Abstract Ensures data to be revealed only to authorized users. Cloud computing settings offer outsourcing as a low investment and scalability for Data owners. Demonstrate the proposed techniques are capable of offering privacy while enabling efficient queries. Existing System Using private information retrieval techniques hide the users query. Encryption methods are capable of protecting the confidentiality of the data. Cloud computing providers (e.g., Amazon, HP, and Microsoft) attempt to solve the problem by offering contractual agreement that promise not to release outsourced data to third parties. Drawbacks in existing system Private information retrieval techniques hide the users query, e.g., the data item searched for, but not the data being queried. To outsource valuable data to an insecure server, such techniques are clearly not appropriate. Traditional encryption methods are capable of protecting the confidentiality of the data. However, this also prevents users from querying the data on the un trusted server. Provider respects the contractual agreement, the data is not guaranteed to be safe.
Proposed System In our first solution, we propose an encrypted index- based technique with perfect privacy, but multiple communication rounds. This technique flexibly reduces round trip latency at the expense of data transfer. For our second solution, our private anchor-based indexing guarantees the correct answer within only 2 rounds of communication. Retrieval is accelerated by bounding the range of potential nearest neighbors (NN) in the first phase. Our third solution limits communication to a single round, and also returns a constant-sized candidate set by computing a close approximation of the query result. We extend our solutions in order to meet an intuitive privacy guarantee requirement.
Advantages of proposed system Even in the worst case where the attacker knows the inverse of the transformation function, the attacker can only estimate the original object from the transformed object with bounded precision. It enables high-query accuracy. It enables efficient query processing in terms of communication cost. It supports insertion and deletion of objects.
System Architecture System Design Use case Diagram Sequential Diagram Activity Diagram Class Diagram Project modules The functional requirements of the proposed system is logically divided into the following modules.
Data Owner Module Trusted Client Module Server Module Integration Module
Module Description Data Owner Module This module is responsible to provide complete data owner side functionalities such as. Metric Preserving Transformation of data (uses MPT building algorithm for data owner). Flexible Distance Based Hashing (uses FDB building algorithm for data owner). Secure storing and retrieving of data.
Module Description (contd..) Trusted Client Module This module is responsible to provide complete client side functionalities such as Making NN queries. Viewing Results. Secure Data Transformations
Module Description (contd..) Server Module This module is responsible to provide complete server side functionalities such as. Secure data storage. Query processing or Searching for requested data (EHI searching algorithm, MPT searching algorithm and FDB searching algorithm).
Module Description (contd..) Integration Module This module is responsible to provide seamless integration among client, server and data owner.
Hardware Requirement System : Pentium IV 2.4 GHz Hard Disk : 40 GB Monitor : 15 VGA color Mouse : Logitech. Keyboard : 110 keys enhanced RAM : 256 MB
Software Requirement Front End : Visual Studio .NET Back End : MS SQL Server Operating System : Windows XP3/7
References Man Lung Yiu, Ira Assent, Christian S. Jensen, and Panos Kalnis, Outsourced Similarity Search on Metric Data Assets, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO.2, FEBRUARY 2012.