22
Privacy- and Integrity- Preserving Range Queries In Sensor Networks SCETW B.E-IV/IV-2nd Sem 1 BY B.C.SANGEETHA R.No-160609737031

Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

Embed Size (px)

Citation preview

Page 1: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

Privacy- and Integrity-Preserving Range Queries

In Sensor Networks

SCETW B.E-IV/IV-2nd Sem 1

BYB.C.SANGEETHA

R.No-160609737031

Page 2: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

TABLE CONTENTS

1.Abstract

2.Introduction• Existing system

• Proposed system

• Modules

3.System Requirements• Software Requirements

• Hardware Requirements

SCETW B.E-IV/IV-2nd Sem 2

Page 3: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

TABLE CONTENTS

4.Design Process • Process flow for Privacy- and Integrity-Preserving

Range Queries In Sensor Networks

• UML diagrams for Privacy- and Integrity-Preserving Range Queries In Sensor Networks

5.Screen shots

6.Conclusion

7.BibilographySCETW B.E-IV/IV-2nd Sem 3

Page 4: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

Abstract

SCETW B.E-IV/IV-2nd Sem 4

• In wireless sensor security is the main concern to identify the range queries we are trying to implement privacy and integrity of the range queries.

• To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values.

Page 5: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

IntroductionHere, storage nodes gather data from nearby

sensors(nodes) “Serve as an intermediate node

between Sensors and sink” and answer queries

from the sink of the network.

SCETW B.E-IV/IV-2nd Sem 5

Page 6: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

Storage nodes has the 3 main advantages to

sensor networks :

• Save power

• Memory-limited

• More efficient

Definitions:

• Sensor node: It may contain data and files

• Storage Area: Where the files are stored.

• Sink: It’s a functionality. Checks the IP and batch code.

SCETW B.E-IV/IV-2nd Sem 6

Page 7: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

Existing system

• There will be minimal manual intervention and monitoring.

• There is no manual monitoring.

SCETW B.E-IV/IV-2nd Sem 7

Page 8: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

Proposed system

To preserve the privacy and integrity of range

queries in sensor networks it uses the bucket

partitioning for database privacy.

SCETW B.E-IV/IV-2nd Sem 8

Page 9: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

SCETW B.E-IV/IV-2nd Sem 9

Modules

• SafeQ

• Integrity

• Privacy

• Range Queries

• Sink

• Storage Node

Page 10: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

SCETW B.E-IV/IV-2nd Sem 10

SCETW B.E-IV/IV-II SEM 10

System Requirements

Software requirements:-Operating System :Windows XP Front End :JAVA(Swings)Database :Microsoft Access Database Connectivity :JDBC.

Hardware requirements:-Processor - Pentium –IV 2.5 GHZ RAM - 512 MBHard Disk - 80 GB

Page 11: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

Process Flow

SCETW B.E-IV/IV-2nd Sem 11

1) The files are sent from Sensor Node1 to Storage Node.

2) The files are sent from sent from Sensor Node2 to Storage Node

3) The files are sent sent from Sensor Node3 to Storage Node

4) File received at Sink

5) Sink views the File name, Batch ID.

Page 12: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

SCETW B.E-IV/IV-2nd Sem 12

ER-Diagram for Privacy- and Integrity-Preserving Range Queries In Sensor Networks

Page 13: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

Class diagram for Privacy- and Integrity-Preserving Range Queries In Sensor Networks

SCETW B.E-IV/IV-2nd Sem 13

13

Page 14: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

Sequence diagram for Privacy- and Integrity-Preserving Range Queries In Sensor Networks

SCETW B.E-IV/IV-2nd Sem 14

Sensor node Storage node Sink

Data base

1 : View avaialable file()2 : Send file()

3 : View file details()

4 : View misbehavior details()

5 : Send request()

6 : Receive file()

Page 15: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

Use case diagram for Privacy and integrity preserving range queries in Sensor networks

SCETW B.E-IV/IV-2nd Sem 15

Sensor

Storage node

Sink

Send file

View file name

View File details

View filename

View filedetails

View misbehavior details

Send query request

Response to Request

Receive file

Page 16: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

Screen Shot for storage node

SCETW B.E-IV/IV-2nd Sem 16

Page 17: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

Screen shot for Sensor node 1

SCETW B.E-IV/IV-2nd Sem 17

Page 18: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

Screen shot for Sensor node 2

SCETW B.E-IV/IV-2nd Sem 18

Page 19: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

Screen shot for Sensor node 3

SCETW B.E-IV/IV-2nd Sem 19

Page 20: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

Conclusion

1)SafeQ:efficient protocol for handling range

queries in two-tiered sensor networks in a

privacy- and integrity- preserving.

2)Bucket partioning: To preserve privacy and range queries in sensor networks.

2)Optimization technique : Using Bloom filters to significantly reduce the communication cost between sensors and storage nodes.

SCETW B.E-IV/IV-2nd Sem 20

Page 21: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

References• [1] F. Chen and A. X. Liu, “SafeQ: Secure and efficient query processing• in sensor networks,” in Proc. IEEE INFOCOM, 2010, pp. 1–9.

• [2] S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin, and F. Yu, “Data-centric storage in sensornets with GHT, a geographic hash table,” Mobile Netw. Appl., vol. 8, no. 4, pp. 427–442, 2003.

• [3] P. Desnoyers, D. Ganesan, H. Li, and P. Shenoy, “Presto:A predictive• storage architecture for sensor networks,” in Proc. HotOS, 2005, p. 23.

• [4] D. Zeinalipour-Yazti, S. Lin, V. Kalogeraki, D. Gunopulos, and W. A. Najjar, “Microhash: An efficient index structure for flash-based sensor

devices,” in Proc. FAST, 2005, pp. 31–44.

SCETW B.E IV/IV 2nd Sem 21

Page 22: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT

QUESTIONS????

SCETW B.E-IV/IV-II SEM 22