SlideShare a Scribd company logo
DATA ALCOTT SYSTEMS www.finalsemprojects.com 09600095046
www.ns2projects.com dataalcott@gmail.com
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH
SUPPORTING CLASSIFIED SUB-DICTIONARIES OVER ENCRYPTED
CLOUD DATA
DATA ALCOTT SYSTEMS www.finalsemprojects.com 09600095046
www.ns2projects.com dataalcott@gmail.com
ABSTRACT
Using cloud computing, individuals can store their data on remote servers and
allow data access to public users through the cloud servers. As the outsourced data
are likely to contain sensitive privacy information, they are typically encrypted
before uploaded to the cloud. This, however, significantly limits the usability of
outsourced data due to the difficulty of searching over the encrypted data. Fine-
grained multi-keyword search schemes over encrypted cloud data is developed.
Original contributions are three-fold. First, relevance scores and preference factors
are introduced upon keywords which enable the precise keyword search and
personalized user experience. Second, a practical and very efficient multi-keyword
search scheme is developed. The proposed scheme can support complicated logic
search the mixed “AND”, “OR” and “NO” operations of keywords. Third,
classified sub-dictionaries technique is employed to achieve better efficiency on
index building, trapdoor generating and query. Lastly, the security of the proposed
schemes is analyzed in terms of confidentiality of documents, privacy protection of
index and trapdoor, and unlinkability of trapdoor.
DATA ALCOTT SYSTEMS www.finalsemprojects.com 09600095046
www.ns2projects.com dataalcott@gmail.com
INTRODUCTION
The cloud computing treats computing as a utility and leases out the computing
and storage capacities to the public individuals. In such a framework, the
individual can remotely store her data on the cloud server, namely data
outsourcing, and then make the cloud data open for public access through the cloud
server. This represents a more scalable, low-cost and stable way for public data
access because of the scalability and high efficiency of cloud servers, and therefore
is favorable to small enterprises. Note that the outsourced data may contain
sensitive privacy information. It is often necessary to encrypt the private data
before transmitting the data to the cloud servers.
The data encryption, however, would significantly lower the usability of data due
to the difficulty of searching over the encrypted data. Simply encrypting the data
may still cause other security concerns. For instance, Google Search uses SSL
(Secure Sockets Layer) to encrypt the connection between search user and Google
server when private data, such as documents and emails, appear in the search
results.
However, if the search user clicks into another website from the search results
page, that website may be able to identify the search terms that the user has used.
On addressing above issues, the searchable encryption has been recently developed
as a fundamental approach to enable searching over encrypted cloud data, which
proceeds the following operations. Firstly, the data owner needs to generate several
keywords according to the outsourced data. These keywords are then encrypted
DATA ALCOTT SYSTEMS www.finalsemprojects.com 09600095046
www.ns2projects.com dataalcott@gmail.com
and stored at the cloud server. When a search user needs to access the outsourced
data, it can select some relevant keywords and send the ciphertext of the selected
keywords to the cloud server. The cloud server then uses the ciphertext to match
the outsourced encrypted keywords, and lastly returns the matching results to the
search user.
EXISTING SYSTEM
 Wang et al. propose a ranked keyword search scheme which considers the
relevance scores of keywords. Unfortunately, due to using order-preserving
encryption (OPE) to achieve the ranking property, the proposed scheme
cannot achieve unlinkability of trapdoor.
 Sun et al. propose a multi-keyword text search scheme which considers the
relevance scores of keywords and utilizes a multidimensional tree technique
to achieve efficient search query.
 Yu et al. propose a multi-keyword top-k retrieval scheme which uses fully
homomorphic encryption to encrypt the index/trapdoor and guarantees high
security.
 Cao et al. propose a multi-keyword ranked search (MRSE), which applies
coordinate machine as the keyword matching rule, i.e., return data with the
most matching keywords.
 Cao et al. propose the coordinate matching search scheme (MRSE) which
can be regarded as a searchable encryption scheme with “OR” operation.
DATA ALCOTT SYSTEMS www.finalsemprojects.com 09600095046
www.ns2projects.com dataalcott@gmail.com
 Zhang et al. propose a conjunctive keyword search scheme which can be
regarded as a searchable encryption scheme with “AND” operation with the
returned documents matching all keywords.
DATA ALCOTT SYSTEMS www.finalsemprojects.com 09600095046
www.ns2projects.com dataalcott@gmail.com
Disadvantages
 Difficult for searchable encryption to achieve the same user experience as
that of the plaintext search, like Google search.
 Query with user preferences is very popular in the plaintext search. It
enables personalized search and can more accurately represent user’s
requirements, but has not been thoroughly studied and supported in the
encrypted data domain.
 To further improve the user’s experience on searching, an important and
fundamental function is to enable the multi-keyword search with the
comprehensive logic operations, i.e., the “AND”, “OR” and “NO”
operations of keywords.
 Existing proposals can only enable search with single logic operation, rather
than the mixture of multiple logic operations on keywords.
DATA ALCOTT SYSTEMS www.finalsemprojects.com 09600095046
www.ns2projects.com dataalcott@gmail.com
PROPOSED SYSTEM
 Fine-grained Multi-keyword Search (FMS) schemes is proposed over
encrypted cloud data.
 Introduced the relevance scores and the preference factors of keywords for
searchable encryption. The relevance scores of keywords can enable more
precise returned results, and the preference factors of keywords represent the
importance of keywords in the search keyword set specified by search users
and correspondingly enables personalized search to cater to specific user
preferences. It thus further improves the search functionalities and user
experience.
 It is realized the “AND”, “OR” and “NO” operations in the multi-keyword
search for searchable encryption.
 Classified sub-dictionaries technique to enhance the efficiency of the above
two schemes.
Advantages
 Proposed scheme can achieve more comprehensive functionality and lower
query complexity.
DATA ALCOTT SYSTEMS www.finalsemprojects.com 09600095046
www.ns2projects.com dataalcott@gmail.com
HARDWARE REQUIREMENTS
Processor : Any Processor above 500 MHz.
Ram : 128Mb.
Hard Disk : 10 Gb.
Compact Disk : 650 Mb.
Input device : Standard Keyboard and Mouse.
Output device : VGA and High Resolution Monitor.
SOFTWARE SPECIFICATION
Operating System : Windows Family.
Techniques : JDK 1.5 or higher
Database : MySQL 5.0

