SlideShare a Scribd company logo
A Secure and Dynamic Multi-keyword Ranked Search
Scheme over Encrypted Cloud Data
ABSTRACT:
Due to the increasing popularity of cloud computing, more and more data owners
are motivated to outsource their data to cloud servers for great convenience and
reduced cost in data management. However, sensitive data should be encrypted
before outsourcing for privacy requirements, which obsoletes data utilization like
keyword-based document retrieval. In this paper, we present a secure multi-
keyword ranked search scheme over encrypted cloud data, which simultaneously
supports dynamic update operations like deletion and insertion of documents.
Specifically, the vector space model and the widely-used TF_IDF model are
combined in the index construction and query generation. We construct a special
tree-based index structure and propose a “Greedy Depth-first Search” algorithm to
provide efficient multi-keyword ranked search. The secure kNN algorithm is
utilized to encrypt the index and query vectors, and meanwhile ensure accurate
relevance score calculation between encrypted index and query vectors. In order to
resist statistical attacks, phantom terms are added to the index vector for blinding
search results. Due to the use of our special tree-based index structure, the
proposed scheme can achieve sub-linear search time and deal with the deletion and
insertion of documents flexibly. Extensive experiments are conducted to
demonstrate the efficiency of the proposed scheme.
EXISTING SYSTEM:
 A general approach to protect the data confidentiality is to encrypt the data
before outsourcing.
 Searchable encryption schemes enable the client to store the encrypted data
to the cloud and execute keyword search over ciphertext domain. So far,
abundant works have been proposed under different threat models to achieve
various search functionality, such as single keyword search, similarity
search, multi-keyword boolean search, ranked search, multi-keyword ranked
search, etc. Among them, multi-keyword ranked search achieves more and
more attention for its practical applicability. Recently, some dynamic
schemes have been proposed to support inserting and deleting operations on
document collection. These are significant works as it is highly possible that
the data owners need to update their data on the cloud server.
DISADVANTAGES OF EXISTING SYSTEM:
 Huge cost in terms of data usability. For example, the existing techniques on
keyword-based information retrieval, which are widely used on the plaintext
data, cannot be directly applied on the encrypted data. Downloading all the
data from the cloud and decrypt locally is obviously impractical.
 Existing System methods not practical due to their high computational
overhead for boththe cloud sever and user.
PROPOSED SYSTEM:
 This paper proposes a secure tree-based search scheme over the encrypted
cloud data, which supports multi-keyword ranked search and dynamic
operation on the document collection. Specifically, the vector space model
and the widely-used “term frequency (TF) × inverse document frequency
(IDF)” model are combined in the index construction and query generation
to provide multi-keyword ranked search. In order to obtain high search
efficiency, we construct a tree-based index structure and propose a “Greedy
Depth-first Search” algorithm based on this index tree.
 The secure kNN algorithm is utilized to encrypt the index and query vectors,
and meanwhile ensure accurate relevance score calculation between
encrypted index and query vectors.
 To resist different attacks in different threat models, we construct two secure
search schemes: the basic dynamic multi-keyword ranked search (BDMRS)
scheme in the known ciphertext model, and the enhanced dynamic multi-
keyword ranked search (EDMRS) scheme in the known background model.
ADVANTAGES OF PROPOSED SYSTEM:
 Due to the special structure of our tree-based index, the proposed search
scheme can flexibly achieve sub-linear search time and deal with the
deletion and insertion of documents.
 We design a searchable encryption scheme that supports both the accurate
multi-keyword ranked search and flexible dynamic operation on document
collection.
 Due to the special structure of our tree-based index, the search complexity of
the proposed scheme is fundamentally kept to logarithmic. And in practice,
the proposed scheme can achieve higher search efficiency by executing our
“Greedy Depth-first Search” algorithm. Moreover, parallel search can be
flexibly performed to further reduce the time costof search process.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7.
 Coding Language : ASP.net, C#.net
 Tool : Visual Studio 2010
 Database : SQL SERVER 2008
REFERENCE:
Zhihua Xia, Member, IEEE, Xinhui Wang, Xingming Sun, Senior Member, IEEE,
and Qian Wang, Member, IEEE, “A Secure and Dynamic Multi-keyword Ranked
Search Scheme over Encrypted Cloud Data”, IEEE TRANSACTIONS ON
PARALLEL AND DISTRIBUTED SYSTEMS2015.

