Sie sind auf Seite 1von 29

Privacy Preserving multi-keyword ranked search over encrypted cloud data

Privacy-Preserving Multi-keyword
Ranked Search over Encrypted Cloud Data

Privacy Preserving multi-keyword ranked search over encrypted cloud data

ABSTRACT
The advent of cloud computing, data owners are motivated to outsource their complex data
management systems from local sites to commercial public cloud for great flexibility and
economic savings. But for protecting data privacy, sensitive data has to be encrypted before
outsourcing, which obsoletes traditional data utilization based on plain text keyword search.
Thus, enabling an encrypted cloud data search service is of paramount importance. Considering
the large number of data users and documents in cloud, it is crucial for the search service to
allow multi-keyword query and provide result similarity ranking to meet the effective data
retrieval need. Related works on searchable encryption focus on single keyword search or
Boolean keyword search, and rarely differentiate the search results. In this paper, for the first
time, we define and solve the challenging problem of privacy-preserving multi-keyword ranked
search over encrypted cloud data (MRSE), and establish a set of strict privacy requirements for
such a secure cloud data utilization system to become a reality. Among various multi-keyword
semantics, we choose the efficient principle of coordinate matching, i.e., as many matches as
possible, to capture the similarity between search query and data documents, and further use
inner product similarity to quantitatively formalize such principle for similarity measurement.
We first propose a basic MRSE scheme using secure inner product computation, and then
significantly improve it to meet different privacy requirements in two levels of threat models.
Thorough analysis investigating privacy and efficiency guarantees of proposed schemes is given,
and experiments on the real-world dataset further show proposed schemes indeed introduce low
overhead on computation and communication.

INTRODUCTION
2

Privacy Preserving multi-keyword ranked search over encrypted cloud data

Cloud computing is the long dreamed vision of computing as a utility, where cloud customers
can remotely store their data into the cloud so as to enjoy the on-demand high quality
applications and services from a shared pool of configurable computing resources. Its great
flexibility and economic savings are motivating both individuals and enterprises to outsource
their local complex data management system into the cloud, especially when the data produced
by them that need to be stored and utilized is rapidly increasing. To protect data privacy and
combat unsolicited accesses in cloud and beyond, sensitive data, e.g., emails, personal health
records, photo albums, tax documents, financial transactions, etc., may have to be encrypted by
data owners before outsourcing to commercial public cloud; this, however, obsoletes the
traditional data utilization service based on plaintext keyword search. The trivial solution of
downloading all the data and decrypting locally is clearly impractical, due to the huge amount of
bandwidth cost in cloud scale systems. Moreover, aside from eliminating the local storage
management, storing data into the cloud serves no purpose unless they can be easily searched
and utilized. Thus, exploring privacy-preserving and effective search service over encrypted
cloud data is of paramount importance. Considering the potentially large number of on demand
data users and huge amount of outsourced data documents in cloud, this problem is particularly
challenging as it is extremely difficult to meet also the requirements of performance, system
usability and scalability. On the one hand, to meet the effective data retrieval need, large amount
of documents demand cloud server to perform result relevance ranking, instead of returning
undifferentiated result. Such ranked search system enables data users to find the most relevant
information quickly, rather than burdensomely sorting through every match in the content
collection. Ranked search can also elegantly eliminate unnecessary network traffic by sending
back only the most relevant data, which is highly desirable in the pay-as-you use cloud
paradigm. For privacy protection, such ranking operation, however, should not leak any keyword
related information. On the other hand, to improve search result accuracy as well as enhance user
searching experience, it is also crucial for such ranking system to support multiple keywords
search, as single keyword search often yields far too coarse result. As a common practice
indicated by todays web search engines (e.g., Google search), data users may tend to provide a
set of keywords instead of only one as the indicator of their search interest to retrieve the most
relevant data. And each keyword in the search request is able to help narrow down the search
3

Privacy Preserving multi-keyword ranked search over encrypted cloud data

result further. Coordinate matching, i.e., as many matches as possible, is an efficient principle
among such multi-keyword semantics to refine the result relevance, and has been widely used in
the plaintext information retrieval (IR) community. However, how to apply it in the encrypted
cloud data search system remains a very challenging task because of inherent security and
privacy obstacles, including various strict requirements like data privacy, index privacy, keyword
privacy, and many others. In the literature, searchable encryption is a helpful technique that treats
encrypted data as documents and allows a user to securely search over it through single keyword
and retrieve documents of interest. However, direct application of these approaches to deploy
secure large scale cloud data utilization system would not be necessarily suitable, as they are
developed as crypto primitives and cannot accommodate such high service-level requirements
like system usability, user searching experience, and easy information discovery in mind
.Although some recent designs have been proposed to support Boolean keyword search as an
attempt to enrich the search flexibility, they are still not adequate to provide users with
acceptable result ranking functionality. Our early work has been aware of this problem, and
solves the secure ranked search over encrypted data with support of only single keyword query.
But how to design an efficient encrypted data search mechanism that supports multi keyword
semantics without privacy breaches still remains a challenging open problem. In this paper, for
the first time, we define and solve the problem of multi-keyword ranked search over encrypted
cloud data (MRSE) while preserving strict system-wise privacy in cloud computing paradigm.
Among various multi-keyword semantics, we choose the efficient principle of coordinate
matching, i.e., as many matches as possible, to capture the similarity between search query and
data documents.
Our contributions are summarized as follows,
1) For the first time, we explore the problem of multi keyword ranked search over encrypted
cloud data, and establish a set of strict privacy requirements for such a secure cloud data
utilization system to become a reality.
2) We propose two MRSE schemes following the principle of coordinate matching.
3) Thorough analysis investigating privacy and efficiency guarantees of proposed schemes is
given, and experiments on the real-world dataset further show proposed schemes indeed
introduce low overhead on computation and communication.

