IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg: 77-83

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Secure Perturbations of Data Provenance and Transmission of Stream Data Ms.M.Sabeetha1, Mrs.R.Dharshini2 1

PG Scholar, CSE Department, Computer Science and Engineering, Anna University, Chennai 2

Assistant professor, CSE Department.

Vivekanandha college of technology for women, Elayampalayam, Thiruchengode. Tamilnadu, India. 1

2

[email protected]

[email protected]

Abstract In Data Mining, the rapid escalation of the Internet and related technologies has offered an unprecedented ability to access and redistribute digital contents. In such a context, enforcing data possession is an important requirement, which requires uttered solutions, encompassing technical, organizational, and legal aspects. Although still far from such wide-ranging solutions, in the last years, watermarking techniques have emerged as an important building block that plays a crucial role in addressing the possession problem. Such techniques allow the possessor of the data to embed an imperceptible watermark into the data. A watermark describes information that can be used to prove the possession of data such as the possessor, origin, or recipient of the content. Secure data requires that the fixed watermark must not be easily tampered with data, or removed from the watermarked data. Watermarking techniques have been industrial for video, images, audio, and text data and also for software and natural language text. Watermark embedding for relational data is made possible by the fact that real data can very often tolerate a small amount of error without any significant humiliation with respect to their usability. In particular, proposed technique is providing secure system for the continuous flow of data’s. Index terms-Watermarking, stream data, embed data, spread spectrum and watermarking algorithms.

I.INTRODUCTION In Data Mining the subfield of stream mining is the process of extracting knowledge from continuous flow of data the data that drives such systems is produced by a variety of sources, rating from other systems down to creature sensors and processed by multiple transitional agents. This mixture of data sources accelerates the importance of data provenance to ensure secure and predictable operation of the streaming applications [2]. Mission critical applications in such a system must access only high confidence data in order to guarantee accurate decisions. Thus, the declaration of data credibility is crucial here, which priorities the

Ms.M.Sabeetha, IJRIT

77

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg: 77-83

secure supervision of provenance. The real-time data collected from different sensors. Origin facilitates such systems by leveraging high steadfast data, thus, preventing wrong control decisions. Efficient transmission of provenance in an aggregation supportive streaming environment focusing on sensor networks. The unique nature of streaming environment imposes a set of challenges to the provenance solution. A lot of packets; thus there are large groups of packets that have the same provenance. An approach has the drawback that the attackers would be able to identify the provenance containing packets by observing and analyzing all the data packets. [1][2].

II. WATERMARKING A watermarking is an observation of the hiding secrete content about the transmission of data and it embed along with the data provenance into the inter packets [6]. A. TYPES OF WATERMARKING: Electronic watermarking: The secure system is providing only for proof of possession, copyright concerns. Secure the music and video files in music system identification code are embedding into the audio video files. B. DIGITAL WATERMARKING: A careful design of the watermarking scheme can make the provenance invisible to the attacker, which enhances the steadfastness and heftiness of the provenance. Moreover, the scheme is able to recover the provenance even in the face of several attacks. Possible approach to the problem of secure provenance for streaming could be based on traditional security solutions like encryption, digital signature, and message authentication code (MAC). A characteristic thus would force the transmission of a vast amount of provenance information along with data. Encryption/signature/ MAC-based mechanisms cannot help in reducing such size even after compaction.[8],[11] Hence, traditional security means incur significant bandwidth overhead and impact efficiency and scalability. III. EXISTING SYSTEM Traditional approaches are not applicable in resource constrained sensor networks, because provenance information tends to grow very fast, often becoming several magnitudes in size larger than the original data. Such a characteristic thus would force the transmission of a vast amount of provenance information [10], [14] along with data. Encryption/signature/MAC-based mechanisms cannot help in reducing such size even after compaction. in this system using the watermarking technique for highly transmitted data. Data provenance is the origin of the data or historical record of the data. Hide this provenance into the inter-packets. In early watermark used for only proof of possession first time the technique used for the providing secure for the stream data. Like applications are phone conversations, marketing transaction and sensor networks. Mainly its provide the secure for data against the inside and outside attackers. It can’t change the origin.

