• No results found

Locality Distribution Methods for Privacy Preservation with Aggregate Statistics

N/A
N/A
Protected

Academic year: 2020

Share "Locality Distribution Methods for Privacy Preservation with Aggregate Statistics"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

Locality Distribution Methods for Privacy Preservation

with Aggregate Statistics

G.Sarath kumar 1, L.Padmavathi 2

1

Assistant Professor, Department of CSE, PNC & VIJAI Institute of Engineering & Technology, Phirangipuram, Guntur, Andhra Pradesh.

2

Assistant Professor, Department of MCA, TJPS College (PG Courses), Guntur, Andhra Pradesh

1

sarathkumarg511@gmail.com , 2 padmavathi.tjps@gmail.com

Abstract: In the early days of the web data is designed and hosted by a single person, group, or organization.. Web pages are increasingly composed of content from myriad unrelated Location-sharing-based services (LSBSs) allow users to share their location with their friends in a sporadic manner. In currently deployed LSBSs users must disclose their location to the service provider in order to share it with their friends. The padding up of bits is also done to ensure the security at the transport layer level in searching. The reliability and safety of the privacy is high on using RSA algorithm for Encryption. Different security goals have to be achieved new protocol is perfect tradeoffs in different security goals and energy consumption. Focusing important kind of privacy, new method is proposed in literatures, self-adjusting phantom routing is a very successful one. But it still has some weaknesses. In this paper we propose an improved version of it to enhance its performance. We provide new structured overview recommendations and research directions of security solutions use for privacy-preserving meter data delivery and management. Furthermore we extend our schemes is service provider, performing some verification work, is able to collect privacy-preserving aggregate statistics on the locations users share with each other.

Index Terms: Location Privacy; Broadcast Encryption; Vector Commitments, Selective aggregation, Differential privacy, RSA algorithm, Context Privacy, Source-Location Privacy, Cyber security

1. INTRODUCTION

The term smart grid is used broadly to refer the next generation of electrical energy transmission and distribution infrastructures to characterize by a tight integration with Information and Communication Technologies (ICT) [1]. The integration of the power grid with ICT will enable pervasive real-time monitoring of the physical processes, including generation and consumption at the customers’ premises as well as real-time control operations, including controlling the behavior of smart appliances for demand response [2]. One of most obvious challenges appearing to threaten the successful deployment of sensor networks is the concern of privacy achieving privacy in sensor networks is a complicated problem by the fact that sensor networks normally consist of a set of low-cost radio devices that operate on readily-available, standardized wireless communication technologies [3]. Data gathered by a node from the monitored field is forwarded to the base station via multiple hops other than these, sensor nodes may also have application dependent additional components. [4]. Location sharing based services (LSBSs) permit users to share their current location or activity with other people [5]. The shared location data may be in

(2)

Fig. 1. Overview of threats in the smart metering infrastructure

2. RELATED WORK

We review obfuscation-based LPPMs and argue that they are not suitable for protecting location privacy in LSBS. Subsequently some of them have been deliberately designed for protecting location privacy in LSBS; others have a more general purpose [9]. We

therefore follow the categorization which

distinguishes between these four obfuscation

strategies: location hiding, perturbation, adding dummy regions, and reducing precision [10]. Distributed differential privacy is developed in this paper to enable the analysis and it computes scale rate cluster-based Private Data Aggregation (CPDA) is used mainly for reducing computational overheads [11]. The practical techniques develop the hardware and software based approaches over the encrypted data and also it provides the code footprint in the

trusted environment [12]. In public key

cryptosystems, bootstrapping is not a favorable solution because of resource poor sensor nodes elliptic curve cryptosystems (ECC) is therefore used for establishing cluster keys using verifiable secret sharing because of its smaller keys power to compute fast and need of lesser resources like reduced space, bandwidth and processing power [13]. We propose transformations based on the well-established K-anonymity concept to compute exact answers for range and nearest neighbor search, without revealing the query source the privacy-aware query processor

returns a candidate list of answers in which the exact query answer to the user issuing the query through the location anonymizer must be included [14].