SYSTEM ANALYSIS
4

Privacy Preserving multi-keyword ranked search over encrypted cloud data

System study aims at establishing requests for the system to be acquired, developed and
installed. It involves studying and analyzing the ways of an organization currently processing the
data to produce information. Analyzing the problem thoroughly forms the vital part of the system
study. In system analysis, prevailing situation of problem is carefully examined by breaking them
into sub problems. Problematic areas are identified and information is collected. Data gathering
is essential to any analysis of requests. It is necessary that this analysis familiarizes the designer
with objectives, activities and the function of the organization in which the system is to be
implemented.
This project, define and solve the problem of multi-keyword ranked search over
encrypted cloud data (MRSE) while preserving strict system-wise privacy in cloud computing
paradigm. With the advent of cloud computing, data owners are motivated to outsource their
complex data management systems from local sites to the commercial public cloud for great
flexibility and economic savings. But for protecting data privacy, sensitive data has to be
encrypted before outsourcing. Thus, enabling an encrypted cloud data search service is of
paramount importance. Considering the large number of data users and documents in the cloud,
it is necessary to allow multiple keywords in the search request and return documents in the
order of their relevance to these keywords.

EXISTING SYSTEM

Privacy Preserving multi-keyword ranked search over encrypted cloud data

The encryption is a helpful technique that treats encrypted data as documents and allows
a user to securely search over it through single keyword and retrieve documents of interest. The
direct application of these approaches to deploy secure large scale cloud data utilization system
would not be necessarily suitable; it cannot accommodate such high service-level requirements
like system usability, user searching experience, and easy information discovery in mind.
Disadvantage
1. Single-keyword search without ranking
PROPOSED SYSTEM
In this project, define and solve the problem of multi-keyword ranked search over
encrypted cloud data (MRSE) while preserving strict system-wise privacy in cloud computing
paradigm. Among various multi-keyword semantics, we choose the efficient principle of
coordinate matching, it many matches as possible, to capture the similarity between search
query and data documents. Specifically, we use inner product similarity, the number of query
keywords appearing in a document, to quantitatively evaluate the similarity of that document to
the search query in coordinate matching principle.
Thorough analysis investigating privacy and efficiency guarantees of proposed schemes
is given, and experiments on the real-world dataset further show proposed schemes indeed
introduce low overhead on computation and communication.
Advantage
1. Multi key word ranking for secure the cloud data
2. Searching on the encrypted data will give an expected data

Privacy Preserving multi-keyword ranked search over encrypted cloud data

FEASIBILITY STUDY
Feasibility study is a procedure that identifies, describes and evaluates candidate system.
During system analysis, the feasibility study of the proposed system is to be carried out. This is
to ensure that the proposed system is not a burden to the company. For feasibility analysis, some
understanding of the major requirements for the system is essential. The key considerations
involved in the feasibility analysis are:
Economic feasibility
Technical feasibility
Operational feasibility
ECONOMIC FEASIBILITY
The economic analysis is to determine the benefits and savings that are expected from a
candidate system and compare them with costs. The system is economically feasible, as the
organization possesses the hardware and software resources required for the functioning of the
system. Any additional resources, if required, can also be easily acquired.
TECHNICAL FEASIBILITY
The software is developed using Java with JSP as Front-End, My SQL as back end, and
using Linux as the platform. The existing software packages and hardware components are
sufficient to implement this proposed system. In this aspect if we look into the proposed system,
then, it is technically feasible.
OPERATIONAL FEASIBILITY
The system operation is the longest phase in the development life cycle of a system. So,
operational feasibility should be given much importance. The user of the system does not need
thorough training on the system. All they are expected to know to operate the system is the basic
net surfing and social networking knowledge. It has a user-friendly interface. So the proposed
system is operationally feasible.