BASE STATION

SENDS DATA

WATERMARKING TECHNIQUE

Ms.M.Sabeetha, IJRIT

SECURE OF DATA

78

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg: 77-83

Fig.1.Exisiting System Thus there are large groups of packets that have the same provenance. In this context, the expensive encryption/MAC/digital signature mechanisms can be used with low frequency to send provenance in some selected packets [3]. However, such an approach has the drawback that the attackers would be able to identify the provenance containing packets by observing and analyzing all the data packets. Upon detection, the attacker could then drop such packets and block the provenance transmission. IV. PROPOSED SYSTEM Propose a novel approach to securely transmit provenance for streaming data (focusing on sensor network) by embedding provenance into the inter-packet timing domain while addressing the above mentioned issues [13]. As provenance is hidden in another congregation-medium, our solution can be conceptualized as watermarking technique. However, unlike traditional watermarking approaches, the embed provenance over the inter-packet delays (IPDs) rather than in the sensor data themselves, hence avoiding the problem of data degradation due to watermarking. Thus, the use of the spread spectrum technique for watermarking provides strong security against different attacks. We have adopted the direct sequence spread spectrum (DSSS) technique which is widely used for enabling multiple users to transmit simultaneously on the same frequency range by utilizing distinct pseudo noise sequences . The intended receiver can extract the desired user’s signal by regarding the other signals as noise-like interferences. The components of a DSSS system are as follows: Input: The original data signal is a series. A PN sequence, encode like the data signal. No is the number of bits per symbol and is called PN length.

.

BASE STATION

SENDS DATA TO DESTINATION

SPREAD SPECTRUM WATER MARKETING TECHNIQUE

SECURE TRANSMISSION AND PREVENT FROM ATTACKS

Fig.2.System Architecture The data receiver utilizing an optimal doorstep-based mechanism, which minimizes the probability of provenance decoding errors, extracts provenance. The resiliency of the scheme against outside and inside attackers is established through an extensive security analysis.

Ms.M.Sabeetha, IJRIT

79

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg: 77-83

V. IMPLEMENTATION Implementation is the stage of the project when the theoretical design is turned out into a working system [4], Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. A. SPREAD SPECTRUM WATERMARKING Spread spectrum is a transmission technique by which a narrowband data signal is spread over a much larger bandwidth so that the signal energy present in any single frequency is undetectable.[13] In general the sequence of inter-packet delays is the communication channel and the origin is the signal transmitted through it. Origin is spread over many IPDs such that the information present in one IPD (i.e., container of information)[9] is small. Consequently, an attacker needs to add high amplitude noise to all of the containers in order to destroy the origin. Thus, the use of the spread spectrum technique for watermarking provides strong security against different attacks.

SENDS DATA

YES

NO ATTACKS DATA

ADD PSEUDONOISE

DATA TRANSMITED

EMBED PROVENANACE

SECURE TRANSMISSION

Fig.3.Spread Spectrum Watermarking VI. PROBLEM STATEMENT Keeping track of data provenance in such highly dynamic context is an vital obligation, since data provenance is key factor in assessing data reliability, which is crucial for many applications. Provenance management for streaming data requires addressing several challenges, [7], [12] including the assurance of high processing throughput, low bandwidth consumption, storage efficiency, and secure transmission. A. SCOPE

Ms.M.Sabeetha, IJRIT

80

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg: 77-83

A novel approach for securely transmit provenance for streaming data by embedding provenance into the inter-packet timing domain while addressing the above mentioned issues [5]. As provenance is hidden in a further congregation-medium, our solution can be conceptualized as watermarking technique. We use a message authentication code for maintain its integrity and authenticity. The cluster head creates a new packet with aggregated data which makes it difficult to preserve the packet timestamps received from all of its children.

