SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
FUZZY KEYWORD SEARCH 
ABSTRACT 
As Cloud Computing becomes prevalent, more and more sensitive information are being 
centralized into the cloud. For the protection of data privacy, sensitive data usually have to be 
encrypted before outsourcing, which makes effective data utilization a very challenging task. 
Although traditional searchable encryption schemes allow a user to securely search over 
encrypted data through keywords and selectively retrieve files of interest, these techniques 
support only exact keyword search. That is, there is no tolerance of minor types and format 
inconsistencies which, on the other hand, are typical user searching behavior and happen very 
frequently. This significant drawback makes existing techniques unsuitable in Cloud Computing 
as it greatly affects system usability, rendering user searching experiences very frustrating and 
system efficacy very low. In this paper, for the first time we formalize and solve the problem of 
effective fuzzy keyword search over encrypted cloud data while maintaining keyword privacy. 
Fuzzy keyword search greatly enhances system usability by returning the matching files when 
users’ searching inputs exactly match the predefined keywords or the closest possible matching 
files based on keyword similarity semantics, when exact match fails. In our solution, we exploit 
edit distance to quantify keywords similarity and develop two advanced techniques on 
constructing fuzzy keyword sets, which achieve optimized storage and representation overheads.
We further propose a brand new symbol-based trie-traverse searching scheme, where a multi-way 
tree structure is built up using symbols transformed from the resulted fuzzy keyword sets. 
Through rigorous security analysis, we show that our proposed solution is secure and privacy-preserving, 
while correctly realizing the goal of fuzzy keyword search. Extensive experimental 
results demonstrate the efficiency of the proposed solution. 
Introduction 
Cloud Computing, the new term for the long dreamed vision of computing as a utility, enables 
convenient, on-demand network access to a centralized pool of configurable computing 
resources (e.g., networks, applications, and services) that can be rapidly deployed with great 
efficiency and minimal management overhead . The amazing advantages of Cloud Computing 
include: on-demand self-service, ubiquitous network access, location independent resource 
pooling, rapid resource elasticity, usage-based pricing, transference of risk, etc. Thus, Cloud 
Computing could easily benefit its users in avoiding large capital outlays in the deployment and 
management of both software and hardware. Undoubtedly, Cloud Computing brings 
unprecedented paradigm shifting and benefits in the history of IT. As Cloud Computing becomes 
prevalent, more and more sensitive information are being centralized into the cloud, such as 
emails, personal health records, private videos and photos, company finance data, government 
documents, etc. By storing their data into the cloud, the data owners can be relieved from the 
burden of data storage and maintenance so as to enjoy the on-demand high quality data storage 
service. However, the fact that data owners and cloud server are not in the same trusted domain 
may put the outsourced data at risk, as the cloud server may no longer be fully trusted in such a 
cloud environment due to a number of reasons: the cloud server may leak data information to 
unauthorized entities or be hacked. It follows that sensitive data usually should be encrypted 
prior to outsourcing for data privacy and combating unsolicited accesses. 
System Architecture
Here the Data Owner stores her/she personal Data in cloud server in the form of Encrypted files 
for security purpose, and then Users retrieve the data by searching based on the keywords. 
Existing System: 
Although allowing for performing searches securely and effectively, the existing searchable 
encryption techniques do not suit for cloud computing scenario since they support only exact 
keyword search. As common practice, users may search and retrieve the data of their respective 