Privacy Preserving multi-keyword ranked search over encrypted cloud data

REQUIREMENT SPECIFICATION

HARDWARE REQUIREMENT

Processor

: Intel Core i3

RAM

: 3GB

Storage

: 320 GB Hard Disk

SOFTWARE REQUIREMENT

Front end

Java( Hibernate), JSP

Back end

My SQL

Operating system

Windows/Linux

IDE

Net beans

MODULES:

Privacy Preserving multi-keyword ranked search over encrypted cloud data

1.

Encrypt Module

2.

Client Module

3.

Multi-keyword Module

4.

Admin Module
MODULES DESCRIPTION:

ENCRYPT MODULE:
This module is used to help the server to encrypt the document using AES Algorithm and to
convert the encrypted document using keys with and this key is send to the user for download.
CLIENT MODULE:
This module is used to help the client to search the file using the multiple key words concept and
get the accurate result list based on the user query. The user is going to select the required file
and register the user details and get the key in mail. After user can download the file and extract
that file.
MULTI-KEYWORD MODULE:
This module is used to help the user to get the accurate result based on the multiple keyword
concepts. The users can enter the multiple words query, the server is going to split that query into
a single word after search that word file in our database. Finally, display the matched word list
from the database and the user gets the file from that list.
ADMIN MODULE:
This module is used to help the server to view details and upload files with the security. Admin
uses his id and password at the login time. The admin can change the password after the login
and view the user downloading details and the counting of file request details on flowchart.

Privacy Preserving multi-keyword ranked search over encrypted cloud data

DATA FLOW DIAGRAM


A Data Flow Diagram (DFD) is a diagram that describes the flow of data and the
processes that change or transform data throughout a system. It is the starting point in system
that decomposes the requirements specifications down to the lowest level of details.
DFD SYMBOLS

It represents source or destination of a system.

It represents process.

It represents flow control.

It represents storage field.

Level-0

10

Privacy Preserving multi-keyword ranked search over encrypted cloud data

Admin Request

Admin Response

User

User

Request

Response

FIRST LEVEL DFD

11

Privacy Preserving multi-keyword ranked search over encrypted cloud data

LEVEL :2 DFD FOR PROCESS NO:1 ADMIN PROCESS

12

Privacy Preserving multi-keyword ranked search over encrypted cloud data

LEVEL 2 DFD FOR PROCESS NO: 6USER MANAGEMENT

LEVEL 2: DFD FOR USER PROCESS

13

Privacy Preserving multi-keyword ranked search over encrypted cloud data

14

Privacy Preserving multi-keyword ranked search over encrypted cloud data

DESKTOP- FIRST LEVEL ADMINISTRATOR MODULE

DESKTOP- FIRST LEVEL USER MODULE

TABLE DESIGN

1. Table Name :

LOGIN
15

Privacy Preserving multi-keyword ranked search over encrypted cloud data

Primary key

LOGINID

Field Name

Type

Width

Description

LOGINID

INT

11

Login

USERNAME

VARCHAR

20

User name for administrator and user

PASSWORD

VARCHAR

15

Password

USERTYPE

VARCHAR

Administrator/user

STATUS

INT

Status of user

2. Table Name
Primary key

:
:

REGISTER
REGID

Field Name

Type

Width

Description

REGID

INT

11

Registration id

FIRSTNAME

VARCHAR

20

First Name

LASTNAME

VARCHAR

20

Last Name

LOCATION

VARCHAR

20

Location

CITY

VARCHAR

20

City

STATE

VARCHAR

20

State

PH

INT

10

Phone number

EMAIL

VARCHAR

30

E-mail address

USERNAME

VARCHAR

10

Username

Width

Description

3. Table Name
Primary key
Field Name

MULTIDATA
MID
Type

16

Privacy Preserving multi-keyword ranked search over encrypted cloud data

MID

INT

11

Mid

ABSOLUTE

VARCHAR

50

Path

NAME

VARCHAR

30

Name of file

RANK

INT

11

Rank of file

KEY

VARCHAR

20

Key used for decryption

17

Privacy Preserving multi-keyword ranked search over encrypted cloud data

FORM DESIGN
Login page:

Admin login

18

Privacy Preserving multi-keyword ranked search over encrypted cloud data

User login

Upload file

19

Privacy Preserving multi-keyword ranked search over encrypted cloud data

Download file

Change password

20

Privacy Preserving multi-keyword ranked search over encrypted cloud data

Registration

User management

21

Privacy Preserving multi-keyword ranked search over encrypted cloud data

22

Privacy Preserving multi-keyword ranked search over encrypted cloud data

23

Privacy Preserving multi-keyword ranked search over encrypted cloud data

24

Privacy Preserving multi-keyword ranked search over encrypted cloud data

25

Privacy Preserving multi-keyword ranked search over encrypted cloud data

26

Privacy Preserving multi-keyword ranked search over encrypted cloud data

27

Privacy Preserving multi-keyword ranked search over encrypted cloud data

28

Privacy Preserving multi-keyword ranked search over encrypted cloud data

29

Das könnte Ihnen auch gefallen