Locality Distribution Methods for Privacy Preservation
with Aggregate Statistics
G.Sarath kumar 1, L.Padmavathi 2
1
Assistant Professor, Department of CSE, PNC & VIJAI Institute of Engineering & Technology, Phirangipuram, Guntur, Andhra Pradesh.
2
Assistant Professor, Department of MCA, TJPS College (PG Courses), Guntur, Andhra Pradesh
1
sarathkumarg511@gmail.com , 2 padmavathi.tjps@gmail.com
Abstract: In the early days of the web data is designed and hosted by a single person, group, or organization.. Web pages are increasingly composed of content from myriad unrelated Location-sharing-based services (LSBSs) allow users to share their location with their friends in a sporadic manner. In currently deployed LSBSs users must disclose their location to the service provider in order to share it with their friends. The padding up of bits is also done to ensure the security at the transport layer level in searching. The reliability and safety of the privacy is high on using RSA algorithm for Encryption. Different security goals have to be achieved new protocol is perfect tradeoffs in different security goals and energy consumption. Focusing important kind of privacy, new method is proposed in literatures, self-adjusting phantom routing is a very successful one. But it still has some weaknesses. In this paper we propose an improved version of it to enhance its performance. We provide new structured overview recommendations and research directions of security solutions use for privacy-preserving meter data delivery and management. Furthermore we extend our schemes is service provider, performing some verification work, is able to collect privacy-preserving aggregate statistics on the locations users share with each other.
Index Terms: Location Privacy; Broadcast Encryption; Vector Commitments, Selective aggregation, Differential privacy, RSA algorithm, Context Privacy, Source-Location Privacy, Cyber security
1. INTRODUCTION
The term smart grid is used broadly to refer the next generation of electrical energy transmission and distribution infrastructures to characterize by a tight integration with Information and Communication Technologies (ICT) [1]. The integration of the power grid with ICT will enable pervasive real-time monitoring of the physical processes, including generation and consumption at the customers’ premises as well as real-time control operations, including controlling the behavior of smart appliances for demand response [2]. One of most obvious challenges appearing to threaten the successful deployment of sensor networks is the concern of privacy achieving privacy in sensor networks is a complicated problem by the fact that sensor networks normally consist of a set of low-cost radio devices that operate on readily-available, standardized wireless communication technologies [3]. Data gathered by a node from the monitored field is forwarded to the base station via multiple hops other than these, sensor nodes may also have application dependent additional components. [4]. Location sharing based services (LSBSs) permit users to share their current location or activity with other people [5]. The shared location data may be in
Fig. 1. Overview of threats in the smart metering infrastructure
2. RELATED WORK
We review obfuscation-based LPPMs and argue that they are not suitable for protecting location privacy in LSBS. Subsequently some of them have been deliberately designed for protecting location privacy in LSBS; others have a more general purpose [9]. We
therefore follow the categorization which
distinguishes between these four obfuscation
strategies: location hiding, perturbation, adding dummy regions, and reducing precision [10]. Distributed differential privacy is developed in this paper to enable the analysis and it computes scale rate cluster-based Private Data Aggregation (CPDA) is used mainly for reducing computational overheads [11]. The practical techniques develop the hardware and software based approaches over the encrypted data and also it provides the code footprint in the
trusted environment [12]. In public key
cryptosystems, bootstrapping is not a favorable solution because of resource poor sensor nodes elliptic curve cryptosystems (ECC) is therefore used for establishing cluster keys using verifiable secret sharing because of its smaller keys power to compute fast and need of lesser resources like reduced space, bandwidth and processing power [13]. We propose transformations based on the well-established K-anonymity concept to compute exact answers for range and nearest neighbor search, without revealing the query source the privacy-aware query processor
returns a candidate list of answers in which the exact query answer to the user issuing the query through the location anonymizer must be included [14].
3. SYSTEM ARCHITECTURE
[image:2.612.74.306.96.320.2]The user has to register with the username and password. These data will be saved in the database. This database will be maintained by an admin. The admin uploads the products. Once the account is created, the user can login and search for keywords [15]. This differs from our work in that we focus on location sharing, and not on deciding on where to meet after a group of users has deliberately decided to do so. This protocol users do not share their location with other users some works employ Private Information Retrieval (PIR) so that the users retrieve information related to their surroundings [16]. This is only duration in which there are no chances of any kind of attack. After monitoring the behavior of other nodes in the same zone, each sensor node computes the reputation value for them.
Fig No .2 System Model
4. PROPOSED SYSTEM
[image:2.612.324.556.361.563.2]requirements on metering frequency and accuracy, in terms of the number and locations of consumers whose data are needed, and in terms of the
stakeholders. The proposed techniques can
significantly reduce the message overhead without losing any query privacy. In the future We will address other issues such as source anonymity, key management, and look into other query techniques to balance the tradeoff between query delay and message overhead [18]. This protocol provides data integrity and confidentiality to aggregation of data
hierarchically encrypted with different keys.
