SlideShare a Scribd company logo
Amrutvahini College Of Engineering, Sangamner
Department Of Information Technology
“ACCURATE AND EFFICIENT DYNAMIC MULTI-KEYWORD
RANKED SEARCH SCHEME”
A
PRESENTATION
ON
Group Members:
Mr. Swain Dakshineshwar S.
Mr. Chabukswar Akash J.
Mr. Tayade Avinash T.
Mr. Shermale Sachin S.
Guided By: Mr. R.N. Devikar
PROBLEM STATEMENT
• Accurate and Efficient Dynamic Multi-Keyword Ranked Search Scheme.
• How to achieve accurate result?
• How do we make our search scheme efficient?
ABSTRACT
• With the development of cloud computing, the sensitive information of
outsourced data is at risk of unauthorized accesses.
• To protect data privacy, the sensitive data should be encrypted by the data
owner before outsourcing, which makes the traditional and efficient
plaintext keyword search technique useless. Hence, it is an especially
important thing to explore secure encrypted cloud data search service.
• We introduce a practically efficient and flexible searchable encrypted
scheme which supports multi-keyword ranked search.
INTRODUCTION
• Cloud Computing is a new but increasingly mature model of enterprise IT
infrastructure that provides on-demand high quality applications and
services from a shared pool of configuration computing resources.
• Unauthorized operation on the outsourced data may exist on account of
curiosity or profit.
• To protect the privacy of sensitive information, sensitive data (e.g., emails,
photo albums, personal health records, financial records, etc.) should be
encrypted by the data owner before outsourcing.
• We intoduce a practically efficient and flexible searchable encrypted
scheme.
LITERATURE SURVEY
Sr.
No.
Reference Name
(IEEE/ACM/Spring
er/Any other
journal, etc. Paper
Title)
Work description Problems found Publication
year
1 K. Ren, C.Wang, Q.Wang et
al., “Security challenges for
the public cloud,” IEEE
Internet Computing, vol. 16,
no. 1, pp. 69–73, 2012. [2]
This article is intended as a call
for action to motivate further
investigation of the many
challenging security issues
that will impact the public
cloud’s future.
The existing system outline
several critical security
challenges .
2012
2 D. Boneh, G. Di Crescenzo, R.
Ostrovsky, and G. Persiano,
“Public
key encryption with keyword
search,” in Advances in
Cryptology-
Eurocrypt 2004. Springer,
2004, pp. 506–522. [3]
This paper constructs an efficient
system.
The problem of searching
on data that is encrypted
using a public key system.
2004
LITERATURE SURVEY
Sr.
No.
Reference Name
(IEEE/ACM/Springe
r/Any other journal,
etc. Paper Title)
Work description Problems found Publication
year
3 Jia Zhao, Kun Yang,“A Heuristic
Clustering-Based Task
Deployment Approach for
Load Balancing Using Bayes
Theorem in Cloud
Environment”, 2016, pp. 50–
67. [4]
The proposed approach has
reduced the failure number of
task deployment events
obviously, improved the
throughput, and optimized the
external services performance
of cloud data centers.
Doesn’t guarantee high
execution efficiency.
2016
4 D. X. Song, D. Wagner, and A.
Perrig, “Practical techniques
for searches on encrypted
data,” in Security and Privacy,
2000. S&P 2000. Proceedings.
2000 IEEE Symposium on.
IEEE, 2000, pp. 44–55. [5]
This paper proposes
cryptographic schemes for the
problem of searching on
encrypted data and provide
proofs of security for the
resulting crypto systems.
The problem of searching
on data that is encrypted
using a public key system.
2000
Methodology
Modules Splits-up
• Cloud Module
• User Module
• Data Owner Module
• Registration Module
Design/Algorithm
Login
Valid User
Get Information
Condition
Sign Up
Yes
False
AdminUser
Add File
Add Details
Search
Begin
End
Add informaiton
Add Source
Data Base
Proposed System
• A secure tree-based search scheme over the encrypted cloud data, which
supports multi-keyword ranked search and dynamic operation on the
document collection.
• To address multi-keyword search and result ranking, we use Vector Space
Model (VSM) to build document index.
• To improve search efficiency, we construct a tree-based index structure
based on the document index vectors and propose a “Greedy Depth-first
Search” algorithm based on this index tree.
• To rank the documents, we will be using TF-IDF scores.
• Our encryption scheme will meet the privacy requirements.
Software Tools/Technology
• Operating system : Windows 8.1
• Coding Language : JAVA/J2EE
• Databases : DriveHQ, MySql
• Server : Tomcat
• IDE : Eclipse Mars
Proposed Outcomes
• User will be able to use our searchable encryption scheme that supports
accurate and efficient multi-keyword ranked search .
• They will be able to perform dynamic operation on document collection.
• They will be able to retrieve their documents within a fraction of seconds
with accurate results.
REFERENCES
1) Zhihua Xia, Member, IEEE, Xinhui Wang, Xingming Sun, Senior Member,
IEEE, and Qian Wang, Member, IEEE, “A Secure and Dynamic Multi-
keyword Ranked Search Scheme over Encrypted Cloud Data”, IEEE
TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2015.
2) K. Ren, C.Wang, Q.Wang et al., “Security challenges for the public cloud,”
IEEE Internet Computing, vol. 16, no. 1, pp. 69–73, 2012.
3) D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key
encryption with keyword search,” in Advances in Cryptology-Eurocrypt
2004. Springer, 2004, pp. 506–522.
4) Jia Zhao, Kun Yang,“A Heuristic Clustering-Based Task Deployment
Approach for Load Balancing Using Bayes Theorem in Cloud
Environment”, 2016, pp. 50–67.
5) D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on
encrypted data,” in Security and Privacy, 2000. S&P 2000. Proceedings.
2000 IEEE Symposium on. IEEE, 2000, pp. 44–55.
THANK YOU

