Project centers in Chennai

IEEE Final Year Project Topics for CSE

Base Paper Title

SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams

Our Title

IEEE Project Abstract

Resource constrained sensing devices are being used widely to build and deploy self-organizing wireless sensor networks for a variety of critical applications such as smart cities, smart health, precision agriculture and industrial control systems. Many such devices sense the deployed environment and generate a variety of data and send them to the server for analysis as data streams. A Data Stream Manager (DSM) at the server collects the data streams (often called big data) to perform real time analysis and decision-making for these critical applications. A malicious adversary may access or tamper with the data in transit. One of the challenging tasks in such applications is to assure the trustworthiness of the collected data so that any decisions are made on the processing of correct data. Assuring high data trustworthiness requires that the system satisfies two key security properties: confidentiality and integrity. To ensure the confidentiality of collected data, we need to prevent sensitive information from reaching the wrong people by ensuring that the right people are getting it. Sensed data are always associated with different sensitivity levels based on the sensitivity of emerging applications or the sensed data types or the sensing devices. For example, a temperature in a precision agriculture application may not be as sensitive as monitored data in smart health. Providing multilevel data confidentiality along with data integrity for big sensing data streams in the context of near real time analytics is a challenging problem. In this paper, we propose a Selective Encryption (SEEN) method to secure big sensing data streams that satisfies the desired multiple levels of confidentiality and data integrity. Our method is based on two key concepts: common shared keys that are initialized and updated by DSM without requiring retransmission, and a seamless key refreshment process without interrupting the data stream encryption/decryption. Theoretical analyses and experimental results of our SEEN method show that it can significantly improve the efficiency and buffer usage at DSM without compromising the confidentiality and integrity of the data streams.

Existing System

Drawback of Existing System

Proposed System

Advantage of Proposed System

Enhancement from Base Paper


Technology Used : Hardware & Software

Existing Algorithm

Proposed Algorithm

Advantages of Proposed Algorithm

Project Modules

Literature Survey


Future Work

To View the Base Paper Abstract Contents

Refer Your Friend
Refer Another Friend
Thanks for Referring Your Friend / Relation

Now it is Your Time to Shine.

Great careers Start Here.

We Guide you to Every Step

Success! You're Awesome

Thank you for filling out your information!

We’ve sent you an email with your Final Year Project PPT file download link at the email address you provided. Please enjoy, and let us know if there’s anything else we can help you with.

To know more details Call 900 31 31 555

The WISEN Team