SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1008
Private and Secured data Transmission and Analysis for Wireless
Ad-hoc Network
Shrikant Kadam1, Pramod Lad2, Devendra Vavekar3
1,2,3 Students, DEPT. of Computer Engineering ISB&M School of Technology, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - A lot of work has been done to secure sensitive
data. The existing solutions can protect the organizational
data during transmission, but cannot stop the inside attack
where the administrator of the organizational database
reveals the sensitive data. We propose a practical approachto
prevent the inside attack by using multiple data servers to
store data by securely distributing the dataonto multiple data
servers. These contributions are essentially different from the
solution, which relies on the Sharemind system for data
analysis without considering the collusion of data servers to
preserve the privacy of the organizational data in statistical
analysis .We propose some new privacy-preserving statistical
analysis protocols on the basis of the Paillier and ElGamal
cryptosystems. These protocols allow the user to perform
statistical analysis on the datawithoutcompromisingthedata
privacy.
The development of Privacy Protection for organizational
database was motivated by business applications; today such
networks are used in many organizational, educational and
consumer applications, such as business process monitoring
and control, and so on.What has received less attention,
however, is the critical privacy concern on information being
collected, transmitted, andanalyzed. Suchprivateinformation
may include payload data transmitted throughthenetworkto
a centralized data processing server.
To keep the privacy of the user’s data, we proposedanewdata
collection protocol which splits the user’s data into three
numbers and stores them in threedataservers, respectively. As
long as one data server is not compromised, the privacy of the
user’s data can be preserved. For the legitimate user e.g.
receiver to access the user’s data, we proposed an access
control protocol, where three data servers cooperate to
provide the user with the user’s data, but do not know what it
is
Key Words: : Encryption, Cyphertext, and Pillier
cryptography
1. INTRODUCTION
The development of Privacy Protection for organizational
database wasmotivatedby businessapplications;todaysuch
networks are used in many organizational, educational and
consumer applications, such as businessprocessmonitoring
and control, and so on.What has received less attention,
however, is the critical privacyconcernoninformation being
collected, transmitted, and analyzed. Such private
information may include payload data transmitted through
the network to a centralized data processing server.
Our objective is: Protect the user data during transmission
.Reliable data transmission, node mobility support and fast
event detection. Timelydeliveryofdata,powermanagement,
node computation and middleware.
Stop the inside attack where the administrator of the user
database reveals the sensitive information of users.The
existing solutions can protect the data during transmission,
but cannot stop the inside attack where the administratorof
the organizational database reveals the sensitive user data.
In this, we propose a practical approachtopreventtheinside
attack by using multiple data servers to store data. Themain
scopes is securely distributing the data in multiple data
servers and employing the Paillier and ElGamal
cryptosystems to perform statistical analysis on the data
without compromising theinformationprivacy.Thesolution
can protect the data privacy as long as the number of the
compromised data servers is at most one. The data privacy
can be preserved as long as at least one of three data servers
is not compromised. Even if two data servers are
compromised but one data server is not compromised, our
solution is still secure.
2. SYSTEM ARCHITECHTURE
Like most of the application with wireless sensor
network,our architecture has four system as follows
A wireless ad-hoc network which sense the user data and
transmit user data to user database system
A user data access control system which is used by the user
To access the user data and to monitor it.
User data analysis system which is used by the user to query
the user database system and analyze the user data
statically.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1009
System Architecture
3. PROPOSED ALGORITHM
Paillier Public-Key Cryptosystem: It is composed of key
generation, encryptionanddecryptionalgorithms asfollows.
Step 1: Key generation The key generation algorithm
works as follows.
Choose two large prime numbers p and q randomly and
independently of each other such that
gcd(pq,(p-1)(q-1) )=1
Compute
N=pq,=lcm(p-1,q-1)
Where lcm stands for the least common multiple.
Select random integer g where and ensure N divides the
order of g by checking the existenceofthefollowingmodular
multiplicative inverse:
where function L is dined as
L(u)=(u-1)/N
Note that the notation a/b does not denote the modular
multiplication of a times the multiplicative inverse of b but
rather the quotient of divided by b
The public (encryption) key pk is (N,
The private (decryption) key sk is (,).
If using p,q of equivalent length, one can simply choose
where N = pq and(N)=(P-1)(q-1)
Step 2:Encryption:.
Plaintext data convert into cipertext form
Step 3: Decryption:
Let c be the ciphertext to decrypt, where the ciphertext
step 4: Homomorphic Properties A notable feature of the
Paillier cryp tosystem is its homomorphic properties. Given
two ciphertexts The product of a ciphertext with a plaintext
raising g will decrypt to the sum of the corresponding
plaintexts,An encrypted plaintext raised to a constant k will
decrypt to the product of the plaintext and the
constant,However, given the Paillier encryptions of two
messages, there is no known way to compute an encryption
of the product of these messages without knowing the
private key
4. RELEVENT MATHEMATICS
Let W be the whole system which consist
W= IP, PRO, OP
Where. IP is the input of the system.
A) IP= P, SD, SN, PD, U
1. P is the number of users in the system.
2. SN is the set of number of sensing nodes in the
system.
3. SD is the sensing data sensed from the
information SD.
4. PD is the users database system which consistsof
number databases.
5. U is the set of number of user in the systems that
are accessing the data from user database server.
B) PRO is the procedure of our proposed system:
Step 1: At first the wireless medical network which
senses the patient’s body and transmits the users
data to a users database system.
Step 2: A user’s database system which stores the
users data from distributed and provide squaring
services to users.
Step 3: A users data access control system which
issued by the user (e.g., physician) to access the
users data and monitor the users.
C) OP is the output of the system: OP is the output
of the system
The system provides the privacy to the users
sensible data available on the users database
system in the sense of inside attacks.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1010
5. CONCLUSIONS
We have investigated the security and privacy issues in the
wireless network data collection storage and queries and
presented a complete solution for privacy-preserving
wireless network. To secure the communication between
user and data servers.
To keep the privacy of the user’s data, we proposed a new
data collection protocol which splits the user’s data into
three numbers and stores them in three data servers,
respectively. As long as one data server is not compromised,
the privacy of the user’s data can be preserved. For the
legitimate user e.g. receiver to access the user’s data, we
proposed an access control protocol, where three data
servers cooperate to provide the user with the user’s data,
but do not know what it is.
REFERENCES
[1] Xun Yi, AthmanBouguettaya, DimitriosGeorgakopoulos,
Andy Song and Jan Willemson “Privacy Protection for
Wireless Medical Sensor Data”, in proc. IEEE
Transactions on Dependable and Secure Computing,
2015.
[2] In Proc. ESORICS’08, pages 192-206D. Bogdanov, S.
LaurSharemind: a Frameworkfor Fast Privacy-
Preserving Computations
[3] Wood, A.; Virone, G.; Doan, T.; Cao, Q.; Selavo, L.; Wu, Y.;
Fang, L.; He, Z.; Lin, S.; Stankovic, J. ALARM-NET:
Wireless Sensor Networks for Assisted-Living and
Residential Monitoring; Technical Report CS-2006-01;
Department of Computer Science, UniversityofVirginia:
Charlottesville, VA, USA, 2006.
[4] Cryptography And Network Security from William
Stallings. Reference 4.