More Related Content

DOCX
A secure and dynamic multi keyword ranked
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PPTX
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
PPTX
Final 1st
PPT
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Final 1st
Privacy preserving multi-keyword ranked search over encrypted cloud data
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Privacy preserving multi-keyword ranked search over encrypted cloud data
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...

What's hot (19)

DOCX
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOCX
privacy preserving multi keyword ranked search over encrypted cloud data
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
PDF
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOCX
Enabling secure and efficient ranked keyword
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PDF
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOCX
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
DOCX
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
DOCX
ENABLING EFFICIENT MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED MOBILE CLOUD D...
Privacy preserving multi-keyword ranked search over encrypted cloud data
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Privacy preserving multi-keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud data
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Enabling secure and efficient ranked keyword
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
ENABLING EFFICIENT MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED MOBILE CLOUD D...
Ad

Viewers also liked (6)

PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PPTX
Modelling and Analysis of User Behaviour in Online Communities
PDF
Bdd and Scrum Team Dynamics
PPTX
ppt of group dynamics
Privacy preserving multi-keyword ranked search over encrypted cloud data
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Modelling and Analysis of User Behaviour in Online Communities
Bdd and Scrum Team Dynamics
ppt of group dynamics
Ad

Similar to Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search (20)

DOCX
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
PDF
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
DOCX
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
PDF
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
PDF
Data Search in Cloud using the Encrypted Keywords
PDF
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
PDF
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
PDF
Efficient Similarity Search Over Encrypted Data
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
PDF
Efficient Similarity Search over Encrypted Data
PDF
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
PDF
Enabling efficient multi keyword ranked
PDF
Efficient and Empiric Keyword Search Using Cloud
PDF
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
PDF
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTION...
PDF
Paper id 28201425
PDF
Multi-Keyword Ranked Search in Encrypted Cloud Storage
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
Data Search in Cloud using the Encrypted Keywords
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Efficient Similarity Search Over Encrypted Data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Efficient Similarity Search over Encrypted Data
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
Enabling efficient multi keyword ranked
Efficient and Empiric Keyword Search Using Cloud
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTION...
Paper id 28201425
Multi-Keyword Ranked Search in Encrypted Cloud Storage