More Related Content

PDF
Boiler auxillaries in a coal fired power plant
PDF
FCC Pocket Manual 2024.pdf iocl plant unit
PPTX
210 mw turbine cycle heat rate
PPTX
Bhel steam turbine manufacturing
PDF
Boiler Efficiency Improvement through Analysis of Losses
PPT
WUXI MAKE CFBC BOILER COLD CYCLONE
PPT
ntpc thermal power plant.ppt
PPTX
APC in thermal power plant
Boiler auxillaries in a coal fired power plant
FCC Pocket Manual 2024.pdf iocl plant unit
210 mw turbine cycle heat rate
Bhel steam turbine manufacturing
Boiler Efficiency Improvement through Analysis of Losses
WUXI MAKE CFBC BOILER COLD CYCLONE
ntpc thermal power plant.ppt
APC in thermal power plant

Viewers also liked (12)

DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
PDF
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PPTX
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PPT
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOCX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PPTX
Final 1st
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Final 1st
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
Ad

Similar to A secure and dynamic multi keyword ranked (20)

PDF
A secure and dynamic multi
PDF
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
DOCX
A secure and dynamic multi keyword ranked
DOCX
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
PDF
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
PDF
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
PDF
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
PDF
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
DOCX
Enabling fine grained multi-keyword search
DOCX
Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Clou...
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PDF
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
A secure and dynamic multi
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A secure and dynamic multi keyword ranked
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling fine grained multi-keyword search
Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Clou...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Ad

More from jpstudcorner (20)

DOCX
Variable length signature for near-duplicate
DOCX
Robust representation and recognition of facial
DOCX
Revealing the trace of high quality jpeg
DOCX
Revealing the trace of high quality jpeg
DOCX
Pareto depth for multiple-query image retrieval
DOCX
Multifocus image fusion based on nsct
DOCX
Image super resolution based on
DOCX
Fractal analysis for reduced reference
DOCX
Face sketch synthesis via sparse representation based greedy search
DOCX
Face recognition across non uniform motion
DOCX
Combining left and right palmprint images for
DOCX
A probabilistic approach for color correction
DOCX
A no reference texture regularity metric
DOCX
A feature enriched completely blind image
DOCX
Sel csp a framework to facilitate
DOCX
Query aware determinization of uncertain
DOCX
Psmpa patient self controllable
DOCX
Privacy preserving and truthful detection
DOCX
Privacy policy inference of user uploaded
DOCX
Page a partition aware engine
Variable length signature for near-duplicate
Robust representation and recognition of facial
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
Pareto depth for multiple-query image retrieval
Multifocus image fusion based on nsct
Image super resolution based on
Fractal analysis for reduced reference
Face sketch synthesis via sparse representation based greedy search
Face recognition across non uniform motion
Combining left and right palmprint images for
A probabilistic approach for color correction
A no reference texture regularity metric
A feature enriched completely blind image
Sel csp a framework to facilitate
Query aware determinization of uncertain
Psmpa patient self controllable
Privacy preserving and truthful detection
Privacy policy inference of user uploaded
Page a partition aware engine

Recently uploaded (20)

PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Digital Logic Computer Design lecture notes
PPT
Mechanical Engineering MATERIALS Selection
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Welding lecture in detail for understanding
PPTX
Construction Project Organization Group 2.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
additive manufacturing of ss316l using mig welding
PPTX
web development for engineering and engineering
PPTX
Sustainable Sites - Green Building Construction
Operating System & Kernel Study Guide-1 - converted.pdf
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Digital Logic Computer Design lecture notes
Mechanical Engineering MATERIALS Selection
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Foundation to blockchain - A guide to Blockchain Tech
Internet of Things (IOT) - A guide to understanding
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Welding lecture in detail for understanding
Construction Project Organization Group 2.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
additive manufacturing of ss316l using mig welding
web development for engineering and engineering
Sustainable Sites - Green Building Construction

A secure and dynamic multi keyword ranked

  • 1. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data ABSTRACT: Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements, which obsoletes data utilization like keyword-based document retrieval. In this paper, we present a secure multi- keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. Specifically, the vector space model and the widely-used TF_IDF model are combined in the index construction and query generation. We construct a special tree-based index structure and propose a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search. The secure kNN algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure accurate relevance score calculation between encrypted index and query vectors. In order to resist statistical attacks, phantom terms are added to the index vector for blinding search results. Due to the use of our special tree-based index structure, the
  • 2. proposed scheme can achieve sub-linear search time and deal with the deletion and insertion of documents flexibly. Extensive experiments are conducted to demonstrate the efficiency of the proposed scheme. EXISTING SYSTEM:  A general approach to protect the data confidentiality is to encrypt the data before outsourcing.  Searchable encryption schemes enable the client to store the encrypted data to the cloud and execute keyword search over ciphertext domain. So far, abundant works have been proposed under different threat models to achieve various search functionality, such as single keyword search, similarity search, multi-keyword boolean search, ranked search, multi-keyword ranked search, etc. Among them, multi-keyword ranked search achieves more and more attention for its practical applicability. Recently, some dynamic schemes have been proposed to support inserting and deleting operations on document collection. These are significant works as it is highly possible that the data owners need to update their data on the cloud server.
  • 3. DISADVANTAGES OF EXISTING SYSTEM:  Huge cost in terms of data usability. For example, the existing techniques on keyword-based information retrieval, which are widely used on the plaintext data, cannot be directly applied on the encrypted data. Downloading all the data from the cloud and decrypt locally is obviously impractical.  Existing System methods not practical due to their high computational overhead for boththe cloud sever and user. PROPOSED SYSTEM:  This paper proposes a secure tree-based search scheme over the encrypted cloud data, which supports multi-keyword ranked search and dynamic operation on the document collection. Specifically, the vector space model and the widely-used “term frequency (TF) × inverse document frequency (IDF)” model are combined in the index construction and query generation to provide multi-keyword ranked search. In order to obtain high search efficiency, we construct a tree-based index structure and propose a “Greedy Depth-first Search” algorithm based on this index tree.
  • 4.  The secure kNN algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure accurate relevance score calculation between encrypted index and query vectors.  To resist different attacks in different threat models, we construct two secure search schemes: the basic dynamic multi-keyword ranked search (BDMRS) scheme in the known ciphertext model, and the enhanced dynamic multi- keyword ranked search (EDMRS) scheme in the known background model. ADVANTAGES OF PROPOSED SYSTEM:  Due to the special structure of our tree-based index, the proposed search scheme can flexibly achieve sub-linear search time and deal with the deletion and insertion of documents.  We design a searchable encryption scheme that supports both the accurate multi-keyword ranked search and flexible dynamic operation on document collection.  Due to the special structure of our tree-based index, the search complexity of the proposed scheme is fundamentally kept to logarithmic. And in practice, the proposed scheme can achieve higher search efficiency by executing our “Greedy Depth-first Search” algorithm. Moreover, parallel search can be flexibly performed to further reduce the time costof search process.
  • 5. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.
  • 6.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : ASP.net, C#.net  Tool : Visual Studio 2010  Database : SQL SERVER 2008 REFERENCE: Zhihua Xia, Member, IEEE, Xinhui Wang, Xingming Sun, Senior Member, IEEE, and Qian Wang, Member, IEEE, “A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS2015.