3. SYSTEM ARCHITECTURE

[image:2.612.74.306.96.320.2]

The user has to register with the username and password. These data will be saved in the database. This database will be maintained by an admin. The admin uploads the products. Once the account is created, the user can login and search for keywords [15]. This differs from our work in that we focus on location sharing, and not on deciding on where to meet after a group of users has deliberately decided to do so. This protocol users do not share their location with other users some works employ Private Information Retrieval (PIR) so that the users retrieve information related to their surroundings [16]. This is only duration in which there are no chances of any kind of attack. After monitoring the behavior of other nodes in the same zone, each sensor node computes the reputation value for them.

Fig No .2 System Model

4. PROPOSED SYSTEM

[image:2.612.324.556.361.563.2]
(3)

requirements on metering frequency and accuracy, in terms of the number and locations of consumers whose data are needed, and in terms of the

stakeholders. The proposed techniques can

significantly reduce the message overhead without losing any query privacy. In the future We will address other issues such as source anonymity, key management, and look into other query techniques to balance the tradeoff between query delay and message overhead [18]. This protocol provides data integrity and confidentiality to aggregation of data

hierarchically encrypted with different keys.

Hierarchical data aggregation is achieved using message authentication codes (MAC) and privacy homomorphism encryption scheme [19]. Several third parties host JavaScript libraries and APIs that speed webpage loads and enable new page functionality.

Fig. 3. Different domains of the smart metering infrastructure

5. CONSTRUCTIONS OF LSBS

Our schemes are based on identity-based broadcast encryption the sender private scheme which fulfills the sender privacy property the fully private scheme,

which fulfills both the sender privacy and the receiver privacy properties [20].

A. Identity-Based Broadcast Encryption

Broadcast encryption allows a sender to encrypt a message m to a set of receivers S ∈ [1, n], so that no coalition of receivers not in S can decrypt.

Step1: Setup (1λ , n, `). On input the number of users n, the security parameter 1λ , and the maximum size ` ≤ n of a broadcast recipient group, output the public key pk and the secret key sk.

Step2: Key Gen(i, sk). On input an index i and the secret key sk, output a secret key di for user U

Step3: Enc(pk, S, m). On input the recipient group S

∈ [1, n], the public key pk and the message m, output the ciphertext c.

Step4: Dec(pk, di, c). On input the public key pk, the secret key di of user Ui and a ciphertext c, output m if i ∈ S or else the failure symbol ⊥

In IBBE, a trusted key generation center KGC creates the parameters and computes the secret keys of the receivers. Note that the secret key sk allows the decryption of every cipher text. If cipher texts c do not reveal the set of receivers S, the broadcast encryption scheme is anonymous [21].

B. Sender-Private LSBS

Our sender-private LSBS (SPLS) uses an IBBE scheme that is not anonymous. In such a scheme, cipher texts c. contain a description of the recipient group S. Our scheme works as follows [22]:

Step1: Setup Phase. KGC executes the setup algorithm Setup(1λ , n, `) on input the security parameter 1λ , the number of users n and the maximum size ` ≤ n, publishes the public key pk and stores the secret key sk. Users obtain pk.

Step2: Registration Phase. Each user Ui registers with the service provider by sending the index i. Additionally, Ui receives the key di from KGC, which runs KeyGen(i, sk).

[image:3.612.77.305.313.570.2]
(4)

We note that the registration and main phases can be interleaved users can join our SPLS dynamically. The IBBE scheme ensures that no coalition of service provider P and users U ∈/ S can decrypt a cipher text c computed on input S this scheme does not fulfill the receiver privacy property. Since the IBBE scheme is not anonymous, the cipher text c reveals the identity of the receivers Uj (j ∈ S) [23].

C. Data Encryption & Upload

After login the user can start searching for keywords Homomorphism RSA algorithm is used to encrypt the search keyword. After encrypting, the encrypted data is uploaded in the intermediate server. The encrypted data will be available with the aggregator [24].

