Вы находитесь на странице: 1из 13

A SECURE AND DYNAMIC MULTI-

KEYWORD RANKED SEARCH


OVER ENCRYPTED CLOUD
COMPUTING
Muthayammal Engineering
College
S.KAYALVIZHI
ABSTRACT

• The advent of cloud computing, data owners are motivated to


outsource their complex data management systems from local
sites to commercial public cloud for great flexibility and
economic savings.
• data privacy sensitive data has to be encrypted before
outsourcing, which obsoletes traditional data utilization based
on plaintext keyword search.
• an encrypted cloud data search service is of paramount
importance.
INTRODUCTION

• Cloud computing is a type of computing that relies on sharing


computing resources rather than having local servers or
personal devices to handle applications.
• In cloud computing, the word cloud (also phrased as "the
cloud") is used as a metaphor for "the Internet," so the phrase
cloud computing means "a type of Internet-based computing,"
where different services -- such as servers, storage and
applications -- are delivered to an organization's computers
and devices through the Internet.
EXISTING SYSTEM

• The encryption is a helpful technique that treats encrypted data


as documents and allows a user to securely search over it
through single keyword and retrieve documents of interest.
• The direct application of these approaches to deploy secure
large scale cloud data utilization system would not be
necessarily suitable, as they are developed as crypto primitives
and cannot accommodate such high service-level requirements
like system usability, user searching experience, and easy
information discovery in mind.
DISADVANTAGE

• Large scale cloud utilization gets less security


• Service level is not ell for users
PROPOSED SYSTEM

• multi keyword ranked search over encrypted cloud data, and


establish a set of strict privacy requirements for such a secure
cloud data utilization system to become a reality.
• The propose two MRSE schemes following the principle of
“coordinate matching” while meeting different privacy
requirements in two levels of threat models.
ADVANTAGE

• Multi key word ranking for secure the cloud data


• Searching on the encrypted data will give an expected data
MODULES

• Data Owner Module


• Data User Module
• Encryption Module
• Rank Search Module
SYSTEM FLOW DIAGRAM
SOFTWARE REQUIREMENTS:

• Operating system : - Windows XP.


• Coding Language : C#.NET
• Data Base : SQL SERVER 2005
CONCLUSION

• Among different multi-keyword semantics, we choose the


efficient principle of “coordinate matching”, as many matches
as possible, to effectively capture similarity between query
keywords and outsourced documents, and use “inner product
similarity” to quantitatively formalize such a principle for
similarity measurement.
REFERENCES

[1] L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M.


Lindner, “A break in the clouds: towards a cloud definition,”
ACM SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp.
50–55, 2009.
[2] S. Kamara and K. Lauter, “Cryptographic cloud storage,” in
RLCPS, January 2010, LNCS. Springer, Heidelberg.
[3] A. Singhal, “Modern information retrieval: A brief overview,”
IEEE Data Engineering Bulletin, vol. 24, no. 4, pp. 35–43,
2001.
THANK YOU

Вам также может понравиться