0% found this document useful (0 votes)
59 views

Enabling Secure and Efficient Ranked Keyword

This document discusses enabling secure and efficient ranked keyword search over outsourced cloud data. It proposes a system that allows users to search for encrypted data through keywords in a ranked order based on relevance. The existing solutions only support boolean search which returns all files matching the keywords without ranking. The proposed system aims to explore ranked search over encrypted data while achieving security and usability goals by combining cryptography and information retrieval techniques. It includes modules for encryption, client search, multi-keyword search, and administration.

Uploaded by

Raghav Manai
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views

Enabling Secure and Efficient Ranked Keyword

This document discusses enabling secure and efficient ranked keyword search over outsourced cloud data. It proposes a system that allows users to search for encrypted data through keywords in a ranked order based on relevance. The existing solutions only support boolean search which returns all files matching the keywords without ranking. The proposed system aims to explore ranked search over encrypted data while achieving security and usability goals by combining cryptography and information retrieval techniques. It includes modules for encryption, client search, multi-keyword search, and administration.

Uploaded by

Raghav Manai
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data

Introduction

Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data has to be encrypted before outsourced to cloud It makes effective data utilization service a very challenging task. As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud

Keywords

Ranked search searchable encryption order-preserving mapping confidential data cloud computing

Problem Statement

secure ranked keyword search Encryption Process Data Leakage The cloud server may leak data information to unauthorized entities The data encryption makes effective data utilization a very challenging task

Existing System

Encryption techniques allow users to securely search over encrypted data through keywords Encryption techniques support only Boolean search and are not yet sufficient To meet the effective data utilization need that is inherently demanded by large number of users and huge amount of data files in cloud Search request, users without pre-knowledge of the encrypted cloud data have to go through every retrieved file Invariably sending back all files solely based on presence/absence of the keyword further incurs large unnecessary network traffic

Architecture

Proposed System

To explore ranked search over encrypted data in Cloud Computing Ranked search greatly enhances system usability by returning the matching files in a ranked order To achieve our design goals on both system security and usability we propose to bring together the advance of both crypto and IR community To design the ranked searchable symmetric encryption scheme

MODULES

Encrypt Module Client Module Multi-keyword Module Admin Module

Hardware Requirements:

System Hard Disk Ram

: Pentium IV 2.4 GHz. : 40 GB. : 512 Mb.

Software Requirements:

Operating system : - Windows XP. Coding Language :JAVA,Swing,RMI,J2me(WirelessToolkit) Tool Used : - Eclipse 3.3

You might also like