Algorithm:

1. Generate two prime numbers p and q

2. Let p and q be assigned to n

3. Let m= Ø(n)=(i-1)(j-1)

4. GCD(Ø(n),e)=1 where 1<e< Ø(n)

5. To find d therefore mod Ø(n)=1

6. For Encrpytion use c=(mes)e mod n

7. For Decryption mes=(c)d mod n

6. PERFORMANCE ANALYSIS

[image:4.612.330.580.93.248.2]

Location-sharing-based applications are usually run on a mobile device such as a smart phone or a tablet computer. Therefore the available resources at the client side are limited in terms of computational power and bandwidth when on mobile connection. The total number of users is in form of graphs grouped by the genders of male and female, and based on the age intervals. This statistical data shows how many users are in online and how many users are browsing any specific web pages. Third, it is likely that many value-added services would rely on comparing data from different customers, in which case distributed privacy preserving algorithms would be needed for implementing value-added services. Addressing these issues will require progress in the area of energy-efficient and privacy-preserving distributed machine learning algorithms. Besides location-sharing, badge and mayor ship protocols are another main functionality of a GSN. For the latter privacy preserving protocols have been proposed. We note that it would be possible to combine both approaches to build a privacy-preserving GSN.

Fig No .4. Performance Measures

7. CONCLUSION AND FUTURE DIRECTIONS

We have surveyed the state-of-the-art on smart meter data privacy on the three uses of smart meter data, and its privacy aspects, we have reviewed cryptographic solutions for ensuring privacy-preserving management of smart meter data under the trusted operator model, and privacy-preserving solutions for data processing under the non-trusted operator model. The resource-aware algorithm aims to minimize communication and computational cost, while the quality-aware algorithm aims to minimize the size of cloaked areas in order to generate more accurate aggregate locations. We propose PPSA schema combined with the RSA algorithm privacy of the user from being at risk and it also improves the efficiency by allowing multiple users to get connected to a server. As advantages from previous work, in our schemes the LSBS provider does not need to perform complex operations in order to compute a reply for a location data request, but only needs to forward IBBE cipher texts to the receivers. This allows to run a privacy-preserving LSBS at significantly lower costs. We hope the information presented here provides security and privacy researchers with the background necessary to

contribute to this developing field and to

meaningfully participate in the ongoing public debate. Furthermore, we extend our schemes such

that the service provider, performing some

(5)

REFERENCE:

[1]. Jianwei Qian, Fudong Qiu, Student Member, IEEE, Fan Wu, Member, IEEE, Na Ruan, Member, IEEE,Guihai Chen, Member, IEEE, and Shaojie Tang, Member, IEEE, “Privacy-Preserving Selective Aggregation ofOnline User Behavior Data” ,IEEETransactions on Computers, 2017.

[2] J. Grossman, R. Hansen, P. D. Petkov, A. Rager, and S. Fogie, XSS Attacks: Cross-Site Scripting Exploits and Defense. Burlington, MA: Syngress, 2007.

[3] A. Barth, C. Jackson, and J. C. Mitchell, “Robust

defenses for cross-site request forgery,” in

Proceedings of the 2008 ACM Conference on Computer and Communications Security, October 2008.

[4] W. Zeller and E. W. Felten, “Cross-site request forgeries: Exploitation and prevention,” Princeton University, Tech. Rep., September 2008.

[5] Igor Bilogrevic, Murtuza Jadliwala, Kubra Kalkan, ¨ Jean-Pierre Hubaux, and Imad Aad. Privacy in mobile computing for location-sharing-based services. In Privacy Enhancing Technologies, volume 6794 of Lecture Notes in Computer Science, pages 77–96. Springer Berlin Heidelberg, 2011. [6] Dan Boneh and Xavier Boyen. Short signatures without random oracles. In Advances in Cryptology-EUROCRYPT 2004, pages 56–73. Springer, 2004. [7] Dan Boneh and Matt Franklin. Identity-based encryption from the weil pairing. In Advances in

Cryptology-CRYPTO 2001, pages 213–229.

Springer, 2001.

[8] Rafael Pass , “Bounded Concurrent secure multiparty computation with a dishonest majority” in Massachusetts Institute of Technology, 2004

[9] Benkaouz Y, Erradi M. A Distributed protocol for privacy preserving aggregation with non- permanent participants. Computing [Internet]. 2015.

