)Optimization technique : Using Bloom filters to significantly reduce the communication cost between sensors and storage nodes.
SCETW B.E-IV/IV-2nd Sem 20
References• [1] F. Chen and A. X. Liu, “SafeQ: Secure and efficient query processing• in sensor networks,” in Proc. IEEE INFOCOM, 2010, pp. 1–9.
• [2] S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin, and F. Yu, “Data-centric storage in sensornets with GHT, a geographic hash table,” Mobile Netw. Appl., vol. 8, no. 4, pp. 427–442, 2003.
• [3] P. Desnoyers, D. Ganesan, H. Li, and P. Shenoy, “Presto:A predictive• storage architecture for sensor networks,” in Proc. HotOS, 2005, p. 23.
• [4] D. Zeinalipour-Yazti, S. Lin, V. Kalogeraki, D. Gunopulos, and W. A. Najjar, “Microhash: An efficient index structure for flash-based sensor
devices,” in Proc. FAST, 2005, pp. 31–44.
SCETW B.E IV/IV 2nd Sem 21
QUESTIONS????
SCETW B.E-IV/IV-II SEM 22
Top Related