privacy and integrity presrving range queries in sensor networks ppt
TRANSCRIPT
![Page 1: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/1.jpg)
Privacy- and Integrity-Preserving Range Queries
In Sensor Networks
SCETW B.E-IV/IV-2nd Sem 1
BYB.C.SANGEETHA
R.No-160609737031
![Page 2: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/2.jpg)
TABLE CONTENTS
1.Abstract
2.Introduction• Existing system
• Proposed system
• Modules
3.System Requirements• Software Requirements
• Hardware Requirements
SCETW B.E-IV/IV-2nd Sem 2
![Page 3: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/3.jpg)
TABLE CONTENTS
4.Design Process • Process flow for Privacy- and Integrity-Preserving
Range Queries In Sensor Networks
• UML diagrams for Privacy- and Integrity-Preserving Range Queries In Sensor Networks
5.Screen shots
6.Conclusion
7.BibilographySCETW B.E-IV/IV-2nd Sem 3
![Page 4: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/4.jpg)
Abstract
SCETW B.E-IV/IV-2nd Sem 4
• In wireless sensor security is the main concern to identify the range queries we are trying to implement privacy and integrity of the range queries.
• To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values.
![Page 5: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/5.jpg)
IntroductionHere, storage nodes gather data from nearby
sensors(nodes) “Serve as an intermediate node
between Sensors and sink” and answer queries
from the sink of the network.
SCETW B.E-IV/IV-2nd Sem 5
![Page 6: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/6.jpg)
Storage nodes has the 3 main advantages to
sensor networks :
• Save power
• Memory-limited
• More efficient
Definitions:
• Sensor node: It may contain data and files
• Storage Area: Where the files are stored.
• Sink: It’s a functionality. Checks the IP and batch code.
SCETW B.E-IV/IV-2nd Sem 6
![Page 7: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/7.jpg)
Existing system
• There will be minimal manual intervention and monitoring.
• There is no manual monitoring.
SCETW B.E-IV/IV-2nd Sem 7
![Page 8: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/8.jpg)
Proposed system
To preserve the privacy and integrity of range
queries in sensor networks it uses the bucket
partitioning for database privacy.
SCETW B.E-IV/IV-2nd Sem 8
![Page 9: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/9.jpg)
SCETW B.E-IV/IV-2nd Sem 9
Modules
• SafeQ
• Integrity
• Privacy
• Range Queries
• Sink
• Storage Node
![Page 10: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/10.jpg)
SCETW B.E-IV/IV-2nd Sem 10
SCETW B.E-IV/IV-II SEM 10
System Requirements
Software requirements:-Operating System :Windows XP Front End :JAVA(Swings)Database :Microsoft Access Database Connectivity :JDBC.
Hardware requirements:-Processor - Pentium –IV 2.5 GHZ RAM - 512 MBHard Disk - 80 GB
![Page 11: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/11.jpg)
Process Flow
SCETW B.E-IV/IV-2nd Sem 11
1) The files are sent from Sensor Node1 to Storage Node.
2) The files are sent from sent from Sensor Node2 to Storage Node
3) The files are sent sent from Sensor Node3 to Storage Node
4) File received at Sink
5) Sink views the File name, Batch ID.
![Page 12: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/12.jpg)
SCETW B.E-IV/IV-2nd Sem 12
ER-Diagram for Privacy- and Integrity-Preserving Range Queries In Sensor Networks
![Page 13: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/13.jpg)
Class diagram for Privacy- and Integrity-Preserving Range Queries In Sensor Networks
SCETW B.E-IV/IV-2nd Sem 13
13
![Page 14: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/14.jpg)
Sequence diagram for Privacy- and Integrity-Preserving Range Queries In Sensor Networks
SCETW B.E-IV/IV-2nd Sem 14
Sensor node Storage node Sink
Data base
1 : View avaialable file()2 : Send file()
3 : View file details()
4 : View misbehavior details()
5 : Send request()
6 : Receive file()
![Page 15: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/15.jpg)
Use case diagram for Privacy and integrity preserving range queries in Sensor networks
SCETW B.E-IV/IV-2nd Sem 15
Sensor
Storage node
Sink
Send file
View file name
View File details
View filename
View filedetails
View misbehavior details
Send query request
Response to Request
Receive file
![Page 16: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/16.jpg)
Screen Shot for storage node
SCETW B.E-IV/IV-2nd Sem 16
![Page 17: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/17.jpg)
Screen shot for Sensor node 1
SCETW B.E-IV/IV-2nd Sem 17
![Page 18: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/18.jpg)
Screen shot for Sensor node 2
SCETW B.E-IV/IV-2nd Sem 18
![Page 19: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/19.jpg)
Screen shot for Sensor node 3
SCETW B.E-IV/IV-2nd Sem 19
![Page 20: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/20.jpg)
Conclusion
1)SafeQ:efficient protocol for handling range
queries in two-tiered sensor networks in a
privacy- and integrity- preserving.
2)Bucket partioning: To preserve privacy and range queries in sensor networks.
2)Optimization technique : Using Bloom filters to significantly reduce the communication cost between sensors and storage nodes.
SCETW B.E-IV/IV-2nd Sem 20
![Page 21: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/21.jpg)
References• [1] F. Chen and A. X. Liu, “SafeQ: Secure and efficient query processing• in sensor networks,” in Proc. IEEE INFOCOM, 2010, pp. 1–9.
• [2] S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin, and F. Yu, “Data-centric storage in sensornets with GHT, a geographic hash table,” Mobile Netw. Appl., vol. 8, no. 4, pp. 427–442, 2003.
• [3] P. Desnoyers, D. Ganesan, H. Li, and P. Shenoy, “Presto:A predictive• storage architecture for sensor networks,” in Proc. HotOS, 2005, p. 23.
• [4] D. Zeinalipour-Yazti, S. Lin, V. Kalogeraki, D. Gunopulos, and W. A. Najjar, “Microhash: An efficient index structure for flash-based sensor
devices,” in Proc. FAST, 2005, pp. 31–44.
SCETW B.E IV/IV 2nd Sem 21
![Page 22: Privacy and Integrity Presrving Range Queries in Sensor Networks PPT](https://reader036.vdocuments.us/reader036/viewer/2022070301/545e1825b1af9f0e598b4647/html5/thumbnails/22.jpg)
QUESTIONS????
SCETW B.E-IV/IV-II SEM 22