You are on page 1of 20

Outsourced Similarity Search on

Metric Data Assets


Abstract
Ensures data to be revealed only to authorized users.
Cloud computing settings offer outsourcing as a low
investment and scalability for Data owners.
Demonstrate the proposed techniques are capable of
offering privacy while enabling efficient queries.
Existing System
Using private information retrieval techniques hide the
users query.
Encryption methods are capable of protecting the
confidentiality of the data.
Cloud computing providers (e.g., Amazon, HP, and
Microsoft) attempt to solve the problem by offering
contractual agreement that promise not to release
outsourced data to third parties.
Drawbacks in existing system
Private information retrieval techniques hide the users
query, e.g., the data item searched for, but not the data
being queried. To outsource valuable data to an insecure
server, such techniques are clearly not appropriate.
Traditional encryption methods are capable of protecting
the confidentiality of the data. However, this also
prevents users from querying the data on the un trusted
server.
Provider respects the contractual agreement, the data is
not guaranteed to be safe.

Proposed System
In our first solution, we propose an encrypted index-
based technique with perfect privacy, but multiple
communication rounds. This technique flexibly reduces
round trip latency at the expense of data transfer.
For our second solution, our private anchor-based
indexing guarantees the correct answer within only 2
rounds of communication. Retrieval is accelerated by
bounding the range of potential nearest neighbors (NN)
in the first phase.
Our third solution limits communication to a single
round, and also returns a constant-sized candidate set by
computing a close approximation of the query result.
We extend our solutions in order to meet an intuitive
privacy guarantee requirement.

Advantages of proposed
system
Even in the worst case where the attacker knows the
inverse of the transformation function, the attacker can
only estimate the original object from the transformed
object with bounded precision.
It enables high-query accuracy.
It enables efficient query processing in terms of
communication cost.
It supports insertion and deletion of objects.

System Architecture
System Design Use case Diagram
Sequential Diagram
Activity Diagram
Class Diagram
Project modules
The functional requirements of the proposed system is
logically divided into the following modules.

Data Owner Module
Trusted Client Module
Server Module
Integration Module


Module Description
Data Owner Module
This module is responsible to provide complete data
owner side functionalities such as.
Metric Preserving Transformation of data (uses
MPT building algorithm for data owner).
Flexible Distance Based Hashing (uses FDB
building algorithm for data owner).
Secure storing and retrieving of data.

Module Description (contd..)
Trusted Client Module
This module is responsible to provide complete client side
functionalities such as
Making NN queries.
Viewing Results.
Secure Data Transformations


Module Description (contd..)
Server Module
This module is responsible to provide complete server
side functionalities such as.
Secure data storage.
Query processing or Searching for requested data
(EHI searching algorithm, MPT searching algorithm
and FDB searching algorithm).


Module Description (contd..)
Integration Module
This module is responsible to provide seamless
integration among client, server and data owner.


Hardware Requirement
System : Pentium IV 2.4 GHz
Hard Disk : 40 GB
Monitor : 15 VGA color
Mouse : Logitech.
Keyboard : 110 keys enhanced
RAM : 256 MB

Software Requirement
Front End : Visual Studio .NET
Back End : MS SQL Server
Operating System : Windows XP3/7


References
Man Lung Yiu, Ira Assent, Christian S. Jensen, and Panos Kalnis,
Outsourced Similarity Search on Metric Data Assets, IEEE
TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING,
VOL. 24, NO.2, FEBRUARY 2012.

Thank you

You might also like