Recently uploaded (20)

PPTX
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
PPTX
Introduction-to-Food-Packaging-and-packaging -materials.pptx
DOCX
ENGLISH PROJECT FOR BINOD BIHARI MAHTO KOYLANCHAL UNIVERSITY
PDF
Swiggy’s Playbook: UX, Logistics & Monetization
PPTX
INTERNATIONAL LABOUR ORAGNISATION PPT ON SOCIAL SCIENCE
PPTX
water for all cao bang - a charity project
PPTX
chapter8-180915055454bycuufucdghrwtrt.pptx
PPTX
Anesthesia and it's stage with mnemonic and images
PPTX
Project and change Managment: short video sequences for IBA
PPT
The Effect of Human Resource Management Practice on Organizational Performanc...
PPTX
The spiral of silence is a theory in communication and political science that...
PPTX
Human Mind & its character Characteristics
PDF
Presentation1 [Autosaved].pdf diagnosiss
PDF
Tunisia's Founding Father(s) Pitch-Deck 2022.pdf
PPTX
lesson6-211001025531lesson plan ppt.pptx
PPTX
AcademyNaturalLanguageProcessing-EN-ILT-M02-Introduction.pptx
PPTX
Impressionism_PostImpressionism_Presentation.pptx
PPTX
Emphasizing It's Not The End 08 06 2025.pptx
PPTX
S. Anis Al Habsyi & Nada Shobah - Klasifikasi Hambatan Depresi.pptx
PPTX
PHIL.-ASTRONOMY-AND-NAVIGATION of ..pptx
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
Introduction-to-Food-Packaging-and-packaging -materials.pptx
ENGLISH PROJECT FOR BINOD BIHARI MAHTO KOYLANCHAL UNIVERSITY
Swiggy’s Playbook: UX, Logistics & Monetization
INTERNATIONAL LABOUR ORAGNISATION PPT ON SOCIAL SCIENCE
water for all cao bang - a charity project
chapter8-180915055454bycuufucdghrwtrt.pptx
Anesthesia and it's stage with mnemonic and images
Project and change Managment: short video sequences for IBA
The Effect of Human Resource Management Practice on Organizational Performanc...
The spiral of silence is a theory in communication and political science that...
Human Mind & its character Characteristics
Presentation1 [Autosaved].pdf diagnosiss
Tunisia's Founding Father(s) Pitch-Deck 2022.pdf
lesson6-211001025531lesson plan ppt.pptx
AcademyNaturalLanguageProcessing-EN-ILT-M02-Introduction.pptx
Impressionism_PostImpressionism_Presentation.pptx
Emphasizing It's Not The End 08 06 2025.pptx
S. Anis Al Habsyi & Nada Shobah - Klasifikasi Hambatan Depresi.pptx
PHIL.-ASTRONOMY-AND-NAVIGATION of ..pptx

Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search

  • 1. Amrutvahini College Of Engineering, Sangamner Department Of Information Technology “ACCURATE AND EFFICIENT DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME” A PRESENTATION ON Group Members: Mr. Swain Dakshineshwar S. Mr. Chabukswar Akash J. Mr. Tayade Avinash T. Mr. Shermale Sachin S. Guided By: Mr. R.N. Devikar
  • 2. PROBLEM STATEMENT • Accurate and Efficient Dynamic Multi-Keyword Ranked Search Scheme. • How to achieve accurate result? • How do we make our search scheme efficient?
  • 3. ABSTRACT • With the development of cloud computing, the sensitive information of outsourced data is at risk of unauthorized accesses. • To protect data privacy, the sensitive data should be encrypted by the data owner before outsourcing, which makes the traditional and efficient plaintext keyword search technique useless. Hence, it is an especially important thing to explore secure encrypted cloud data search service. • We introduce a practically efficient and flexible searchable encrypted scheme which supports multi-keyword ranked search.
  • 4. INTRODUCTION • Cloud Computing is a new but increasingly mature model of enterprise IT infrastructure that provides on-demand high quality applications and services from a shared pool of configuration computing resources. • Unauthorized operation on the outsourced data may exist on account of curiosity or profit. • To protect the privacy of sensitive information, sensitive data (e.g., emails, photo albums, personal health records, financial records, etc.) should be encrypted by the data owner before outsourcing. • We intoduce a practically efficient and flexible searchable encrypted scheme.
  • 5. LITERATURE SURVEY Sr. No. Reference Name (IEEE/ACM/Spring er/Any other journal, etc. Paper Title) Work description Problems found Publication year 1 K. Ren, C.Wang, Q.Wang et al., “Security challenges for the public cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69–73, 2012. [2] This article is intended as a call for action to motivate further investigation of the many challenging security issues that will impact the public cloud’s future. The existing system outline several critical security challenges . 2012 2 D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Advances in Cryptology- Eurocrypt 2004. Springer, 2004, pp. 506–522. [3] This paper constructs an efficient system. The problem of searching on data that is encrypted using a public key system. 2004
  • 6. LITERATURE SURVEY Sr. No. Reference Name (IEEE/ACM/Springe r/Any other journal, etc. Paper Title) Work description Problems found Publication year 3 Jia Zhao, Kun Yang,“A Heuristic Clustering-Based Task Deployment Approach for Load Balancing Using Bayes Theorem in Cloud Environment”, 2016, pp. 50– 67. [4] The proposed approach has reduced the failure number of task deployment events obviously, improved the throughput, and optimized the external services performance of cloud data centers. Doesn’t guarantee high execution efficiency. 2016 4 D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on. IEEE, 2000, pp. 44–55. [5] This paper proposes cryptographic schemes for the problem of searching on encrypted data and provide proofs of security for the resulting crypto systems. The problem of searching on data that is encrypted using a public key system. 2000
  • 8. Modules Splits-up • Cloud Module • User Module • Data Owner Module • Registration Module
  • 9. Design/Algorithm Login Valid User Get Information Condition Sign Up Yes False AdminUser Add File Add Details Search Begin End Add informaiton Add Source Data Base
  • 10. Proposed System • A secure tree-based search scheme over the encrypted cloud data, which supports multi-keyword ranked search and dynamic operation on the document collection. • To address multi-keyword search and result ranking, we use Vector Space Model (VSM) to build document index. • To improve search efficiency, we construct a tree-based index structure based on the document index vectors and propose a “Greedy Depth-first Search” algorithm based on this index tree. • To rank the documents, we will be using TF-IDF scores. • Our encryption scheme will meet the privacy requirements.
  • 11. Software Tools/Technology • Operating system : Windows 8.1 • Coding Language : JAVA/J2EE • Databases : DriveHQ, MySql • Server : Tomcat • IDE : Eclipse Mars
  • 12. Proposed Outcomes • User will be able to use our searchable encryption scheme that supports accurate and efficient multi-keyword ranked search . • They will be able to perform dynamic operation on document collection. • They will be able to retrieve their documents within a fraction of seconds with accurate results.
  • 13. REFERENCES 1) Zhihua Xia, Member, IEEE, Xinhui Wang, Xingming Sun, Senior Member, IEEE, and Qian Wang, Member, IEEE, “A Secure and Dynamic Multi- keyword Ranked Search Scheme over Encrypted Cloud Data”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2015. 2) K. Ren, C.Wang, Q.Wang et al., “Security challenges for the public cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69–73, 2012. 3) D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Advances in Cryptology-Eurocrypt 2004. Springer, 2004, pp. 506–522. 4) Jia Zhao, Kun Yang,“A Heuristic Clustering-Based Task Deployment Approach for Load Balancing Using Bayes Theorem in Cloud Environment”, 2016, pp. 50–67. 5) D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on. IEEE, 2000, pp. 44–55.