privacy and integrity presrving range queries in sensor networks final ppt

22
Privacy- and Integrity- Preserving Range Queries In Sensor Networks SCETW B.E-IV/IV-2nd Sem 1 BY B.C.SANGEETHA R.No-160609737031

Upload: san-geetha-b-c

Post on 27-Sep-2015

218 views

Category:

Documents


0 download

DESCRIPTION

GGDFGDFGD

TRANSCRIPT

  • Privacy- and Integrity-Preserving Range QueriesIn Sensor NetworksSCETW B.E-IV/IV-2nd Sem*BYB.C.SANGEETHAR.No-160609737031

    SCETW B.E-IV/IV-2nd Sem

  • TABLE CONTENTS1.Abstract2.IntroductionExisting systemProposed systemModules3.System RequirementsSoftware RequirementsHardware Requirements

    SCETW B.E-IV/IV-2nd Sem*

    SCETW B.E-IV/IV-2nd Sem

  • TABLE CONTENTS4.Design Process Process flow for Privacy- and Integrity-Preserving Range Queries In Sensor NetworksUML diagrams for Privacy- and Integrity-Preserving Range Queries In Sensor Networks5.Screen shots6.Conclusion7.Bibilography

    SCETW B.E-IV/IV-2nd Sem*

    SCETW B.E-IV/IV-2nd Sem

  • AbstractSCETW B.E-IV/IV-2nd Sem*In wireless sensor security is the main concern to identify the range queries we are trying to implement privacy and integrity of the range queries. To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values.

    SCETW B.E-IV/IV-2nd Sem

  • IntroductionHere, storage nodes gather data from nearbysensors(nodes) Serve as an intermediate node between Sensors and sink and answer queries from the sink of the network.

    SCETW B.E-IV/IV-2nd Sem*

    SCETW B.E-IV/IV-2nd Sem

  • Storage nodes has the 3 main advantages tosensor networks :Save powerMemory-limitedMore efficientDefinitions:Sensor node: It may contain data and filesStorage Area: Where the files are stored.Sink: Its a functionality. Checks the IP and batch code. SCETW B.E-IV/IV-2nd Sem*

    SCETW B.E-IV/IV-2nd Sem

  • Existing systemThere will be minimal manual intervention and monitoring.There is no manual monitoring.SCETW B.E-IV/IV-2nd Sem*

    SCETW B.E-IV/IV-2nd Sem

  • Proposed systemTo preserve the privacy and integrity of rangequeries in sensor networks it uses the bucketpartitioning for database privacy.

    SCETW B.E-IV/IV-2nd Sem*

    SCETW B.E-IV/IV-2nd Sem

  • SCETW B.E-IV/IV-2nd Sem*ModulesSafeQIntegrityPrivacyRange QueriesSinkStorage Node

    SCETW B.E-IV/IV-2nd Sem

  • SCETW B.E-IV/IV-2nd Sem*SCETW B.E-IV/IV-II SEM *System Requirements

    Software requirements:-Operating System :Windows XP Front End :JAVA(Swings)Database :Microsoft Access Database Connectivity :JDBC.

    Hardware requirements:-Processor - Pentium IV 2.5 GHZRAM - 512 MBHard Disk - 80 GB

    SCETW B.E-IV/IV-2nd Sem

  • Process FlowSCETW B.E-IV/IV-2nd Sem*1) The files are sent from Sensor Node1 to Storage Node.2) The files are sent from sent from Sensor Node2 to Storage Node3) The files are sent sent from Sensor Node3 to Storage Node4) File received at Sink5) Sink views the File name, Batch ID.

    SCETW B.E-IV/IV-2nd Sem

  • SCETW B.E-IV/IV-2nd Sem*ER-Diagram for Privacy- and Integrity-Preserving Range Queries In Sensor Networks

    SCETW B.E-IV/IV-2nd Sem

  • Class diagram for Privacy- and Integrity-Preserving Range Queries In Sensor NetworksSCETW B.E-IV/IV-2nd Sem**

    SCETW B.E-IV/IV-2nd Sem

  • Sequence diagram for Privacy- and Integrity-Preserving Range Queries In Sensor NetworksSCETW B.E-IV/IV-2nd Sem*

    SCETW B.E-IV/IV-2nd Sem

  • Use case diagram for Privacy and integrity preserving range queries in Sensor networksSCETW B.E-IV/IV-2nd Sem*

    SCETW B.E-IV/IV-2nd Sem

  • Screen Shot for storage nodeSCETW B.E-IV/IV-2nd Sem*

    SCETW B.E-IV/IV-2nd Sem

  • Screen shot for Sensor node 1SCETW B.E-IV/IV-2nd Sem*

    SCETW B.E-IV/IV-2nd Sem

  • Screen shot for Sensor node 2SCETW B.E-IV/IV-2nd Sem*

    SCETW B.E-IV/IV-2nd Sem

  • Screen shot for Sensor node 3SCETW B.E-IV/IV-2nd Sem*

    SCETW B.E-IV/IV-2nd Sem

  • Conclusion1)SafeQ:efficient protocol for handling range queries in two-tiered sensor networks in a privacy- and integrity- preserving.2)Bucket partioning: To preserve privacy and range queries in sensor networks.2)Optimization technique : Using Bloom filters to significantly reduce the communication cost between sensors and storage nodes.

    SCETW B.E-IV/IV-2nd Sem*

    SCETW B.E-IV/IV-2nd Sem

  • References

    [1] F. Chen and A. X. Liu, SafeQ: Secure and efficient query processingin sensor networks, in Proc. IEEE INFOCOM, 2010, pp. 19.

    [2] S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin, and F. Yu, Data-centric storage in sensornets with GHT, a geographic hash table, Mobile Netw. Appl., vol. 8, no. 4, pp. 427442, 2003.

    [3] P. Desnoyers, D. Ganesan, H. Li, and P. Shenoy, Presto:A predictivestorage architecture for sensor networks, in Proc. HotOS, 2005, p. 23.

    [4] D. Zeinalipour-Yazti, S. Lin, V. Kalogeraki, D. Gunopulos, and W. A. Najjar, Microhash: An efficient index structure for flash-based sensor devices, in Proc. FAST, 2005, pp. 3144.

    SCETW B.E IV/IV 2nd Sem*

    SCETW B.E IV/IV 2nd Sem

  • QUESTIONS????SCETW B.E-IV/IV-II SEM *

    SCETW B.E-IV/IV-II SEM

    **