More Related Content

DOCX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOCX
Enabling secure and efficient ranked keyword
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Privacy preserving multi-keyword ranked search over encrypted cloud data
Enabling secure and efficient ranked keyword
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...

What's hot (20)

PPT
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PPTX
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
DOCX
A secure and dynamic multi keyword ranked
PDF
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
DOCX
Enabling fine grained multi-keyword search
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PPTX
Final 1st
PPTX
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOCX
privacy preserving multi keyword ranked search over encrypted cloud data
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
DOCX
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
DOCX
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Privacy preserving multi-keyword ranked search over encrypted cloud data
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Enabling fine grained multi-keyword search
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Final 1st
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Privacy preserving multi-keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud data
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Ad

Similar to Enabling fine grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data (20)

DOCX
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
PDF
J017547478
DOCX
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
DOC
privacy-preserving multi-keyword ranked search
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
A secure and dynamic multi
PDF
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
PDF
O01761103112
PDF
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
PDF
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
DOCX
Towards secure multi keyword top-k retrieval over encrypted cloud data
PDF
Retrieving Secure Data from Cloud Using OTP
PDF
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
PDF
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
J017547478
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
privacy-preserving multi-keyword ranked search
Privacy preserving multi-keyword ranked search over encrypted cloud data
A secure and dynamic multi
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
O01761103112
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
Privacy preserving multi-keyword ranked search over encrypted cloud data
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Towards secure multi keyword top-k retrieval over encrypted cloud data
Retrieving Secure Data from Cloud Using OTP
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ad

Recently uploaded (20)

PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
RMMM.pdf make it easy to upload and study
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
1_English_Language_Set_2.pdf probationary
PDF
Hazard Identification & Risk Assessment .pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
Empowerment Technology for Senior High School Guide
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
IGGE1 Understanding the Self1234567891011
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Introduction to Building Materials
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
LDMMIA Reiki Yoga Finals Review Spring Summer
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
RMMM.pdf make it easy to upload and study
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
A powerpoint presentation on the Revised K-10 Science Shaping Paper
1_English_Language_Set_2.pdf probationary
Hazard Identification & Risk Assessment .pdf
What if we spent less time fighting change, and more time building what’s rig...
Empowerment Technology for Senior High School Guide
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
IGGE1 Understanding the Self1234567891011
Final Presentation General Medicine 03-08-2024.pptx
Chinmaya Tiranga quiz Grand Finale.pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Weekly quiz Compilation Jan -July 25.pdf
Introduction to Building Materials
Supply Chain Operations Speaking Notes -ICLT Program
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE

Enabling fine grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data

  • 1. DATA ALCOTT SYSTEMS www.finalsemprojects.com 09600095046 www.ns2projects.com dataalcott@gmail.com ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONARIES OVER ENCRYPTED CLOUD DATA
  • 2. DATA ALCOTT SYSTEMS www.finalsemprojects.com 09600095046 www.ns2projects.com dataalcott@gmail.com ABSTRACT Using cloud computing, individuals can store their data on remote servers and allow data access to public users through the cloud servers. As the outsourced data are likely to contain sensitive privacy information, they are typically encrypted before uploaded to the cloud. This, however, significantly limits the usability of outsourced data due to the difficulty of searching over the encrypted data. Fine- grained multi-keyword search schemes over encrypted cloud data is developed. Original contributions are three-fold. First, relevance scores and preference factors are introduced upon keywords which enable the precise keyword search and personalized user experience. Second, a practical and very efficient multi-keyword search scheme is developed. The proposed scheme can support complicated logic search the mixed “AND”, “OR” and “NO” operations of keywords. Third, classified sub-dictionaries technique is employed to achieve better efficiency on index building, trapdoor generating and query. Lastly, the security of the proposed schemes is analyzed in terms of confidentiality of documents, privacy protection of index and trapdoor, and unlinkability of trapdoor.
  • 3. DATA ALCOTT SYSTEMS www.finalsemprojects.com 09600095046 www.ns2projects.com dataalcott@gmail.com INTRODUCTION The cloud computing treats computing as a utility and leases out the computing and storage capacities to the public individuals. In such a framework, the individual can remotely store her data on the cloud server, namely data outsourcing, and then make the cloud data open for public access through the cloud server. This represents a more scalable, low-cost and stable way for public data access because of the scalability and high efficiency of cloud servers, and therefore is favorable to small enterprises. Note that the outsourced data may contain sensitive privacy information. It is often necessary to encrypt the private data before transmitting the data to the cloud servers. The data encryption, however, would significantly lower the usability of data due to the difficulty of searching over the encrypted data. Simply encrypting the data may still cause other security concerns. For instance, Google Search uses SSL (Secure Sockets Layer) to encrypt the connection between search user and Google server when private data, such as documents and emails, appear in the search results. However, if the search user clicks into another website from the search results page, that website may be able to identify the search terms that the user has used. On addressing above issues, the searchable encryption has been recently developed as a fundamental approach to enable searching over encrypted cloud data, which proceeds the following operations. Firstly, the data owner needs to generate several keywords according to the outsourced data. These keywords are then encrypted
  • 4. DATA ALCOTT SYSTEMS www.finalsemprojects.com 09600095046 www.ns2projects.com dataalcott@gmail.com and stored at the cloud server. When a search user needs to access the outsourced data, it can select some relevant keywords and send the ciphertext of the selected keywords to the cloud server. The cloud server then uses the ciphertext to match the outsourced encrypted keywords, and lastly returns the matching results to the search user. EXISTING SYSTEM  Wang et al. propose a ranked keyword search scheme which considers the relevance scores of keywords. Unfortunately, due to using order-preserving encryption (OPE) to achieve the ranking property, the proposed scheme cannot achieve unlinkability of trapdoor.  Sun et al. propose a multi-keyword text search scheme which considers the relevance scores of keywords and utilizes a multidimensional tree technique to achieve efficient search query.  Yu et al. propose a multi-keyword top-k retrieval scheme which uses fully homomorphic encryption to encrypt the index/trapdoor and guarantees high security.  Cao et al. propose a multi-keyword ranked search (MRSE), which applies coordinate machine as the keyword matching rule, i.e., return data with the most matching keywords.  Cao et al. propose the coordinate matching search scheme (MRSE) which can be regarded as a searchable encryption scheme with “OR” operation.
  • 5. DATA ALCOTT SYSTEMS www.finalsemprojects.com 09600095046 www.ns2projects.com dataalcott@gmail.com  Zhang et al. propose a conjunctive keyword search scheme which can be regarded as a searchable encryption scheme with “AND” operation with the returned documents matching all keywords.
  • 6. DATA ALCOTT SYSTEMS www.finalsemprojects.com 09600095046 www.ns2projects.com dataalcott@gmail.com Disadvantages  Difficult for searchable encryption to achieve the same user experience as that of the plaintext search, like Google search.  Query with user preferences is very popular in the plaintext search. It enables personalized search and can more accurately represent user’s requirements, but has not been thoroughly studied and supported in the encrypted data domain.  To further improve the user’s experience on searching, an important and fundamental function is to enable the multi-keyword search with the comprehensive logic operations, i.e., the “AND”, “OR” and “NO” operations of keywords.  Existing proposals can only enable search with single logic operation, rather than the mixture of multiple logic operations on keywords.
  • 7. DATA ALCOTT SYSTEMS www.finalsemprojects.com 09600095046 www.ns2projects.com dataalcott@gmail.com PROPOSED SYSTEM  Fine-grained Multi-keyword Search (FMS) schemes is proposed over encrypted cloud data.  Introduced the relevance scores and the preference factors of keywords for searchable encryption. The relevance scores of keywords can enable more precise returned results, and the preference factors of keywords represent the importance of keywords in the search keyword set specified by search users and correspondingly enables personalized search to cater to specific user preferences. It thus further improves the search functionalities and user experience.  It is realized the “AND”, “OR” and “NO” operations in the multi-keyword search for searchable encryption.  Classified sub-dictionaries technique to enhance the efficiency of the above two schemes. Advantages  Proposed scheme can achieve more comprehensive functionality and lower query complexity.
  • 8. DATA ALCOTT SYSTEMS www.finalsemprojects.com 09600095046 www.ns2projects.com dataalcott@gmail.com HARDWARE REQUIREMENTS Processor : Any Processor above 500 MHz. Ram : 128Mb. Hard Disk : 10 Gb. Compact Disk : 650 Mb. Input device : Standard Keyboard and Mouse. Output device : VGA and High Resolution Monitor. SOFTWARE SPECIFICATION Operating System : Windows Family. Techniques : JDK 1.5 or higher Database : MySQL 5.0