ABSTRACT
With the advent of cloud computing, data owners are motivated to outsource their complex datamanagement systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data have to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search. Thus, enabling an encryptedcloud data search service is of paramount importance. Considering the large number of data users and documents in the cloud, it is necessary to allow multiple keywords in the search request and return documents in the order of their relevance to these keywords. Related works on searchable encryption focus on single keyword search or Boolean keyword search, and rarely sort the search results. In this paper, for the first time, we define and solve the challenging problem of privacy-preservingmulti-keyword ranked search over encrypted data in cloud computing (MRSE). We establish a set of strict privacy requirements for such a secure cloud data utilization system. Among variousmulti-keyword semantics, we choose the efficient similarity measure of "coordinate matching," i.e., as many matches as possible, to capture the relevance of data documents to the search query. We further use "inner product similarity" to quantitatively evaluate such similarity measure. We first propose a basic idea for the MRSE based on secure inner product computation, and then give two significantly improved MRSE schemes to achieve various stringent privacy requirements in two different threat models. To improve search experience of the data search service, we further extend these two schemes to support more search semantics. Thorough analysis investigating privacy and efficiency guarantees of proposed schemes is given. Experiments on the real-world data set further show proposed schemes indeed introduce low overhead on computation and communication.
ARCHITECTURE
Existing System:
The large number of data users and
documents in cloud, it is crucial for the search service to allow multi-keyword
query and provide result similarity ranking to meet the effective data
retrieval need. The searchable encryption focuses on single keyword search or
Boolean keyword search, and rarely differentiates the search results.
Disadvantage:
» Single-keyword search without ranking
»
Boolean- keyword search without ranking
»
Single-keyword search with ranking
Proposed System:
We define and solve the challenging problem of
privacy-preserving multi-keyword ranked search over encrypted cloud data
(MRSE), and establish a set of strict privacy requirements for such a secure
cloud data utilization system to become a reality. Among various multi-keyword
semantics, we choose the efficient principle of “coordinate matching”.
Encrypt Module:
Advantage:
- Multi-keyword
ranked search over encrypted cloud data (MRSE)
- “Coordinate
matching” by inner product similarity.
MODULES
1.
Encrypt Module
2.
Client Module
3.
Multi-keyword Module
4.
Admin Module
Encrypt Module:
This module is used to help the
server to encrypt the document using RSA Algorithm and to convert the encrypted
document to the Zip file with activation code and then activation code send to
the user for download.
Client Module:
This module is used to help the
client to search the file using the multiple key words concept and get the
accurate result list based on the user query. The user is going to select the
required file and register the user details and get activation code in mail
from the “customerservice404” email before enter the activation code. After
user can download the Zip file and extract that file.
Multi-keyword Module:
This module is used to help the
user to get the accurate result based on the multiple keyword concepts. The
users can enter the multiple words query, the server is going to split that
query into a single word after search that word file in our database. Finally,
display the matched word list from the database and the user gets the file from
that list.
Admin Module:
This module is used to help the
server to view details and upload files with the security. Admin uses the log
key to the login time. Before the admin logout, change the log key. The admin
can change the password after the login and view the user downloading details
and the counting of file request details on flowchart. The admin can upload the
file after the conversion of the Zip file format.
SYSTEM SPECIFICATION
Hardware Requirements:
•
System : Pentium IV 2.4 GHz.
•
Hard Disk : 40 GB.
•
Floppy Drive : 1.44 Mb.
•
Monitor : 14’
Colour Monitor.
•
Mouse : Optical
Mouse.
•
Ram : 512
Mb.
•
Keyboard : 101 Keyboard.
Software Requirements:
•
Operating system :
Windows XP.
•
Coding Language :
ASP.Net with C#
•
Data Base :
SQL Server 2005.