SlideShare uma empresa Scribd logo
1 de 25
PROJECT ON FUZZY KEYWORD SEARCH OVER
ENCRYPTED DATA IN CLOUD COMPUTING
MOHAMMED AHMED HUSSAIN
ASIM AHMED KHAN JAWAAD
MOHAMMAD ASIF
ABSTRACT
What is fuzzy keyword search?
 Fuzzy Search: approximate string matching
Ex. Languaje will be corrected to language
Scenario:
1. User want search keyword language
2. User misspelled it as languaje and clicked on search button
3. Data in the database is in encrypted form.
4. Now search the encrypted data for inputted keyword languaje.
5. Which will converted to language and display result.
6. This is the technique which will help us to match the keyword languaje with
encrypted keywords in the database.
EXISTING SYSTEM
1. To ensure security and privacy data are first encrypted before being uploaded onto the
cloud servers.
2. These techniques support only conventional Boolean keyword search, without capturing
any relevance of the files in the search result.
3. In traditional cloud computing encryption searching schemes allows user to search
encrypted data through keywords securely.
4. These techniques employed exact keyword search and will fail if there are any
morphological variants or spelling errors.
5. This leads to low in efficiency and also affects system usability very badly.
Disadvantages
6. Single keyword search
7. Exact match
8. Less efficient
PROPOSED SYSTEM
1. This project defines and solve the problem of multi-keyword ranked search over encrypted
cloud data
2. It preserving strict system-wise privacy in cloud computing paradigm.
3. It increases the system usability by allowing matching the exact or closet match text to the
stored keywords and retrieving the approximate closest results.
4. By using edit distance to quantify keywords and ensure the privacy of the data against
unauthenticated users
5. Encrypting the data using AES encryption before uploading to the cloud servers.
6. By using a cloud server and employing fuzzy keyword search based on N grams.
7. Efficiency of our proposed system would be demonstrated through experimental results.
ENCRYPTION TECHNIQUES
1. AES is a block cipher technique with block size of 128 bits.
2. To encrypt our data by using AES with 128-bit key length.
3. For 128-bit keys the encryption process consists of 10 rounds.
4. In each case all the rounds are identical other than the last round.
N-GRAMS TECHNIQUE
1. Suppose we have to store keyword: “language”
2. N-grams: lan ang ngu gua uag age
3. Encrypted n-grams: thr yu7 tf5 7yt lk8 eer
4. Storing thr into index_0 table (1st table)
5. Storing yu7 into index_1 table (2nd table)
6. Storing tf5 into index_2 table (3rd table)
7. Storing 7yt into index_3 table and so on….
8. Rather than storing all n-grams into single table we are storing the first n-gram in first
table, second n-gram in second table and so on.
9. This will reduce the number of comparisons required to match the n-grams and hence
faster the search results.
WILDCARD-BASED TECHNIQUE
1. Try to generate smaller fuzzy sets
2. Wildcards
●
Denote operations at the same position
3. Wildcard-based fuzzy set
4. Swi,d = {S’wi,0,S’wi,1,...,S’wi,d}
5. S’wi,τ is the set of words w’i with τ wildcards
6. Example
7. w = CASTLE,τ = 1
8. SCASTLE,1 = {CASTLE, CASTLE, ASTLE,∗ ∗ C ASTLE,C STLE,...,∗ ∗
CASTL E,CAST E,CASTLE }∗ ∗ ∗
SOFTWARE REQUIREMENTS
1. PHP
2. MySQL
3. Codeigniter PHP framework
4. HTML, CSS
HARDWARE REQUIREMENTS
1. Processor: Pentium IV 2.4 GHz.
2. Hard Disk : 40 GB
3. Monitor : 15 VGA Colour.
4. Ram: 512 Mb.
THE WORKING OF PROJECT
DATAFLOW DIAGRAMS
 Level 0 DFD
 Level 1 DFD
UML DIAGRAMS
CLASS DIAGRAM
USE CASE DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
COLLABORATION DIAGRAM
STATE CHART DIAGRAM
COMPONENT DIAGRAM
DEPLOYMENT DIAGRAM
RELATIONAL DATABASE MODEL
GUI DESIGN
CONCLUSION
1. In this project, the problem of supporting efficient yet privacy-preserving fuzzy
search for achieving effective utilization of remotely stored encrypted data in
cloud computing is solved.
2. Two advanced techniques were designed to construct the storage-efficient fuzzy
keyword sets by exploiting two significant observations on the similarity metric
of edit distance.
3. Based on the constructed fuzzy keyword sets, a brand-new symbol-based trie-
traverse searching scheme is proposed.
4. Where a multi-way tree structure is built up using symbols transformed from the
resulted fuzzy keyword sets.
5. It is shown that our proposed solution is secure and privacy- preserving, while
correctly realizing the goal of fuzzy keyword search.
REFERENCE
1. Fuzzy keyword search over encrypted data in cloud computing" by C. Anuradha.
2. Implementation of fuzzy keyword search over encrypted data in cloud computing" by d.
Vasumathi.
3. Fuzzy keyword search over encrypted data in cloud computing", illinois institute of
technology, issn: 2321-8134.
4. Practical techniques for searches on encrypted data" by d. Song, A. Perrig. In IEEE, 2000.
5. Privacy preserving keyword searches on remote encrypted data" by y. C. Chang in ACNS,
2005.
6. Overview on selective encryption of image and video" by a massoudi in eurasip, 2008.
7. Efficient interactive fuzzy keyword search "by j. Feng, G. Li in WWW, 2009.
THANKYOU!

