You are on page 1of 15

Technical & Medical Education Society's (Estd.

1983)

J.T. MAHAJAN COLLEGE OF ENGINEERING


FAIZPUR (DIST- JALGAON)
Govt. Of Maharashtra Approved, AICTE & NAAC Accredited,
NBA Accredited (2005 to 2008)
Content

1. Abstract
2. Introduction
3. Existing System
4. Proposed System
5. System Flow Diagram
6. Advantages
7. Disadvantages
8. Modules
9. Software Requirements
10.Conclusion
11.Reference
Year 2022-23 DEPARTMENT-F. Y. Computer Engineering

A Secure and Dynamic Multi-keyword Ranked Search


Scheme over Encrypted Cloud data

GUIDED BY- Prof. Y. R. Bhole (HOD)


SUBMITTED BY - PRATIKSHA CHOUDHARI
ABSTRACT

• The advent of cloud computing, data


owners are motivated to outsource
their complex data management
systems from local sites to
commercial public cloud for great
flexibility and economic savings.

• data privacy sensitive data has to be


encrypted before outsourcing, which
obsoletes traditional data utilization
based on plaintext keyword search.

• an encrypted cloud data search


service is of paramount importance.
INTRODUCTION
• Cloud computing is a type of computing
that relies on sharing computing
resources rather than having local
servers or personal devices to handle
applications.

• In cloud computing, the word cloud


(also phrased as "the cloud") is used as a
metaphor for "the Internet," so the
phrase cloud computing means "a type
of Internet-based computing," where
different services such as servers,
storage and applications are delivered
to an organization's computers -- and
devices through the Internet.
EXISTING SYSTEM

• The encryption is a helpful technique


that treats encrypted data as documents
and allows a user to securely search
over it through single keyword and
retrieve documents of interest.
• The direct application of these
approaches to deploy secure large scale
cloud data utilization system would not
be necessarily suitable, as they are
developed as crypto primitives and
cannot accommodate such high service-
level requirements like system usability,
user searching experience, and easy
information discovery in mind.
PROPOSED SYSTEM

• Multi keyword ranked search over


encrypted cloud data, and establish a
set of strict privacy requirements for
such a secure cloud data utilization
system to become a reality.
• The propose two MRSE schemes
following the principle of "coordinate
matching" while meeting different
privacy requirements in two levels of
threat models.
SYSTEM FLOW DIAGRAM
ADVANTAGE

• Multi key word ranking for secure the


cloud data
• Searching on the encrypted data will
give an expected data
DISADVANTAGE

• Large scale cloud utilization gets less


security
• Service level is not ell for users
MODULES
• Data Owner Module
• Data User Module
• Encryption Module
• Rank Search Module
SOFTWARE REQUIREMENTS
• Operating system - Windows XP.
• Coding Language : C#.Meta
• data Base: SQL SERVER 2005
CONCLUSION

• Among different multi-keyword


semantics, we choose the efficient
principle of "coordinate matching", as
many matches as possible, to
effectively capture similarity between
query keywords and outsourced
documents, and use "inner product
similarity" to quantitatively formalize
such a principle for similarity
measurement.
REFERENCES

[1] L. M. Vaquero, L. Rodero-Merino, J.


Caceres, and M. Lindner, "A break in the
clouds: towards a cloud definition," ACM
SIGCOMM Comput. Commun. Rev., vol. 39,
no. 1, pp. 50-55, 2009.[
2] S. Kamara and K. Lauter, "Cryptographic
cloud storage," in RLCPS, January 2010,
LNCS. Springer, Heidelberg.
[3] A. Singhal, "Modern information
retrieval: A brief overview," IEEE Data
Engineering Bulletin, vol. 24, no. 4, pp.
35-43, 2001.
Thank you

You might also like