interests using any keywords they might come up with. It is quite common that users’ searching 
input might not exactly match those pre-set keywords due to the possible types, such as Illinois 
and Ilinois, representation inconsistencies, such as PO BOX and P.O. Box, and/or her lack of 
exact knowledge about the data. To give a concrete example, statistics from Google [4] shows 
that only less than 77% of the users’ searching input exactly matched the name of Britney, 
detected in their spelling correction system within a three-month period. In other words, 
searching based on exact keyword match would return unnecessary failures for more than 23% 
search requests of Britney, making the searching system ineffective with low usability. 
This significant drawback of existing schemes signifies the important need for new 
techniquesthat support searching flexibility, tolerating both minor typos and format
inconsistencies. That is, secure fuzzy search capability is demanded for achieving enhanced 
system usability in Cloud Computing. Searchable encryption schemes usually build up an index 
for each keyword of interest and associate the index with the files that contain the keyword. By 
integrating the trapdoors of keywords within the index information, effective keyword search can 
be realized while both file content and keyword privacy are well-preserved. 
Disadvantages: 
 The existing searchable encryption techniques do not suit for cloud computing scenario 
since they support only exact keyword search. 
 Searching input might not exactly match those pre-set keywords due to the possible types 
Proposed system: 
In this paper, we focus on enabling effective yet privacy-preserving fuzzy keyword search in 
Cloud Computing. To the best of our knowledge, we formalize for the first time the problem of 
effective fuzzy keyword search over encrypted cloud data while maintaining keyword privacy. 
Fuzzy keyword search greatly enhances system usability by returning the matching files when 
users’ searching inputs exactly match the predefined keywords or the closest possible matching 
files based on keyword similarity semantics, when exact match fails. More specifically, we use 
edit distance to quantify keywords similarity and develop two novel techniques, i.e., an 
wildcard-based technique and a gram-based technique, for the construction of fuzzy keyword 
sets. Both techniques eliminate the need for enumerating all the fuzzy keywords and the resulted 
size of the fuzzy keyword sets is significantly reduced. Based on the constructed fuzzy keyword 
sets, we further propose an advanced symbol-based tree-traverse searching scheme, where a 
multi-way tree structure is built up using symbols transformed from the fuzzy keywords. 
Through rigorous security analysis, we show that the proposed solution is secure and privacy-
preserving, while correctly realizing the goal of fuzzy keyword search. Extensive experimental 
results demonstrate the efficiency of the proposed solution. 
Advantages: 
 we focus on enabling effective yet privacy-preserving fuzzy keyword search in Cloud 
Computing. 
 More specifically, we use edit distance to quantify keywords similarity and develop two 
novel techniques:- an wildcard-based technique and a gram-based technique. 
Applications: 
Used in mobile healthcare applications where the resources of memory, computation and 
connectivity are extremely limited. 
Modules: 
 Wildcard – Based Technique 
 Gram – Based Technique 
 Searchable Encryption 
 Construction of Effective Fuzzy Keyword Search in Cloud. 
Modules Description 
 Wildcard – Based Technique
In the above straightforward approach, all the variants of the keywords have to be 
listed even if an operation is performed at the same position. Based on the above observation, we 
proposed to use an wildcard to denote edit operations at the same position. The wildcard-based 
fuzzy set edits distance to solve the problems. 
For example, for the keyword CASTLE with the preset edit distance 1, its wildcard based 
fuzzy keyword set can be constructed as 
SCASTLE, 1 = {CASTLE, *CASTLE,*ASTLE, C*ASTLE, C*STLE, CASTL*E, CASTL*, 
CASTLE*}. 
Edit Distance: 