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

AES.ppt
AES.pptAES.ppt
AES.ppt
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
 
Relational keys
Relational keysRelational keys
Relational keys
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
Ch9
Ch9Ch9
Ch9
 
Rc4
Rc4Rc4
Rc4
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Concurrency control
Concurrency control Concurrency control
Concurrency control
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
 
Ch14
Ch14Ch14
Ch14
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
AES Abstract
AES AbstractAES Abstract
AES Abstract
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DES
 
Des lecture
Des lectureDes lecture
Des lecture
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication Models
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
cryptography
cryptographycryptography
cryptography
 
Modern symmetric cipher
Modern symmetric cipherModern symmetric cipher
Modern symmetric cipher
 

Semelhante a Fuzzy keyword search over encrypted data in cloud computing presentation

2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search overIEEEFINALSEMSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEEMEMTECHSTUDENTPROJECTS
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreIJMER
 
Enabling fine grained multi-keyword search
Enabling fine grained multi-keyword searchEnabling fine grained multi-keyword search
Enabling fine grained multi-keyword searchjpstudcorner
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...Nikhil Jain
 
Paper id 28201425
Paper id 28201425Paper id 28201425
Paper id 28201425IJRAT
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmIRJET Journal
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionIRJET Journal
 
A Novel Approach for Data Security in Cloud Environment
A Novel Approach for Data Security in  Cloud EnvironmentA Novel Approach for Data Security in  Cloud Environment
A Novel Approach for Data Security in Cloud EnvironmentSHREYASSRINATH94
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET Journal
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET Journal
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...IRJET Journal
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationIRJET Journal
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...IJNSA Journal
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of commonIJNSA Journal
 
M021201092098
M021201092098M021201092098
M021201092098theijes
 
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...IJERA Editor
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption TechniqueSajedul Karim
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 

Semelhante a Fuzzy keyword search over encrypted data in cloud computing presentation (20)

2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
 
Enabling fine grained multi-keyword search
Enabling fine grained multi-keyword searchEnabling fine grained multi-keyword search
Enabling fine grained multi-keyword search
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
 
Paper id 28201425
Paper id 28201425Paper id 28201425
Paper id 28201425
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
 
A Novel Approach for Data Security in Cloud Environment
A Novel Approach for Data Security in  Cloud EnvironmentA Novel Approach for Data Security in  Cloud Environment
A Novel Approach for Data Security in Cloud Environment
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of common
 
M021201092098
M021201092098M021201092098
M021201092098
 
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Fuzzy keyword search over encrypted data in cloud computing presentation