B. DATA STREAM Introduce and study the problem of secure and efficient transmission of provenance in an aggregation supportive streaming environment (focusing on sensor networks). The unique nature of streaming environment imposes a set of challenges to the provenance solution. A spread-spectrum watermarking-based solution that embeds provenance over the inter packet delays [9]. The security features of the scheme make it able to survive against various sensor network or flow watermarking attacks. C. DATA ORIGIN Data origin documents the inputs, entities, systems, and processes that influence data of interest, in effect providing a historical record of the data and its origins. The generated evidence supports essential forensic activities such as data dependency analysis, error detection and recovery, and auditing and compliance analysis. Data Origin is extracted from the different sources, while it is used for where data's origin and what are the modifications made[13]. Many application domains, such as real-time financial analysis, e-healthcare systems, sensor networks, are characterized by continuous data streaming from multiple sources and through intermediate processing by multiple aggregators. Keeping track of data origin in such highly dynamic context is an important requirement, since data origin is a key factor in assessing data trustworthiness which is crucial for many applications. Origin management for streaming data requires addressing several challenges, including the assurance of high processing throughput, low bandwidth consumption, storage efficiency and secure transmission. So we propose a novel approach to securely transmit origin for streaming data by embedding origin into the inter-packet timing domain while addressing the above mentioned issues. As origin is hidden in another congregation medium, the solution can be conceptualized as water-marking technique. We embed origin over the inter-packet delays (IPDs) rather than in the sensor data themselves,[6],[13] The resiliency of the scheme against outside and inside attackers is established through an extensive security analysis. VII. SYSTEM MODEL AND BACKGROUND Consider a typical deployment of wireless sensor networks, consisting of a large number of nodes. A. NETWORK MODEL Sensor nodes are stationary after deployment, though the routing paths may change due to node failure, resource optimization, etc. The network is modeled as a graph G (N,E) where N ¼ fni : ni is a network node with identifier ig: a set of network nodes. a set of edges between the nodes in N. There exists a base station (BS) that acts as sink/root and connects the network to outside infrastructures such as the Internet[11]. B.DATA MODEL The sensor network supports multiple distinguishable data flows where source nodes generate data periodically. A node also receives data from other nodes in order to forward them towards the BS. We will use the term data arrival with the meaning of data generation or receipt at a node. While transmitting, a node may send the sensed data or pass an aggregated data value computed from multiple sensors’ readings, or act as a routing node. Each data packet contains an attribute value and origin for this attribute[13]. The packet is also timestamp by the source node with the generation time. The packet timestamp is crucial for origin embedding and decoding processes.

Ms.M.Sabeetha, IJRIT

81

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg: 77-83

VIII. SECURE PROVENANCE A possible approach to the problem of secure provenance for streaming could be based on traditional security solutions like encryption, digital signature, and message authentication code (MAC). In a digital signature-based mechanism, each party involved in the data processing would append its information to data and sign it[5] (or compute and attach the MAC) to ensure authenticity.

A. TRANSMISSION An attacker, being unaware of provenance transmission over the Inter packet delays, cannot detect the presence of provenance the attacker also observes the timing characteristics in order to maintain them during packet replay. To make the replayed data appear as fresh, the attacker will update the packet timestamp to a recent value [15]. IX. CONCLUSION In existing system while transfer a data from one source to destination there may be s loss/drop of packets. To overcome this drawback use Spread spectrum watermarking technique. Here it watermarks the data, which are considering as important and send to destination. So can sending the data securely and efficiently without any loss or delay. To overcome the lack of security system in data to increase the size of data provenance and adding pseudo noise performance.