[10]R. Chen, I. E. Akkus, and P. Francis, “SplitX: high-performance private analytics,” in Proceedings of the ACM Special Interest Group on Data Communication (SIGCOMM), 2013, pp. 315–326 [11]C. Dwork, “Differential privacy,” in Proceedings of the 33rd Interna-tional Colloquium on Automata, Languages and Programming (ICALP), 2006, pp. 1– 12.

[12]D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Proceedings of the 32nd IEEE Symposium on Security and Privacy (S&P), 2000, pp. 44–55

[13] Alzaid H., Foo E., Nieto J. G., “RSDA: Reputation-based Secure Data Aggregation in

Wireless Sensor Networks”, in proceedings of 9th IEEE International Conference on Parallel and

Distributed Computing, Applications and

Technology, pp. 419-424, 1-4 December 2008. [14] Poornima. A. S., Amberker B. B., “SEEDA: Secure End-to-End Data Aggregation in Wireless Sensor Networks”, in proceedings of 7th IEEE International Conference on Wireless and Optical Communications Networks (WOCN) , pp. 1-5, 6-8 September 2010.

[15] Li H., Lin K., Li K., “Energy-Efficient and High-Accuracy Secure Data Aggregation in Wireless Sensor Networks”, in Journal of Computer Communications, Elsevier, Volume 34, Issue 4, pp. 591–597, 1 April 2011.

[16] Ozdemir S., Xiao Y., “Integrity Protecting Hierarchical Concealed Data Aggregation for Wireless Sensor Networks”, in Journal of Computer Networks, Elsevier, Volume 55, Issue 8, pp. 1735– 1746, June 2011

[17] W. Wang and Z. Lu, “Cyber security in the smart grid: Survey and challenges,” Computer Networks, vol. 57, no. 5, pp. 1344 – 1371, 2013. [18] Z. Fan, P. Kulkarni, S. Gormus, C. Efthymiou, G. Kalogridis, M. Sooriyabandara, Z. Zhu, S. Lambotharan, and W. H. Chin, “Smart grid communications: Overview of research challenges, solutions, and standardization activities,” IEEE Communications Surveys Tutorials, vol. 15, no. 1, pp. 21–38, 2013.

[19] Y. Mo, T.-H. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, and B. Sinopoli, “Cyber-physical security of a smart grid infrastructure,” Proc. of the IEEE, vol. 100, no. 1, pp. 195–209, Jan. 2012. [20] K. Sharma and L. M. Saini, “Performance analysis of smart metering for smart grid: An overview,” Renewable and Sustainable Energy Reviews, vol. 49, pp. 720 – 735, 2015.

[21] Datalogix. Datalogix privacy policy.

[22] D. Perito, C. Castelluccia, M. A. Kaafar, and P. Manilsr, “How unique and traceable are usernames?” in Proceedings of the 2011 Privacy Enhancing Technologies Symposium, 2011.

[23] L.-S. Huang and C. Jackson, “Clickjacking attacks unresolved,” July 2011.

Figure

Fig. 1. Overview of threats in the smart metering infrastructure
Fig. 3. Different domains of the smart metering infrastructure
Fig No .4. Performance Measures

References

Related documents

Die Diskussion von sechs Aspekten für einen Vergleich von IAB-Betriebspanel und AFiD-Panel hat deutlich gemacht, dass es sich bei diesen beiden Datensätzen um komplemen- täre und

Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2007, Article ID 54038, 8 pages doi 10 1155/2007/54038 Research Article Rate Based Active

The wavelet method is shown to perform well with the addition of a height restraint for nocturnal BLH retrievals (Fig. 8) in order to prevent the detection of RL signals or

(GND) - R R The supporting pins can reduce the influences from stresses on the function pins.. Note 2: When this module is used beyond the above absolute maximum ratings,

The phenotype of this patient shows great similarity with the previously reported patients who have either a duplication or a deletion in this region, in- cluding a long face,

– To provide a forum for discussion of factors to be considered when designing engineered constraining systems for single core XLPE transmission cable sytems joints in manholes1.

The amount of each amino acid in vermimeal was recorded and tabulated (Table 3) from high to low range from the peaks obtained from Fig 2 and Fig 3. The peaks of standard amino

Despite the differences between the measurement points, the water in both cases had a very good ecological status, because the average values of ammonium nitrogen, total