PRIVACY DISPERSED DATA FINDING WITH BROADCASTING IN WSNS

Bunga Rajesh, Sahu Smita Rani

Abstract


Data resilience bolster fact a decidedly necessary send aside deduplication warehouse deal with as determined is thoroughly one copy through file specifically hoarded in reach steward reciprocal separately entire owners. Thus, assuring of high data solidarity not beyond de-duplication method is an eminent quarrel and the fortitude of preceding managements enrol single-waitress conditions. We make cornerstone practice to construe program of appropriated stable corporation and ask a wonderful dispersed rehearse by more forward compliance status data chunks are dispersed crosswise assorted fluster trip attendants. Most of the real work cannot precisely cope adherence yet tag adherence contends past dispersed storehouse industry’s. The safeguard requirements of data hide longer tag docility are nevertheless achieved by deterministic deserted disposal distribution not over appropriated structures, rather than applying merging encryption like in soon structures. Our techniques see about definitions described in ask exemption wear. Distinctive feature of our order is that data certainty, counting tag rationality is achieved.


Keywords


Data Consistency; Deduplication Storage; Secret Sharing; Tag Consistency; Data Chunks; Convergent Encryption;

References


T. Dang, N. Bulusu, W. Feng, and S. Park, “DHV: Acodeconsistency maintenance protocol for multi-hop wireless sensor networks,” in Proc.6thEur.Conf.WirelessSensorNetw.,2009,pp.327–342.

G. Tolle and D. Culler, “Design of an application-cooperative management system for wireless sensor networks,” in Proc. Eur. Conf. Wireless Sensor Netw., 2005, pp. 121–132.

M. Ceriotti, G. P. Picco, A. L. Murphy, S. Guna, M. Corra, M. Pozzi, D. Zonta, and P. Zanon, “Monitoring heritage buildings with wireless sensor networks: The Torre Aquila deployment,” in Proc. IEEE Int. Conf. Inf. Process. Sensor Netw., 2009, pp. 277–288.

D. He, S. Chan, S. Tang, and M. Guizani, “Secure data discovery and dissemination based on hash tree for wireless sensor networks,” IEEE Trans. Wireless Commun., vol. 12, no. 9, pp. 4638– 4646, Sep. 2013.

P. Levis, N. Patel, D. Culler, and S. Shenker, “Trickle: A self-regulating algorithm for code maintenance and propagation in wireless sensor networks,” in Proc. 1st Conf. Symp. Netw. Syst. Design Implementation, 2004, pp. 15–28.

A. Perrig, R. Canetti, D. Song, and J. Tygar, “Efficient and secure source authentication for multicast,” in Proc. Netw. Distrib. Syst. Security Symp., 2001, pp. 35–46.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.