X. REFERENCES [1] H. Balakrishnan, A. Chandrakasan, W. Heinzelman, and “Energy- Efficient Communication Protocol for Wireless Microsensor Networks,” Proc. Ann. Hawaii Int’l Conf. System Sciences, pp. 3005-3014,2000. [2] I. Cox and M. Miller, “Electronic Watermarking: The First 50 Years,” Proc. IEEE Workshop Multimedia Signal Processing pp. 225-230, 2001. [3] S. Cabuk, A. Giani, “National Cyber Security Research and Development Challenges,”2006 Related to Economics, Physical Infrastructure and Human Behavior, 2009. [4] J. Elson and D. Estrin, “Time Synchronization for Wireless Sensor Networks,” Proc. Int’l Parallel and Distributed Processing Symp. (IPDPS), p. 186, 2001. [5] I. Foster, J. Vockler, M. Wilde, and Y. Zhao, “Chimera: A Virtual Data System for Representing, Querying, and Automating Data Derivation,” Proc. Conf. Scientific and Statistical Database Management, pp. 37-46, 2002. [6] A. Giani, and G. Hybenko, “Detection of Covert Channel Encoding in Network Packet Delays,” technical report, Dartmouth College, 2005. [7] S. Ghong, C. Skalka, and J.A. Vaughan, “Self-Identifying Sensor Data,” Proc. Information Processing in Sensor Networks (IPSN), pp. 82-93, 2010. [8] M. Kantarcioglu, C. Dai, D. Lin, E. Bertino, “An Approach to Evaluate Data Trustworthiness Based on Data Provenance,” Proc. Fifth VLDB Workshop Secure Data Management (SDM), pp. 82-98, 2008. [9] P. Mohapatra, X. Wang and “Provenance Based Information Trustworthiness Evaluation in Multi-Hop Networks,” Proc. IEEE Global Telecomm. Conf. (GLOBECOM), 2010.

Ms.M.Sabeetha, IJRIT

82

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg: 77-83

[10] Namos, http://robotics.usc.edu/namos, “An Approach to Evaluate Data Trustworthiness Based on Data Origin,” Proc. Fifth VLDB Workshop Secure Data Management (SDM), pp. 82-98,2011. [11] S. Skalka, “IP Covert Timing Channels: Design and Detection,” Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 178-187, 2004. [12]

The

Sensorscope

Project,

http://sensorscope.epfl.ch,

2012

[13] J. Vockler, Spread Spectrum Systems: With Commercial Applications, third ed. John Wiley and Sons, Inc., 1994.

[14] N. Vijayakumar and B. Plale, “Towards Low Overhead Provenance Tracking in Near Real-Time Stream Filtering,” Provenance and Annotation of Data, vol. 4145, pp. 46-54, 2006. [15] X. Wang and D.S. Reeves, “Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Manipulation of Inter-packet Delays,” Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 20-29, 2003. .

Ms.M.Sabeetha, IJRIT

83

Secure Perturbations of Data Provenance and ...

Fig.2.System Architecture. The data receiver utilizing an optimal doorstep-based mechanism, which minimizes the probability of provenance decoding errors,.

89KB Sizes 2 Downloads 222 Views

Recommend Documents

Data provenance and version control
Met Office Hadley Centre, Exeter, UK. 3. 4. 7th-9th September 2010. 5. 6. White papers background. 7. 8. Each white paper has been prepared in a matter of a few weeks by a small set of experts. 9 who were pre-defined by the International Organising C

A graph model of data and workflow provenance - Usenix
currency, procedures, service calls, and queries to exter- nal databases. ... in a uniform way. ... tion 3 we describe the structure of provenance graphs and.

A graph model of data and workflow provenance
Umut Acar. Max-Planck Institute for Software Systems ... complex object data, by propagating fine-grained an- notations or ... are defined in a common language and data model [8, 6]. ...... storing provenance graphs over nested collections [1].

Perturbations and Metric Regularity
Dec 15, 2004 - SAAS. |y - Bx|| 1 + |B|x|| |x|-1 + |B| which is a contradiction, and the ...... Proof We apply Theorem 25 to the metric space U = L(X,Y) and the set.

Secure and Efficient Data Transmission.pdf
Page 1 of 5. Secure and Efficient Data Transmission for Cluster-Based. Wireless Sensor Networks. ABSTRACT: Secure data transmission is a critical issue for wireless sensor networks. (WSNs). Clustering is an effective and practical way to enhance the

Yobicash: a cryptocurrency for secure sharing and storage of data
The World Wide Web is built on top of technologies for sharing, storing and retrieving data. A few decades after its inception, the web has become the backbone of the information economy, and thanks to innovations as the Internet of Things, Virtual R

Secure Comparison of Encrypted Data in Wireless ...
proposed by Agrawal, et al. for database encryption. This scheme is ... static and is represented by a graph G = (N, L) with |N | .... in F are uniformly distributed. 3.

high speed and secure data transmission using ...
in the amount of digital data transmitted via the Internet, representing text .... each word with an approximate signature pattern for the word opposed to an actual.