a. Substitution 
b. Deletion 
c. Insertion 
a) Substitution : changing one character to another in a word; 
b) Deletion : deleting one character from a word; 
c) Insertion: inserting a single character into a word. 
 Gram – Based Technique 
Another efficient technique for constructing fuzzy set is based on grams. The 
gram of a string is a substring that can be used as a signature for efficient approximate search. 
While gram has been widely used for constructing inverted list for approximate string search, we 
use gram for the matching purpose. We propose to utilize the fact that any primitive edit 
operation will affect at most one specific character of the keyword, leaving all the remaining 
characters untouched. In other words, the relative order of the remaining characters after the 
primitive operations is 
always kept the same as it is before the operations. 
For example, the gram-based fuzzy set SCASTLE, 1 for keyword CASTLE can be constructed 
as {CASTLE, CSTLE, CATLE, CASLE, CASTE, CASTL, ASTLE}. 
 Searchable Encryption
Traditional searchable encryption has been widely studied in the context of cryptography. 
Among those works, most are focused on efficiency improvements and security definition 
formalizations. The first construction of searchable encryption was proposed by Song et al., in 
which each word in the document is encrypted independently under a special two-layered 
encryption construction. Goh proposed to use Bloom filters to construct the indexes for the data 
files. To achieve more efficient search, Chang et al. and Curtmola et al. both proposed similar 
“index” approaches, where a single encrypted hash table index is built for the entire file 
collection. In the index table, each entry consists of the trapdoor of a keyword and an 
encrypted set of file identifiers Whose corresponding data files contain the keyword. 
As a complementary approach, Boneh et al. presented a public-key based searchable encryption 
scheme, with an analogous scenario to that of Note that all these existing schemes support only 
exact keyword search, and thus are not suitable for Cloud Computing. 
 Construction of Effective Fuzzy Keyword Search in Cloud 
The key idea behind our secure fuzzy keyword search is two-fold: 
1) Building up fuzzy keyword sets that incorporate not only the exact keywords but 
also the ones differing slightly due to minor typos, format inconsistencies, etc. 
2) Designing an efficient and secure searching approach for file retrieval based on the 
resulted fuzzy keyword sets. 
System Requirements: 
Hardware Requirements: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 44 Mb. 
 Monitor : 15 VGA Colour. 
 Ram : 512 Mb.
Software Requirements: 
 Operating system : Windows XP/7. 
 Coding Language : net, C#.net 
 Tool : Visual Studio 2010 
CONCLUSION AND FURTHER RESEARCH 
In this paper, for the first time we formalize and solve the problem of supporting efficient yet 
privacy-preserving fuzzy search for achieving effective utilization of remotely stored encrypted 
data in Cloud Computing. We design two advanced techniques (i.e., wildcard-based and gram-based 
techniques) to construct the storage-efficient fuzzy keyword sets by exploiting two 
significant observations on the similarity metric of edit distance. Based on the constructed fuzzy 
keyword sets, we further propose a brand new symbol-based trie-traverse searching scheme, 
where a multi- way tree structure is built up using symbols transformed from the resulted fuzzy 
keyword sets. Through rigorous security analysis, we show that our proposed solution is secure 
and privacy- preserving, while correctly realizing the goal of fuzzy keyword search. Extensive 
experimental results demonstrate the efficiency of our solution. 
As our ongoing work, we will continue to research on security mechanisms that support 
1) Search semantics that takes into consideration conjunction of keywords, sequence of 
keywords, and even the complex natural language semantics to produce highly relevant 
search results. and 
2) Search ranking that sorts the searching results according to the relevance criteria.
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over

