OVER ENCRYPTED CLOUD COMPUTING Muthayammal Engineering College S.KAYALVIZHI ABSTRACT
• The advent of cloud computing, data owners are motivated to
outsource their complex data management systems from local sites to commercial public cloud for great flexibility and economic savings. • data privacy sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search. • an encrypted cloud data search service is of paramount importance. INTRODUCTION
• Cloud computing is a type of computing that relies on sharing
computing resources rather than having local servers or personal devices to handle applications. • In cloud computing, the word cloud (also phrased as "the cloud") is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," where different services -- such as servers, storage and applications -- are delivered to an organization's computers and devices through the Internet. EXISTING SYSTEM
• The encryption is a helpful technique that treats encrypted data
as documents and allows a user to securely search over it through single keyword and retrieve documents of interest. • The direct application of these approaches to deploy secure large scale cloud data utilization system would not be necessarily suitable, as they are developed as crypto primitives and cannot accommodate such high service-level requirements like system usability, user searching experience, and easy information discovery in mind. DISADVANTAGE
• Large scale cloud utilization gets less security
• Service level is not ell for users PROPOSED SYSTEM
• multi keyword ranked search over encrypted cloud data, and
establish a set of strict privacy requirements for such a secure cloud data utilization system to become a reality. • The propose two MRSE schemes following the principle of “coordinate matching” while meeting different privacy requirements in two levels of threat models. ADVANTAGE
• Multi key word ranking for secure the cloud data
• Searching on the encrypted data will give an expected data MODULES
• Data Owner Module
• Data User Module • Encryption Module • Rank Search Module SYSTEM FLOW DIAGRAM SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP.
• Coding Language : C#.NET • Data Base : SQL SERVER 2005 CONCLUSION
• Among different multi-keyword semantics, we choose the
efficient principle of “coordinate matching”, as many matches as possible, to effectively capture similarity between query keywords and outsourced documents, and use “inner product similarity” to quantitatively formalize such a principle for similarity measurement. REFERENCES
[1] L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M.
Lindner, “A break in the clouds: towards a cloud definition,” ACM SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 50–55, 2009. [2] S. Kamara and K. Lauter, “Cryptographic cloud storage,” in RLCPS, January 2010, LNCS. Springer, Heidelberg. [3] A. Singhal, “Modern information retrieval: A brief overview,” IEEE Data Engineering Bulletin, vol. 24, no. 4, pp. 35–43, 2001. THANK YOU