Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Enabling Secure and Efficient Ranked Keyword
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Enabling Secure and Efficient Ranked Keyword


[attachment=45036]


ABSTRACT
Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive
cloud data has to be encrypted before outsourced to the commercial public cloud, which makes effective data utilization service a very
challenging task. Although traditional searchable encryption techniques allow users to securely search over encrypted data through
keywords, they support only Boolean search and are not yet sufficient to meet the effective data utilization need that is inherently
demanded by large number of users and huge amount of data files in cloud. In this paper, we define and solve the problem of
secure ranked keyword search over encrypted cloud data. Ranked search greatly enhances system usability by enabling search result
relevance ranking instead of sending undifferentiated results, and further ensures the file retrieval accuracy. Specifically, we explore
the statistical measure approach, i.e. relevance score, from information retrieval to build a secure searchable index, and develop a one-to-many order-preserving mapping technique to properly protect those sensitive score information. The resulting design is able
to facilitate efficient server-side ranking without losing keyword privacy. Thorough analysis shows that our proposed solution enjoys
“as-strong-as-possible” security guarantee compared to previous searchable encryption schemes, while correctly realizing the goal of
ranked keyword search. Extensive experimental results demonstrate the efficiency of the proposed solution.

Interaction Model

1. Client-driven interventions

Client-driven interventions are the means to protect customers from unreliable services. For example, services that miss deadlines or do not respond at all for a longer time are replaced by other more reliable services in future discovery operations.

2. Provider-driven interventions
Provider-driven interventions are desired and initiated by the service owners to shield themselves from malicious clients. For instance, requests of clients performing a denial of service attack by sending multiple requests in relatively short intervals are blocked (instead of processed) by the service.


MODULES
1. Encrypt Module
2. Client Module
3. Multi-keyword Module
4. Admin Module

Encrypt Module:
This module is used to help the server to encrypt the document using RSA Algorithm and to convert the encrypted document to the Zip file with activation code and then activation code send to the user for download.

Client Module:
This module is used to help the client to search the file using the multiple key words concept and get the accurate result list based on the user query. The user is going to select the required file and register the user details and get activation code in mail from the “customerservice404” email before enter the activation code. After user can download the Zip file and extract that file.

Multi-keyword Module:
This module is used to help the user to get the accurate result based on the multiple keyword concepts. The users can enter the multiple words query, the server is going to split that query into a single word after search that word file in our database. Finally, display the matched word list from the database and the user gets the file from that list.

Admin Module:
This module is used to help the server to view details and upload files with the security. Admin uses the log key to the login time. Before the admin logout, change the log key. The admin can change the password after the login and view the user downloading details and the counting of file request details on flowchart. The admin can upload the file after the conversion of the Zip file format.