More Related Content

PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
PDF
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
PPTX
Final 1st
DOCX
privacy preserving multi keyword ranked search over encrypted cloud data
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Privacy preserving multi-keyword ranked search over encrypted cloud data
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Final 1st
privacy preserving multi keyword ranked search over encrypted cloud data
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Privacy preserving multi-keyword ranked search over encrypted cloud data

What's hot (19)

PDF
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
PDF
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
PDF
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
PDF
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
DOCX
Enabling secure and efficient ranked keyword
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOCX
A secure and dynamic multi keyword ranked
PPTX
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
PPT
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
DOCX
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOCX
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PPTX
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
Enabling efficient multi keyword ranked
PDF
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
Enabling secure and efficient ranked keyword
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
A secure and dynamic multi keyword ranked
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Privacy preserving multi-keyword ranked search over encrypted cloud data
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Enabling efficient multi keyword ranked
Ad

Similar to IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over (20)

PDF
J017547478
PDF
O01761103112
PDF
Efficient Privacy Preserving Clustering Based Multi Keyword Search
PDF
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
DOCX
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
PDF
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
PDF
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
PDF
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
PDF
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
PDF
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
PDF
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
PDF
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
PDF
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
PDF
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
PDF
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
DOCX
Enabling fine grained multi-keyword search
PDF
Efficient and Empiric Keyword Search Using Cloud
PDF
Retrieving Secure Data from Cloud Using OTP
J017547478
O01761103112
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
Enabling fine grained multi-keyword search
Efficient and Empiric Keyword Search Using Cloud
Retrieving Secure Data from Cloud Using OTP
Ad

More from IEEEMEMTECHSTUDENTPROJECTS (20)

DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp...
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ...
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ...
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m...
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...
DOC
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A scientometric analysis of cloud c...
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...
DOCX
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Smart dc mobility prediction based...
DOCX
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
DOCX
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
DOCX
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS A qos-oriented-distributed-routing...
DOCX
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS An active resource orchestration f...
DOCX
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
DOCX
IEEE 2014 DOTNET NETWORKING PROJECTS Qos aware geographic opportunistic routi...
DOCX
IEEE 2014 DOTNET NETWORKING PROJECTS Pricing under constraints_in_access_netw...
DOCX
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
DOCX
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
DOCX
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A scientometric analysis of cloud c...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Smart dc mobility prediction based...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS A qos-oriented-distributed-routing...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS An active resource orchestration f...
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEE 2014 DOTNET NETWORKING PROJECTS Qos aware geographic opportunistic routi...
IEEE 2014 DOTNET NETWORKING PROJECTS Pricing under constraints_in_access_netw...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...

Recently uploaded (20)

PDF
advance database management system book.pdf
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
Computer Architecture Input Output Memory.pptx
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PDF
Trump Administration's workforce development strategy
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
Introduction to pro and eukaryotes and differences.pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
Weekly quiz Compilation Jan -July 25.pdf
advance database management system book.pdf
Virtual and Augmented Reality in Current Scenario
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
What if we spent less time fighting change, and more time building what’s rig...
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Computer Architecture Input Output Memory.pptx
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Trump Administration's workforce development strategy
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Introduction to pro and eukaryotes and differences.pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
202450812 BayCHI UCSC-SV 20250812 v17.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
TNA_Presentation-1-Final(SAVE)) (1).pptx
Unit 4 Computer Architecture Multicore Processor.pptx
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Weekly quiz Compilation Jan -July 25.pdf

IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com FUZZY KEYWORD SEARCH ABSTRACT As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and selectively retrieve files of interest, these techniques support only exact keyword search. That is, there is no tolerance of minor types and format inconsistencies which, on the other hand, are typical user searching behavior and happen very frequently. This significant drawback makes existing techniques unsuitable in Cloud Computing as it greatly affects system usability, rendering user searching experiences very frustrating and system efficacy very low. In this paper, for the first time we formalize and solve the problem of effective fuzzy keyword search over encrypted cloud data while maintaining keyword privacy. Fuzzy keyword search greatly enhances system usability by returning the matching files when users’ searching inputs exactly match the predefined keywords or the closest possible matching files based on keyword similarity semantics, when exact match fails. In our solution, we exploit edit distance to quantify keywords similarity and develop two advanced techniques on constructing fuzzy keyword sets, which achieve optimized storage and representation overheads.
  • 2. We further propose a brand new symbol-based trie-traverse searching scheme, where a multi-way tree structure is built up using symbols transformed from the resulted fuzzy keyword sets. Through rigorous security analysis, we show that our proposed solution is secure and privacy-preserving, while correctly realizing the goal of fuzzy keyword search. Extensive experimental results demonstrate the efficiency of the proposed solution. Introduction Cloud Computing, the new term for the long dreamed vision of computing as a utility, enables convenient, on-demand network access to a centralized pool of configurable computing resources (e.g., networks, applications, and services) that can be rapidly deployed with great efficiency and minimal management overhead . The amazing advantages of Cloud Computing include: on-demand self-service, ubiquitous network access, location independent resource pooling, rapid resource elasticity, usage-based pricing, transference of risk, etc. Thus, Cloud Computing could easily benefit its users in avoiding large capital outlays in the deployment and management of both software and hardware. Undoubtedly, Cloud Computing brings unprecedented paradigm shifting and benefits in the history of IT. As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud, such as emails, personal health records, private videos and photos, company finance data, government documents, etc. By storing their data into the cloud, the data owners can be relieved from the burden of data storage and maintenance so as to enjoy the on-demand high quality data storage service. However, the fact that data owners and cloud server are not in the same trusted domain may put the outsourced data at risk, as the cloud server may no longer be fully trusted in such a cloud environment due to a number of reasons: the cloud server may leak data information to unauthorized entities or be hacked. It follows that sensitive data usually should be encrypted prior to outsourcing for data privacy and combating unsolicited accesses. System Architecture
  • 3. Here the Data Owner stores her/she personal Data in cloud server in the form of Encrypted files for security purpose, and then Users retrieve the data by searching based on the keywords. Existing System: Although allowing for performing searches securely and effectively, the existing searchable encryption techniques do not suit for cloud computing scenario since they support only exact keyword search. As common practice, users may search and retrieve the data of their respective interests using any keywords they might come up with. It is quite common that users’ searching input might not exactly match those pre-set keywords due to the possible types, such as Illinois and Ilinois, representation inconsistencies, such as PO BOX and P.O. Box, and/or her lack of exact knowledge about the data. To give a concrete example, statistics from Google [4] shows that only less than 77% of the users’ searching input exactly matched the name of Britney, detected in their spelling correction system within a three-month period. In other words, searching based on exact keyword match would return unnecessary failures for more than 23% search requests of Britney, making the searching system ineffective with low usability. This significant drawback of existing schemes signifies the important need for new techniquesthat support searching flexibility, tolerating both minor typos and format
  • 4. inconsistencies. That is, secure fuzzy search capability is demanded for achieving enhanced system usability in Cloud Computing. Searchable encryption schemes usually build up an index for each keyword of interest and associate the index with the files that contain the keyword. By integrating the trapdoors of keywords within the index information, effective keyword search can be realized while both file content and keyword privacy are well-preserved. Disadvantages:  The existing searchable encryption techniques do not suit for cloud computing scenario since they support only exact keyword search.  Searching input might not exactly match those pre-set keywords due to the possible types Proposed system: In this paper, we focus on enabling effective yet privacy-preserving fuzzy keyword search in Cloud Computing. To the best of our knowledge, we formalize for the first time the problem of effective fuzzy keyword search over encrypted cloud data while maintaining keyword privacy. Fuzzy keyword search greatly enhances system usability by returning the matching files when users’ searching inputs exactly match the predefined keywords or the closest possible matching files based on keyword similarity semantics, when exact match fails. More specifically, we use edit distance to quantify keywords similarity and develop two novel techniques, i.e., an wildcard-based technique and a gram-based technique, for the construction of fuzzy keyword sets. Both techniques eliminate the need for enumerating all the fuzzy keywords and the resulted size of the fuzzy keyword sets is significantly reduced. Based on the constructed fuzzy keyword sets, we further propose an advanced symbol-based tree-traverse searching scheme, where a multi-way tree structure is built up using symbols transformed from the fuzzy keywords. Through rigorous security analysis, we show that the proposed solution is secure and privacy-