More Related Content

PDF
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
PDF
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
PDF
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
PDF
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
PDF
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
PDF
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
PDF
Systematic Review Automation in Cyber Security
PDF
IRJET- Securing Cloud Data Under Key Exposure
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
Systematic Review Automation in Cyber Security
IRJET- Securing Cloud Data Under Key Exposure

What's hot (20)

PDF
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
PDF
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
PDF
IRJET- Secure Data Protection in Cloud Computing
PDF
IRJET- Efficient Data Access Control for Multi-authority Cloud Storage
PDF
Prompt Detection of Transformed Data Brench
PDF
IRJET - Virtual Data Auditing at Overcast Environment
PDF
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
PDF
IRJET- Adaptable Wildcard Searchable Encryption System
PDF
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
PDF
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
PDF
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
PDF
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
PDF
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
PDF
A Study of Location and Date-Time Encryption of Cloud using Android Application
PDF
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
PDF
Enhanced Security Through Token
PDF
Cloud Auditing With Zero Knowledge Privacy
PDF
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
PDF
Paper id 27201446
PDF
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
IRJET- Secure Data Protection in Cloud Computing
IRJET- Efficient Data Access Control for Multi-authority Cloud Storage
Prompt Detection of Transformed Data Brench
IRJET - Virtual Data Auditing at Overcast Environment
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
A Study of Location and Date-Time Encryption of Cloud using Android Application
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Enhanced Security Through Token
Cloud Auditing With Zero Knowledge Privacy
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
Paper id 27201446
Ad

Similar to Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network (20)

