Академический Документы
Профессиональный Документы
Культура Документы
B.BHAVANA (116Y1A0518)
2014-2015
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
CERTIFICATE
External Examiner
Acknowledgement
I wish to take this opportunity to express my deep gratitude to all the people who have
extended their cooperation in various ways during my project work. It is my pleasure to
acknowledge the help of all those individuals.
I would like to thank my project guide Mr. V. NARESH, Asst. Prof.,Computer Science
and Engineering Department for his guidance and help throughout the development of this
project work by providing me with required information. With his guidance, cooperation and
encouragement I had learnt many new things during my project tenure.
I would like to thank my project coordinator Mr. V. SRINIVAS, Asst.Prof., Computer
Science and Engineering Department (for his continuous coordination throughout the project
tenure).
I specially thank Dr. N. SAMBASIVA RAO, Head of Computer Science and
Engineering Department for his continuous encouragement and valuable guidance in bringing
shape to this dissertation.
I specially thank Dr. N. SAMBASIVA RAO, Principal of Sumathi Reddy Institute of
Technology for Women for his encouragement and support.
In completing this project successfully all our faculty members have given an excellent
cooperation by guiding me in every aspect. I also thank our lab faculty and librarians.
B.BHAVANA (116Y1A0518)
CONTENTS
Abstract i
1. Introduction
1.1 What is Cloud Computing 1-3
1.2 Existing System and Disadvantages 3
1.3 Proposed System and Advantages 4
1.4 Requirement Specifications 4
2. Literature Survey
2.1 Introduction to Cloud Computing 5-9
2.2 Introduction to .NET 10-17
3. System Analysis
3.1 System Design 18-19
3.2 Input and Output Design 19-21
3.3 Functional and Non-Functional Specifications 21
3.4 Software Design
3.4.1 Dataflow Diagram 22-23
3.5 UML Diagrams 24
3.5.1 Usecase Diagram 25
3.5.2 Sequence Diagram 26
3.5.3 Class Diagram 27
3.4.4 Activity Diagram 28
4. Implementation 29
5. Module Description 30-31
6. System Testing
6.1 Introduction to Testing 32-35
6.2 Testing Strategies 36-38
7. Screen Shots 39-53
8. Conclusion 54
9. Bibliography 55
LIST OF FIGURES
The advent of cloud computing, data owners are motivated to outsource their
complex data management systems from local sites to commercial public cloud for great
flexibility and economic savings. But for protecting data privacy, sensitive data has to be
encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext
keyword search. Thus, enabling an encrypted cloud data search service is of paramount
importance. Considering the large number of data users and documents in cloud, it is crucial for
the search service to allow multi-keyword query and provide result similarity ranking to meet the
effective data retrieval need. Related works on searchable encryption focus on single keyword
search or Boolean keyword search, and rarely differentiate the search results. In this paper, for
the first time, we define and solve the challenging problem of privacy-preserving multi-keyword
ranked search over encrypted cloud data (MRSE), and establish a set of strict privacy
requirements for such a secure cloud data utilization system to become a reality. Among various
multi-keyword semantics, we choose the efficient principle of “coordinate matching”, i.e., as
many matches as possible, to capture the similarity between search query and data documents,
and further use “inner product similarity” to quantitatively formalize such principle for similarity
measurement. We first propose a basic MRSE scheme using secure inner product computation,
and then significantly improve it to meet different privacy requirements in two levels of threat
models. Thorough analysis investigating privacy and efficiency guarantees of proposed schemes
is given, and experiments on the real-world dataset further show proposed schemes indeed
introduce low overhead on computation and communication.