  • 5. preserving, while correctly realizing the goal of fuzzy keyword search. Extensive experimental results demonstrate the efficiency of the proposed solution. Advantages:  we focus on enabling effective yet privacy-preserving fuzzy keyword search in Cloud Computing.  More specifically, we use edit distance to quantify keywords similarity and develop two novel techniques:- an wildcard-based technique and a gram-based technique. Applications: Used in mobile healthcare applications where the resources of memory, computation and connectivity are extremely limited. Modules:  Wildcard – Based Technique  Gram – Based Technique  Searchable Encryption  Construction of Effective Fuzzy Keyword Search in Cloud. Modules Description  Wildcard – Based Technique
  • 6. In the above straightforward approach, all the variants of the keywords have to be listed even if an operation is performed at the same position. Based on the above observation, we proposed to use an wildcard to denote edit operations at the same position. The wildcard-based fuzzy set edits distance to solve the problems. For example, for the keyword CASTLE with the preset edit distance 1, its wildcard based fuzzy keyword set can be constructed as SCASTLE, 1 = {CASTLE, *CASTLE,*ASTLE, C*ASTLE, C*STLE, CASTL*E, CASTL*, CASTLE*}. Edit Distance: a. Substitution b. Deletion c. Insertion a) Substitution : changing one character to another in a word; b) Deletion : deleting one character from a word; c) Insertion: inserting a single character into a word.  Gram – Based Technique Another efficient technique for constructing fuzzy set is based on grams. The gram of a string is a substring that can be used as a signature for efficient approximate search. While gram has been widely used for constructing inverted list for approximate string search, we use gram for the matching purpose. We propose to utilize the fact that any primitive edit operation will affect at most one specific character of the keyword, leaving all the remaining characters untouched. In other words, the relative order of the remaining characters after the primitive operations is always kept the same as it is before the operations. For example, the gram-based fuzzy set SCASTLE, 1 for keyword CASTLE can be constructed as {CASTLE, CSTLE, CATLE, CASLE, CASTE, CASTL, ASTLE}.  Searchable Encryption
  • 7. Traditional searchable encryption has been widely studied in the context of cryptography. Among those works, most are focused on efficiency improvements and security definition formalizations. The first construction of searchable encryption was proposed by Song et al., in which each word in the document is encrypted independently under a special two-layered encryption construction. Goh proposed to use Bloom filters to construct the indexes for the data files. To achieve more efficient search, Chang et al. and Curtmola et al. both proposed similar “index” approaches, where a single encrypted hash table index is built for the entire file collection. In the index table, each entry consists of the trapdoor of a keyword and an encrypted set of file identifiers Whose corresponding data files contain the keyword. As a complementary approach, Boneh et al. presented a public-key based searchable encryption scheme, with an analogous scenario to that of Note that all these existing schemes support only exact keyword search, and thus are not suitable for Cloud Computing.  Construction of Effective Fuzzy Keyword Search in Cloud The key idea behind our secure fuzzy keyword search is two-fold: 1) Building up fuzzy keyword sets that incorporate not only the exact keywords but also the ones differing slightly due to minor typos, format inconsistencies, etc. 2) Designing an efficient and secure searching approach for file retrieval based on the resulted fuzzy keyword sets. System Requirements: Hardware Requirements:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 44 Mb.  Monitor : 15 VGA Colour.  Ram : 512 Mb.
  • 8. Software Requirements:  Operating system : Windows XP/7.  Coding Language : net, C#.net  Tool : Visual Studio 2010 CONCLUSION AND FURTHER RESEARCH In this paper, for the first time we formalize and solve the problem of supporting efficient yet privacy-preserving fuzzy search for achieving effective utilization of remotely stored encrypted data in Cloud Computing. We design two advanced techniques (i.e., wildcard-based and gram-based techniques) to construct the storage-efficient fuzzy keyword sets by exploiting two significant observations on the similarity metric of edit distance. Based on the constructed fuzzy keyword sets, we further propose a brand new symbol-based trie-traverse searching scheme, where a multi- way tree structure is built up using symbols transformed from the resulted fuzzy keyword sets. Through rigorous security analysis, we show that our proposed solution is secure and privacy- preserving, while correctly realizing the goal of fuzzy keyword search. Extensive experimental results demonstrate the efficiency of our solution. As our ongoing work, we will continue to research on security mechanisms that support 1) Search semantics that takes into consideration conjunction of keywords, sequence of keywords, and even the complex natural language semantics to produce highly relevant search results. and 2) Search ranking that sorts the searching results according to the relevance criteria.