ABSTRACT (Secure Dynamic Multi-Keyword Ranked Search Scheme Encrypted Cloud Data):
Secure
Dynamic Multi-Keyword Ranked Search Scheme Encrypted Cloud Data. Due to
the increasing popularity of cloud computing, more and more data owners
are motivated to outsource their data to cloud servers for great
convenience and reduced cost in data management. However, sensitive data
should be encrypted before outsourcing for privacy requirements, which
obsoletes data utilization like keyword-based document retrieval. In
this paper, we present a secure multi-keyword ranked search scheme over
encrypted cloud data, which simultaneously supports dynamic update
operations like deletion and insertion of documents. Specifically, the
vector space model and the widely-used TF _ IDF model are combined in
the index construction and query generation. We construct a special
tree-based index structure and propose a “Greedy Depth-first Search”
algorithm to provide efficient multi-keyword ranked search. The secure
kNN algorithm is utilized to encrypt the index and query vectors, and
meanwhile ensure accurate relevance score calculation between encrypted
index and query vectors. In order to resist statistical attacks, phantom
terms are added to the index vector for blinding search results. Due to
the use of our special tree-based index structure, the proposed scheme
can achieve sub-linear search time and deal with the deletion and
insertion of documents flexibly. Extensive experiments are conducted to
demonstrate the efficiency of the proposed scheme.
EXISTING SYSTEM:
- A general approach to protect the data confidentiality is to encrypt the data before outsourcing.
- Searchable encryption schemes enable the client to store the encrypted data to the cloud and execute keyword search over ciphertext domain. So far, abundant works have been proposed under different threat models to achieve various search functionality, such as single keyword search, similarity search, multi-keyword boolean search, ranked search, multi-keyword ranked search, etc. Among them, multi-keyword ranked search achieves more and more attention for its practical applicability. Recently, some dynamic schemes have been proposed to support inserting and deleting operations on document collection. These are significant works as it is highly possible that the data owners need to update their data on the cloud server.
DISADVANTAGES OF EXISTING SYSTEM:
- Huge cost in terms of data usability. For example, the existing techniques on keyword-based information retrieval, which are widely used on the plaintext data, cannot be directly applied on the encrypted data. Downloading all the data from the cloud and decrypt locally is obviously impractical.
- Existing System methods not practical due to their high computational overhead for both the cloud sever and user.
PROPOSED SYSTEM:
- This paper proposes a secure tree-based search scheme over the encrypted cloud data, which supports multi-keyword ranked search and dynamic operation on the document collection. Specifically, the vector space model and the widely-used “term frequency (TF) × inverse document frequency (IDF)” model are combined in the index construction and query generation to provide multi-keyword ranked search. In order to obtain high search efficiency, we construct a tree-based index structure and propose a “Greedy Depth-first Search” algorithm based on this index tree.
- The secure kNN algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure accurate relevance score calculation between encrypted index and query vectors.
- To resist different attacks in different threat models, we construct two secure search schemes: the basic dynamic multi-keyword ranked search (BDMRS) scheme in the known ciphertext model, and the enhanced dynamic multi-keyword ranked search (EDMRS) scheme in the known background model.
ADVANTAGES OF PROPOSED SYSTEM:
- Due to the special structure of our tree-based index, the proposed search scheme can flexibly achieve sub-linear search time and deal with the deletion and insertion of documents.
- We design a searchable encryption scheme that supports both the accurate multi-keyword ranked search and flexible dynamic operation on document collection.
- Due to the special structure of our tree-based index, the search complexity of the proposed scheme is fundamentally kept to logarithmic. And in practice, the proposed scheme can achieve higher search efficiency by executing our “Greedy Depth-first Search” algorithm. Moreover, parallel search can be flexibly performed to further reduce the time cost of search process.
SYSTEM ARCHITECTURE:
MODULES
- Data Owner Module
- Data User Module
- Cloud server and Encryption Module
- Rank Search Module
Secure Dynamic Multi-Keyword Ranked Search Scheme Encrypted Cloud Data
MODULES DESCRIPTION
Data Owner Module
This
module helps the owner to register those details and also include login
details. This module helps the owner to upload his file with encryption
using RSA algorithm. This ensures the files to be protected from
unauthorized user. Data owner has a collection of documents F ={f1; f2; :::; fn} that
he wants to outsource to the cloud server in encrypted form while still
keeping the capability to search on them for effective utilization. In
our scheme, the data owner firstly builds a secure searchable tree index
I from document collection F, and then generates an encrypted document collection C for F. Afterwards, the data owner outsources the encrypted collection C and the secure index I to
the cloud server, and securely distributes the key information of
trapdoor generation and document decryption to the authorized data
users. Besides, the data owner is responsible for the update operation
of his documents stored in the cloud server. While updating, the data
owner generates the update information locally and sends it to the
server.
Data User Module
This
module includes the user registration login details. This module is
used to help the client to search the file using the multiple key words
concept and get the accurate result list based on the user query. The
user is going to select the required file and register the user details
and get activation code in mail email before enter the activation code.
After user can download the Zip file and extract that file. Data users
are authorized ones to access the documents of data owner. With t query keywords, the authorized user can generate a trapdoor TD according to search control mechanisms to fetch k encrypted documents from cloud server. Then, the data user can decrypt the documents with the shared secret key.
Cloud Server and Encryption Module:
This
module is used to help the server to encrypt the document using RSA
Algorithm and to convert the encrypted document to the Zip file with
activation code and then activation code send to the user for download.
Cloud server stores the encrypted document collection C and the encrypted searchable tree index I for data owner. Upon receiving the trapdoor TD from the data user, the cloud server executes search over the index tree I, and finally returns the corresponding collection of top- k ranked
encrypted documents. Besides, upon receiving the update information
from the data owner, the server needs to update the index I and document collection C according
to the received information. The cloud server in the proposed scheme is
considered as “honest-but-curious”, which is employed by lots of works
on secure cloud data search
Rank Search Module
These
modules ensure the user to search the files that are searched
frequently using rank search. This module allows the user to download
the file using his secret key to decrypt the downloaded data. This
module allows the Owner to view the uploaded files and downloaded files.
The proposed scheme is designed to provide not only multi-keyword query
and accurate result ranking, but also dynamic update on document
collections. The scheme is designed to prevent the cloud server from
learning additional information about the document collection, the index
tree, and the query.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
- System : Pentium Dual Core.
- Hard Disk : 120 GB.
- Monitor : 15’’ LED
- Input Devices : Keyboard, Mouse
- Ram : 1GB.
SOFTWARE REQUIREMENTS:
- Operating system : Windows 7.
- Coding Language : JAVA/J2EE
- Tool : Netbeans 7.2.1
- Database : MYSQL
Secure Dynamic Multi-Keyword Ranked Search Scheme Encrypted Cloud Data
REFERENCE:
Zhihua
Xia, Member, IEEE, Xinhui Wang, Xingming Sun, Senior Member, IEEE, and
Qian Wang, Member, IEEE, “A Secure and Dynamic Multi-Keyword Ranked
Search Scheme over Encrypted Cloud Data”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 27, NO. 2, FEBRUARY 2016
No comments:
Post a Comment