Вы находитесь на странице: 1из 6

A

Major Project Report


on
Privacy-Preserving Multi-Keyword Ranked Search over
Encrypted Cloud Data
Submitted to
Jawaharlal Nehru Technological University, Hyderabad
in partial fulfillment of the requirements for the Award of Degree of
Bachelor of Technology
in
Computer Science & Engineering
by

B.BHAVANA (116Y1A0518)

Under the guidance


of
Mr. V. NARESH
Asst. Professor

Department of Computer Science & Engineering

2014-2015
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CERTIFICATE

This is to certify that the project entitled “Privacy-Preserving Multi-Keyword Ranked


Search over Encrypted Cloud Data” is submitted by B.Bhavana (116Y1A0518) in the partial
fulfillment of requirement for the award of degree of Bachelor of Technology in Computer
Science and Engineering during academic year 2014-2015.

Mr.V.NARESH Dr.N.SAMBASIVA RAO


Project Guide Head of the Department

External Examiner
Acknowledgement

I wish to take this opportunity to express my deep gratitude to all the people who have
extended their cooperation in various ways during my project work. It is my pleasure to
acknowledge the help of all those individuals.
I would like to thank my project guide Mr. V. NARESH, Asst. Prof.,Computer Science
and Engineering Department for his guidance and help throughout the development of this
project work by providing me with required information. With his guidance, cooperation and
encouragement I had learnt many new things during my project tenure.
I would like to thank my project coordinator Mr. V. SRINIVAS, Asst.Prof., Computer
Science and Engineering Department (for his continuous coordination throughout the project
tenure).
I specially thank Dr. N. SAMBASIVA RAO, Head of Computer Science and
Engineering Department for his continuous encouragement and valuable guidance in bringing
shape to this dissertation.
I specially thank Dr. N. SAMBASIVA RAO, Principal of Sumathi Reddy Institute of
Technology for Women for his encouragement and support.
In completing this project successfully all our faculty members have given an excellent
cooperation by guiding me in every aspect. I also thank our lab faculty and librarians.

B.BHAVANA (116Y1A0518)
CONTENTS

Abstract i

1. Introduction
1.1 What is Cloud Computing 1-3
1.2 Existing System and Disadvantages 3
1.3 Proposed System and Advantages 4
1.4 Requirement Specifications 4
2. Literature Survey
2.1 Introduction to Cloud Computing 5-9
2.2 Introduction to .NET 10-17
3. System Analysis
3.1 System Design 18-19
3.2 Input and Output Design 19-21
3.3 Functional and Non-Functional Specifications 21
3.4 Software Design
3.4.1 Dataflow Diagram 22-23
3.5 UML Diagrams 24
3.5.1 Usecase Diagram 25
3.5.2 Sequence Diagram 26
3.5.3 Class Diagram 27
3.4.4 Activity Diagram 28
4. Implementation 29
5. Module Description 30-31
6. System Testing
6.1 Introduction to Testing 32-35
6.2 Testing Strategies 36-38
7. Screen Shots 39-53
8. Conclusion 54
9. Bibliography 55
LIST OF FIGURES

FIG 3.4.1: DATAFLOW DIAGRAM 23


FIG 3.5.1: USECASE DIAGRAM 25
FIG 3.5.2: SEQUENCE DIAGRAM 26
FIG 3.5.3: CLASS DIAGRAM 27
FIG 3.5.4: ACTIVITY DIAGRAM 28
ABSTRACT

The advent of cloud computing, data owners are motivated to outsource their
complex data management systems from local sites to commercial public cloud for great
flexibility and economic savings. But for protecting data privacy, sensitive data has to be
encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext
keyword search. Thus, enabling an encrypted cloud data search service is of paramount
importance. Considering the large number of data users and documents in cloud, it is crucial for
the search service to allow multi-keyword query and provide result similarity ranking to meet the
effective data retrieval need. Related works on searchable encryption focus on single keyword
search or Boolean keyword search, and rarely differentiate the search results. In this paper, for
the first time, we define and solve the challenging problem of privacy-preserving multi-keyword
ranked search over encrypted cloud data (MRSE), and establish a set of strict privacy
requirements for such a secure cloud data utilization system to become a reality. Among various
multi-keyword semantics, we choose the efficient principle of “coordinate matching”, i.e., as
many matches as possible, to capture the similarity between search query and data documents,
and further use “inner product similarity” to quantitatively formalize such principle for similarity
measurement. We first propose a basic MRSE scheme using secure inner product computation,
and then significantly improve it to meet different privacy requirements in two levels of threat
models. Thorough analysis investigating privacy and efficiency guarantees of proposed schemes
is given, and experiments on the real-world dataset further show proposed schemes indeed
introduce low overhead on computation and communication.

Вам также может понравиться