Hierarchical data aggregation is achieved using message authentication codes (MAC) and privacy homomorphism encryption scheme [19]. Several third parties host JavaScript libraries and APIs that speed webpage loads and enable new page functionality.
Fig. 3. Different domains of the smart metering infrastructure
5. CONSTRUCTIONS OF LSBS
Our schemes are based on identity-based broadcast encryption the sender private scheme which fulfills the sender privacy property the fully private scheme,
which fulfills both the sender privacy and the receiver privacy properties [20].
A. Identity-Based Broadcast Encryption
Broadcast encryption allows a sender to encrypt a message m to a set of receivers S ∈ [1, n], so that no coalition of receivers not in S can decrypt.
Step1: Setup (1λ , n, `). On input the number of users n, the security parameter 1λ , and the maximum size ` ≤ n of a broadcast recipient group, output the public key pk and the secret key sk.
Step2: Key Gen(i, sk). On input an index i and the secret key sk, output a secret key di for user U
Step3: Enc(pk, S, m). On input the recipient group S
∈ [1, n], the public key pk and the message m, output the ciphertext c.
Step4: Dec(pk, di, c). On input the public key pk, the secret key di of user Ui and a ciphertext c, output m if i ∈ S or else the failure symbol ⊥
In IBBE, a trusted key generation center KGC creates the parameters and computes the secret keys of the receivers. Note that the secret key sk allows the decryption of every cipher text. If cipher texts c do not reveal the set of receivers S, the broadcast encryption scheme is anonymous [21].
B. Sender-Private LSBS
Our sender-private LSBS (SPLS) uses an IBBE scheme that is not anonymous. In such a scheme, cipher texts c. contain a description of the recipient group S. Our scheme works as follows [22]:
Step1: Setup Phase. KGC executes the setup algorithm Setup(1λ , n, `) on input the security parameter 1λ , the number of users n and the maximum size ` ≤ n, publishes the public key pk and stores the secret key sk. Users obtain pk.
Step2: Registration Phase. Each user Ui registers with the service provider by sending the index i. Additionally, Ui receives the key di from KGC, which runs KeyGen(i, sk).
[image:3.612.77.305.313.570.2]We note that the registration and main phases can be interleaved users can join our SPLS dynamically. The IBBE scheme ensures that no coalition of service provider P and users U ∈/ S can decrypt a cipher text c computed on input S this scheme does not fulfill the receiver privacy property. Since the IBBE scheme is not anonymous, the cipher text c reveals the identity of the receivers Uj (j ∈ S) [23].
C. Data Encryption & Upload
After login the user can start searching for keywords Homomorphism RSA algorithm is used to encrypt the search keyword. After encrypting, the encrypted data is uploaded in the intermediate server. The encrypted data will be available with the aggregator [24].
Algorithm:
1. Generate two prime numbers p and q
2. Let p and q be assigned to n
3. Let m= Ø(n)=(i-1)(j-1)
4. GCD(Ø(n),e)=1 where 1<e< Ø(n)
5. To find d therefore mod Ø(n)=1
6. For Encrpytion use c=(mes)e mod n
7. For Decryption mes=(c)d mod n
6. PERFORMANCE ANALYSIS
[image:4.612.330.580.93.248.2]Location-sharing-based applications are usually run on a mobile device such as a smart phone or a tablet computer. Therefore the available resources at the client side are limited in terms of computational power and bandwidth when on mobile connection. The total number of users is in form of graphs grouped by the genders of male and female, and based on the age intervals. This statistical data shows how many users are in online and how many users are browsing any specific web pages. Third, it is likely that many value-added services would rely on comparing data from different customers, in which case distributed privacy preserving algorithms would be needed for implementing value-added services. Addressing these issues will require progress in the area of energy-efficient and privacy-preserving distributed machine learning algorithms. Besides location-sharing, badge and mayor ship protocols are another main functionality of a GSN. For the latter privacy preserving protocols have been proposed. We note that it would be possible to combine both approaches to build a privacy-preserving GSN.
Fig No .4. Performance Measures
7. CONCLUSION AND FUTURE DIRECTIONS
We have surveyed the state-of-the-art on smart meter data privacy on the three uses of smart meter data, and its privacy aspects, we have reviewed cryptographic solutions for ensuring privacy-preserving management of smart meter data under the trusted operator model, and privacy-preserving solutions for data processing under the non-trusted operator model. The resource-aware algorithm aims to minimize communication and computational cost, while the quality-aware algorithm aims to minimize the size of cloaked areas in order to generate more accurate aggregate locations. We propose PPSA schema combined with the RSA algorithm privacy of the user from being at risk and it also improves the efficiency by allowing multiple users to get connected to a server. As advantages from previous work, in our schemes the LSBS provider does not need to perform complex operations in order to compute a reply for a location data request, but only needs to forward IBBE cipher texts to the receivers. This allows to run a privacy-preserving LSBS at significantly lower costs. We hope the information presented here provides security and privacy researchers with the background necessary to
contribute to this developing field and to
meaningfully participate in the ongoing public debate. Furthermore, we extend our schemes such
that the service provider, performing some
REFERENCE:
[1]. Jianwei Qian, Fudong Qiu, Student Member, IEEE, Fan Wu, Member, IEEE, Na Ruan, Member, IEEE,Guihai Chen, Member, IEEE, and Shaojie Tang, Member, IEEE, “Privacy-Preserving Selective Aggregation ofOnline User Behavior Data” ,IEEETransactions on Computers, 2017.