PDF
Target Unncryption Case Study
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
PDF
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
PDF
Iaetsd secured and efficient data scheduling of intermediate data sets
PDF
Classification of secure encrypted relationaldata in cloud computing
PPT
Privacy preserving queries on encrypted data
PDF
Data attribute security and privacy in Collaborative distributed database Pub...
PPT
Private datawarehouse queries
PDF
TIFS.2018.2833050.pdf
PDF
1670 1673
PDF
1670 1673
PDF
REU Group 2 - Paper
PDF
Privacy preserving
PDF
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
DOCX
Farheen
PDF
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
PDF
Privacy preserving ciphertext multi-sharing control for big data storage
PPTX
FINAL REVIEW.pptx
PDF
Nearest Prime Cipher for Data Confidentiality and Integrity
PDF
A Survey on provide security to wireless medical sensor data
Target Unncryption Case Study
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
Iaetsd secured and efficient data scheduling of intermediate data sets
Classification of secure encrypted relationaldata in cloud computing
Privacy preserving queries on encrypted data
Data attribute security and privacy in Collaborative distributed database Pub...
Private datawarehouse queries
TIFS.2018.2833050.pdf
1670 1673
1670 1673
REU Group 2 - Paper
Privacy preserving
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
Farheen
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
Privacy preserving ciphertext multi-sharing control for big data storage
FINAL REVIEW.pptx
Nearest Prime Cipher for Data Confidentiality and Integrity
A Survey on provide security to wireless medical sensor data
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPTX
Geodesy 1.pptx...............................................
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPT
introduction to datamining and warehousing
PDF
737-MAX_SRG.pdf student reference guides
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Construction Project Organization Group 2.pptx
PDF
Well-logging-methods_new................
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
III.4.1.2_The_Space_Environment.p pdffdf
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
UNIT 4 Total Quality Management .pptx
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
Geodesy 1.pptx...............................................
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
introduction to datamining and warehousing
737-MAX_SRG.pdf student reference guides
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
UNIT-1 - COAL BASED THERMAL POWER PLANTS
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Categorization of Factors Affecting Classification Algorithms Selection
R24 SURVEYING LAB MANUAL for civil enggi
Embodied AI: Ushering in the Next Era of Intelligent Systems
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Mechanical Engineering MATERIALS Selection
Construction Project Organization Group 2.pptx
Well-logging-methods_new................

Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1008 Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network Shrikant Kadam1, Pramod Lad2, Devendra Vavekar3 1,2,3 Students, DEPT. of Computer Engineering ISB&M School of Technology, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - A lot of work has been done to secure sensitive data. The existing solutions can protect the organizational data during transmission, but cannot stop the inside attack where the administrator of the organizational database reveals the sensitive data. We propose a practical approachto prevent the inside attack by using multiple data servers to store data by securely distributing the dataonto multiple data servers. These contributions are essentially different from the solution, which relies on the Sharemind system for data analysis without considering the collusion of data servers to preserve the privacy of the organizational data in statistical analysis .We propose some new privacy-preserving statistical analysis protocols on the basis of the Paillier and ElGamal cryptosystems. These protocols allow the user to perform statistical analysis on the datawithoutcompromisingthedata privacy. The development of Privacy Protection for organizational database was motivated by business applications; today such networks are used in many organizational, educational and consumer applications, such as business process monitoring and control, and so on.What has received less attention, however, is the critical privacy concern on information being collected, transmitted, andanalyzed. Suchprivateinformation may include payload data transmitted throughthenetworkto a centralized data processing server. To keep the privacy of the user’s data, we proposedanewdata collection protocol which splits the user’s data into three numbers and stores them in threedataservers, respectively. As long as one data server is not compromised, the privacy of the user’s data can be preserved. For the legitimate user e.g. receiver to access the user’s data, we proposed an access control protocol, where three data servers cooperate to provide the user with the user’s data, but do not know what it is Key Words: : Encryption, Cyphertext, and Pillier cryptography 1. INTRODUCTION The development of Privacy Protection for organizational database wasmotivatedby businessapplications;todaysuch networks are used in many organizational, educational and consumer applications, such as businessprocessmonitoring and control, and so on.What has received less attention, however, is the critical privacyconcernoninformation being collected, transmitted, and analyzed. Such private information may include payload data transmitted through the network to a centralized data processing server. Our objective is: Protect the user data during transmission .Reliable data transmission, node mobility support and fast event detection. Timelydeliveryofdata,powermanagement, node computation and middleware. Stop the inside attack where the administrator of the user database reveals the sensitive information of users.The existing solutions can protect the data during transmission, but cannot stop the inside attack where the administratorof the organizational database reveals the sensitive user data. In this, we propose a practical approachtopreventtheinside attack by using multiple data servers to store data. Themain scopes is securely distributing the data in multiple data servers and employing the Paillier and ElGamal cryptosystems to perform statistical analysis on the data without compromising theinformationprivacy.Thesolution can protect the data privacy as long as the number of the compromised data servers is at most one. The data privacy can be preserved as long as at least one of three data servers is not compromised. Even if two data servers are compromised but one data server is not compromised, our solution is still secure. 2. SYSTEM ARCHITECHTURE Like most of the application with wireless sensor network,our architecture has four system as follows A wireless ad-hoc network which sense the user data and transmit user data to user database system A user data access control system which is used by the user To access the user data and to monitor it. User data analysis system which is used by the user to query the user database system and analyze the user data statically.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1009 System Architecture 3. PROPOSED ALGORITHM Paillier Public-Key Cryptosystem: It is composed of key generation, encryptionanddecryptionalgorithms asfollows. Step 1: Key generation The key generation algorithm works as follows. Choose two large prime numbers p and q randomly and independently of each other such that gcd(pq,(p-1)(q-1) )=1 Compute N=pq,=lcm(p-1,q-1) Where lcm stands for the least common multiple. Select random integer g where and ensure N divides the order of g by checking the existenceofthefollowingmodular multiplicative inverse: where function L is dined as L(u)=(u-1)/N Note that the notation a/b does not denote the modular multiplication of a times the multiplicative inverse of b but rather the quotient of divided by b The public (encryption) key pk is (N, The private (decryption) key sk is (,). If using p,q of equivalent length, one can simply choose where N = pq and(N)=(P-1)(q-1) Step 2:Encryption:. Plaintext data convert into cipertext form Step 3: Decryption: Let c be the ciphertext to decrypt, where the ciphertext step 4: Homomorphic Properties A notable feature of the Paillier cryp tosystem is its homomorphic properties. Given two ciphertexts The product of a ciphertext with a plaintext raising g will decrypt to the sum of the corresponding plaintexts,An encrypted plaintext raised to a constant k will decrypt to the product of the plaintext and the constant,However, given the Paillier encryptions of two messages, there is no known way to compute an encryption of the product of these messages without knowing the private key 4. RELEVENT MATHEMATICS Let W be the whole system which consist W= IP, PRO, OP Where. IP is the input of the system. A) IP= P, SD, SN, PD, U 1. P is the number of users in the system. 2. SN is the set of number of sensing nodes in the system. 3. SD is the sensing data sensed from the information SD. 4. PD is the users database system which consistsof number databases. 5. U is the set of number of user in the systems that are accessing the data from user database server. B) PRO is the procedure of our proposed system: Step 1: At first the wireless medical network which senses the patient’s body and transmits the users data to a users database system. Step 2: A user’s database system which stores the users data from distributed and provide squaring services to users. Step 3: A users data access control system which issued by the user (e.g., physician) to access the users data and monitor the users. C) OP is the output of the system: OP is the output of the system The system provides the privacy to the users sensible data available on the users database system in the sense of inside attacks.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1010 5. CONCLUSIONS We have investigated the security and privacy issues in the wireless network data collection storage and queries and presented a complete solution for privacy-preserving wireless network. To secure the communication between user and data servers. To keep the privacy of the user’s data, we proposed a new data collection protocol which splits the user’s data into three numbers and stores them in three data servers, respectively. As long as one data server is not compromised, the privacy of the user’s data can be preserved. For the legitimate user e.g. receiver to access the user’s data, we proposed an access control protocol, where three data servers cooperate to provide the user with the user’s data, but do not know what it is. REFERENCES [1] Xun Yi, AthmanBouguettaya, DimitriosGeorgakopoulos, Andy Song and Jan Willemson “Privacy Protection for Wireless Medical Sensor Data”, in proc. IEEE Transactions on Dependable and Secure Computing, 2015. [2] In Proc. ESORICS’08, pages 192-206D. Bogdanov, S. LaurSharemind: a Frameworkfor Fast Privacy- Preserving Computations [3] Wood, A.; Virone, G.; Doan, T.; Cao, Q.; Selavo, L.; Wu, Y.; Fang, L.; He, Z.; Lin, S.; Stankovic, J. ALARM-NET: Wireless Sensor Networks for Assisted-Living and Residential Monitoring; Technical Report CS-2006-01; Department of Computer Science, UniversityofVirginia: Charlottesville, VA, USA, 2006. [4] Cryptography And Network Security from William Stallings. Reference 4.