Symmetry-breaking perturbations and strange attractors
transitions from two-sided to one-sided strange attractors as the other parameters are varied. ..... gests the existence of SAs in ''windows'' in the parameter space ...

Compression Scheme for Faster and Secure Data ...
IDBE (Intelligent Dictionary Based Encoding) is used as a pre processing stage so as to improve the compression ratio and the rate of compression. The compression method suggested will greatly reduce the transmission time as well as the bandwidth req

Secure and Scalable Access to Cloud Data in ...
IJRIT International Journal of Research in Information Technology, Volume 3, Issue .... In future, we continue working on storage security and data dynamics with ...

Secure Erase for SSDs Helps Sanitize Data and Boost ... - Media16
Intel IT uses secure erase (see Figure 1) because it is the most effective ... laptops every two to four years. .... EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY ...

Provenance of Exposure: Identifying Sources of Leaked ...
documents via not-fully-trusted cloud systems, with support for .... Computer Society, pp. 365–372. [3] S. B. Davidson, S. C. Boulakia, A. Eyal, B. Ludascher, T. M. ...

HERITABILITY CONSTRUCTION FOR PROVENANCE ...
other genetic units such as stand, ecotype, family within stand, full- sib family ... Clonal heritability obtained is the form of rVg/(Ve2 + rVg), which is equivalent to the ... phenotypic variance (Vp), and the result is the commonly accepted formul

Enhanced synchronizability by structural perturbations
Nov 18, 2005 - ... of Modern Physics and Nonlinear Science Center, University of Science and Technology of China, ... Many social, biological, and communication systems can .... dynamical system, but concentrate on how the network to-.

Safe-And-Secure-Transport-And-Storage-Of-Radioactive-Materials ...
Page 1 of 3. Download ]]]]]>>>>>(PDF) Safe And Secure Transport And Storage Of Radioactive Materials. [eBooks] Safe And Secure Transport And Storage Of. Radioactive Materials. SAFE AND SECURE TRANSPORT AND STORAGE OF RADIOACTIVE MATERIALS EBOOK AUTHO

Basic Concepts and Taxonomy of Dependable and Secure ... - NASA
Aug 25, 2004 - common strands of dependability and security although, for reasons of space .... attributes, and threats, the most urgent goal for the future is to keep the taxonomy ..... statistics about large software projects [34], or the analysis.

Secure and Scalable Access to Cloud Data in Presence of Dynamic ...
cloud offers services like Infrastructure as a Service (IaaS), Platform as a Service ... The files are divided into file groups and the cryptographic primitives are ...

Basic Concepts and Taxonomy of Dependable and Secure Computing
Aug 25, 2004 - IEEE CS and the IFIP WG 10.4 “Dependable Computing and Fault Tolerance. ... of security as an attribute and of the class of intentional malicious faults in ...... online (without interrupting service delivery) or offline. (during ser

Warming and provenance limit tree recruitment ... - Wiley Online Library
1Sierra Nevada Research Institute, University of California, Merced, 5200 North ... 130 Mulford Hall, Berkeley, CA 94720, USA, 6Department of Ecology and.

Identity-Based Secure Distributed Data Storage with Dual ... - IJRIT
In Cryptographic. File System scheme the reliability of the perceptive file is provided by digital signature methods and the message authentication codes. (MAC).

Identity-Based Secure Distributed Data Storage with Dual ... - IJRIT
In Cryptographic. File System scheme the reliability of the perceptive file is provided by digital signature methods and the message authentication codes. (MAC).

Secure Data Aggregation for Multiple Applications in ...
In order to overcome this, various data aggregation techniques have been proposed ... Keywords: Wireless Sensor Networks, Structure-free Data Aggregation.