  • 1. PROJECT ON FUZZY KEYWORD SEARCH OVER ENCRYPTED DATA IN CLOUD COMPUTING MOHAMMED AHMED HUSSAIN ASIM AHMED KHAN JAWAAD MOHAMMAD ASIF
  • 2. ABSTRACT What is fuzzy keyword search?  Fuzzy Search: approximate string matching Ex. Languaje will be corrected to language Scenario: 1. User want search keyword language 2. User misspelled it as languaje and clicked on search button 3. Data in the database is in encrypted form. 4. Now search the encrypted data for inputted keyword languaje. 5. Which will converted to language and display result. 6. This is the technique which will help us to match the keyword languaje with encrypted keywords in the database.
  • 3. EXISTING SYSTEM 1. To ensure security and privacy data are first encrypted before being uploaded onto the cloud servers. 2. These techniques support only conventional Boolean keyword search, without capturing any relevance of the files in the search result. 3. In traditional cloud computing encryption searching schemes allows user to search encrypted data through keywords securely. 4. These techniques employed exact keyword search and will fail if there are any morphological variants or spelling errors. 5. This leads to low in efficiency and also affects system usability very badly. Disadvantages 6. Single keyword search 7. Exact match 8. Less efficient
  • 4. PROPOSED SYSTEM 1. This project defines and solve the problem of multi-keyword ranked search over encrypted cloud data 2. It preserving strict system-wise privacy in cloud computing paradigm. 3. It increases the system usability by allowing matching the exact or closet match text to the stored keywords and retrieving the approximate closest results. 4. By using edit distance to quantify keywords and ensure the privacy of the data against unauthenticated users 5. Encrypting the data using AES encryption before uploading to the cloud servers. 6. By using a cloud server and employing fuzzy keyword search based on N grams. 7. Efficiency of our proposed system would be demonstrated through experimental results.
  • 5. ENCRYPTION TECHNIQUES 1. AES is a block cipher technique with block size of 128 bits. 2. To encrypt our data by using AES with 128-bit key length. 3. For 128-bit keys the encryption process consists of 10 rounds. 4. In each case all the rounds are identical other than the last round.
  • 6. N-GRAMS TECHNIQUE 1. Suppose we have to store keyword: “language” 2. N-grams: lan ang ngu gua uag age 3. Encrypted n-grams: thr yu7 tf5 7yt lk8 eer 4. Storing thr into index_0 table (1st table) 5. Storing yu7 into index_1 table (2nd table) 6. Storing tf5 into index_2 table (3rd table) 7. Storing 7yt into index_3 table and so on…. 8. Rather than storing all n-grams into single table we are storing the first n-gram in first table, second n-gram in second table and so on. 9. This will reduce the number of comparisons required to match the n-grams and hence faster the search results.
  • 7. WILDCARD-BASED TECHNIQUE 1. Try to generate smaller fuzzy sets 2. Wildcards ● Denote operations at the same position 3. Wildcard-based fuzzy set 4. Swi,d = {S’wi,0,S’wi,1,...,S’wi,d} 5. S’wi,τ is the set of words w’i with τ wildcards 6. Example 7. w = CASTLE,τ = 1 8. SCASTLE,1 = {CASTLE, CASTLE, ASTLE,∗ ∗ C ASTLE,C STLE,...,∗ ∗ CASTL E,CAST E,CASTLE }∗ ∗ ∗
  • 8. SOFTWARE REQUIREMENTS 1. PHP 2. MySQL 3. Codeigniter PHP framework 4. HTML, CSS HARDWARE REQUIREMENTS 1. Processor: Pentium IV 2.4 GHz. 2. Hard Disk : 40 GB 3. Monitor : 15 VGA Colour. 4. Ram: 512 Mb.
  • 9. THE WORKING OF PROJECT
  • 11.  Level 1 DFD
  • 23. CONCLUSION 1. In this project, the problem of supporting efficient yet privacy-preserving fuzzy search for achieving effective utilization of remotely stored encrypted data in cloud computing is solved. 2. Two advanced techniques were designed to construct the storage-efficient fuzzy keyword sets by exploiting two significant observations on the similarity metric of edit distance. 3. Based on the constructed fuzzy keyword sets, a brand-new symbol-based trie- traverse searching scheme is proposed. 4. Where a multi-way tree structure is built up using symbols transformed from the resulted fuzzy keyword sets. 5. It is shown that our proposed solution is secure and privacy- preserving, while correctly realizing the goal of fuzzy keyword search.
  • 24. REFERENCE 1. Fuzzy keyword search over encrypted data in cloud computing" by C. Anuradha. 2. Implementation of fuzzy keyword search over encrypted data in cloud computing" by d. Vasumathi. 3. Fuzzy keyword search over encrypted data in cloud computing", illinois institute of technology, issn: 2321-8134. 4. Practical techniques for searches on encrypted data" by d. Song, A. Perrig. In IEEE, 2000. 5. Privacy preserving keyword searches on remote encrypted data" by y. C. Chang in ACNS, 2005. 6. Overview on selective encryption of image and video" by a massoudi in eurasip, 2008. 7. Efficient interactive fuzzy keyword search "by j. Feng, G. Li in WWW, 2009.

Notas do Editor

  1. <number>
  2. <number>
  3. <number>