[2] J. Grossman, R. Hansen, P. D. Petkov, A. Rager, and S. Fogie, XSS Attacks: Cross-Site Scripting Exploits and Defense. Burlington, MA: Syngress, 2007.
[3] A. Barth, C. Jackson, and J. C. Mitchell, “Robust
defenses for cross-site request forgery,” in
Proceedings of the 2008 ACM Conference on Computer and Communications Security, October 2008.
[4] W. Zeller and E. W. Felten, “Cross-site request forgeries: Exploitation and prevention,” Princeton University, Tech. Rep., September 2008.
[5] Igor Bilogrevic, Murtuza Jadliwala, Kubra Kalkan, ¨ Jean-Pierre Hubaux, and Imad Aad. Privacy in mobile computing for location-sharing-based services. In Privacy Enhancing Technologies, volume 6794 of Lecture Notes in Computer Science, pages 77–96. Springer Berlin Heidelberg, 2011. [6] Dan Boneh and Xavier Boyen. Short signatures without random oracles. In Advances in Cryptology-EUROCRYPT 2004, pages 56–73. Springer, 2004. [7] Dan Boneh and Matt Franklin. Identity-based encryption from the weil pairing. In Advances in
Cryptology-CRYPTO 2001, pages 213–229.
Springer, 2001.
[8] Rafael Pass , “Bounded Concurrent secure multiparty computation with a dishonest majority” in Massachusetts Institute of Technology, 2004
[9] Benkaouz Y, Erradi M. A Distributed protocol for privacy preserving aggregation with non- permanent participants. Computing [Internet]. 2015.
[10]R. Chen, I. E. Akkus, and P. Francis, “SplitX: high-performance private analytics,” in Proceedings of the ACM Special Interest Group on Data Communication (SIGCOMM), 2013, pp. 315–326 [11]C. Dwork, “Differential privacy,” in Proceedings of the 33rd Interna-tional Colloquium on Automata, Languages and Programming (ICALP), 2006, pp. 1– 12.
[12]D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Proceedings of the 32nd IEEE Symposium on Security and Privacy (S&P), 2000, pp. 44–55
[13] Alzaid H., Foo E., Nieto J. G., “RSDA: Reputation-based Secure Data Aggregation in
Wireless Sensor Networks”, in proceedings of 9th IEEE International Conference on Parallel and
Distributed Computing, Applications and
Technology, pp. 419-424, 1-4 December 2008. [14] Poornima. A. S., Amberker B. B., “SEEDA: Secure End-to-End Data Aggregation in Wireless Sensor Networks”, in proceedings of 7th IEEE International Conference on Wireless and Optical Communications Networks (WOCN) , pp. 1-5, 6-8 September 2010.
[15] Li H., Lin K., Li K., “Energy-Efficient and High-Accuracy Secure Data Aggregation in Wireless Sensor Networks”, in Journal of Computer Communications, Elsevier, Volume 34, Issue 4, pp. 591–597, 1 April 2011.
[16] Ozdemir S., Xiao Y., “Integrity Protecting Hierarchical Concealed Data Aggregation for Wireless Sensor Networks”, in Journal of Computer Networks, Elsevier, Volume 55, Issue 8, pp. 1735– 1746, June 2011
[17] W. Wang and Z. Lu, “Cyber security in the smart grid: Survey and challenges,” Computer Networks, vol. 57, no. 5, pp. 1344 – 1371, 2013. [18] Z. Fan, P. Kulkarni, S. Gormus, C. Efthymiou, G. Kalogridis, M. Sooriyabandara, Z. Zhu, S. Lambotharan, and W. H. Chin, “Smart grid communications: Overview of research challenges, solutions, and standardization activities,” IEEE Communications Surveys Tutorials, vol. 15, no. 1, pp. 21–38, 2013.
[19] Y. Mo, T.-H. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, and B. Sinopoli, “Cyber-physical security of a smart grid infrastructure,” Proc. of the IEEE, vol. 100, no. 1, pp. 195–209, Jan. 2012. [20] K. Sharma and L. M. Saini, “Performance analysis of smart metering for smart grid: An overview,” Renewable and Sustainable Energy Reviews, vol. 49, pp. 720 – 735, 2015.
[21] Datalogix. Datalogix privacy policy.
[22] D. Perito, C. Castelluccia, M. A. Kaafar, and P. Manilsr, “How unique and traceable are usernames?” in Proceedings of the 2011 Privacy Enhancing Technologies Symposium, 2011.
[23] L.-S. Huang and C. Jackson, “Clickjacking attacks unresolved,” July 2011.