PRIVACY AND INTEGRITY PRESERVING TOP K QUERY PROCESSING FOR TWO TIERED SENSOR NETWORK

1croreprojects@gmail.com

ABSTRACT

 

In two-tier wireless sensor networks, resource-rich storage nodes at the upper tier collect sensing data from resource poor sensor nodes at the low tier, and then answer queries from

the user. Sensor nodes perform sensing task and submit sensing data in one time-slot to the nearest storage node while storage nodes answer and process the query from the network owner.

However the storage nodes confront serious security concerns. Storage nodes may be compromised and leak the sensitive data as well as returning fake query result. Therefore, it is important to protect the privacy and verify the query results. We define and solve the practical and challenging problem of privacy preserving and verifiable top-k query processing performed on the time-slot sensing data set in two-tier sensor network, and establish a set of privacy and correctness requirements for such a secure top-k query scheme to become a reality. We propose the basic PriSecTopk scheme by using order-preserving encryption, and then improve it step by step to achieve various privacy  requirements as well as the correctness requirements in three levels of threat models.

 

CLick Here:-  Ieee 2018 Virtual Reality Projects

 

EXISTING SYSTEM

To protect the privacy and integrity of range query in two-tier sensor network which utilized the idea of bucket partition to preserve privacy? However, the inherited limitation of bucket partition technique allows compromised storage nodes to achieve the estimation on the actual value of data items and the query request. Extending the work from one-dimensional data to multidimensional data optimized the scheme to reduce the communication consumption between the sensor nodes and the storage node. Nevertheless, both of the schemes introduce great energy consumption and storage consumption when the data dimension increases. To solve this problem, SafeQ was proposed in consideration of neighborhood chains that allow a sink to verify the correctness of data items. With regards to the top-k query, Zhang et al: proposed VFTop-k scheme to verify the correctness of the query result through adding the order-related verification information in the sensing data.

DISADVANTAGES

The storage nodes, which act as a middle tier between the sensors and the sink, could be compromised and allow attackers to learn sensitive data and manipulate query results  Prior schemes on secure query processing are weak, they reveal information

Reveals the information using Prior schemes Attackers collects the data

 

PROPOSED SYSTEM

We explore the problem of top-k query on time slot data set in two-tier wireless sensor network, and establish a set of privacy and correctness requirements for such a secure top-k scheme to become practical. We propose three PriSec Top k schemes meeting different privacy and correctness requirements in consideration of three levels of threat models. Thorough analysis investigating privacy, detection rate and efficiency guarantee of proposed scheme is given, and experiments on the real-world dataset further show the efficiency of proposed schemes. We propose a privacy preserving and query-verifiable top-k query mechanism on the time slot data set in two-tier wireless sensor network while achieving energy efficiency. Among various top-k query semantics, we choose the single score function model that each data can be scored by the scoring function and ranked based on its score.

 

ADVANTAGES

It protects the privacy of sensor data and the integrity of query results

Privacy: To prevent the storage node from learning additional information over the sensing data and query request, and to meet the data privacy, query privacy and result privacy.

Authenticity/Completeness: All data in query results are indeed generated by the lower-tier sensor nodes and the query result indeed contain the top k sensing data items as the top-k query requests.

Efficiency: Above goals on privacy and authenticity/completeness should be achieved with low communication and computation overheads.

 

SPECIFICATION:

HARDWARE SPECIFICATION:

 

  System : Pentium IV 2.4 GHz.

  Hard Disk                : 40 GB.

  Floppy Drive : 1.44 Mb.

  Monitor         : 15 VGA Colour.

  Mouse : Logitech.

  Ram : 2 Gb.

 

 

SOFTWARE SPECIFICATION:

 

   Operating system : Windows XP/7.

   Coding Language : ASP.net, C#.net

   Tool : Visual Studio 2010

   Database : SQL SERVER 2008

 

REFERENCES

 

[1] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless Sensor Networks: A Survey. Computer Networks, vol.38, no.4, March 2002

[2] W. Zhang, H. Song, S. Zhu, and G. Cao. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. in MobiHoc05, pp. 378C389. ACM,2005

[3] M. Shao, S. Zhu,W. Zhang, and G. Cao.pDCS: Security and privacy support for data-centric sensor networks. in INFOCOM07, pp. 1298C1306. IEEE, 2007

[4] S. Ratnasamy, B. Karp, S. Shenker. Data-centric storage in sensornets with GHT, a geographic hash table. Mobile Networks and Applications, 2003,8(4):427-442

[5] Willow Technologies: SPB400-STARGATE GATEWAY. http://www.willow.co.uk/html/spb400- stargate gateway.html



Leave a comment

*

*

*