Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data

jeanscricketInternet και Εφαρμογές Web

3 Νοε 2013 (πριν από 3 χρόνια και 5 μήνες)

242 εμφανίσεις

REVENIR DEVELOPMENT SYSTEM Pvt. Ltd


Ph
.No. 9405607989/9373114165

Revenir Development Systems, Flat no
-
2, Neelkanth Apartments, Deep Bunglow Chowk, Model Colony,
Shivaji Nagar, Pune 411016


Privacy
-
Preserving Multi
-
keyword Ranked
Search

over Encrypted Cloud Data



ABSTRACT

T
he advent of cloud computing, data owners

are motivated to outsource their complex
data management

systems from local sites to commercial public cloud for great

flexibilit
y and
economic savings. But for protecting data privacy,

sensitive data has to be encrypted before
outsourcing, which

obsoletes traditional data utilization based on plaintext keyword

search.
Thus, enabling an encrypted cloud data search service is

of para
mount importance. Considering
the large number of data

users and documents in cloud, it is crucial for the search service to

allow multi
-
keyword query and provide result similarity ranking

to meet the effective data
retrieval need. Related works on

searcha
ble encryption focus on single keyword search or
Boolean

keyword search, and rarely differentiate the search results.

W
e define and solve the
challenging

problem of privacy
-
preserving multi
-
keyword ranked search over

encrypted cloud
data (MRSE), and establ
ish a set of strict privacy

requirements for such a secure cloud data
utilization system

to become a reality. Among various multi
-
keyword semantics,

we choose the
efficient principle of “coordinate matching”,
its

many matches as possible, to capture the
si
milarity between

search query and data documents, and further use “inner product

similarity”
to quantitatively formalize such principle for similarity

measurement. We first propose a basic
MRSE scheme using

secure inner product computation, and then signif
icantly improve

it to meet
different privacy requirements in two levels of threat

models. Thorough analysis investigating
privacy and efficiency

guarantees of proposed schemes is given, and experiments on

the real
-
world dataset further show proposed scheme
s indeed

introduce low overhead on computation
and communication.



REVENIR DEVELOPMENT SYSTEM Pvt. Ltd


Ph
.No. 9405607989/9373114165

Revenir Development Systems, Flat no
-
2, Neelkanth Apartments, Deep Bunglow Chowk, Model Colony,
Shivaji Nagar, Pune 411016




EXISTING SYSTEM

The
encryption is a helpful

technique that treats encrypted data as documents and allows

a user to securely search over it through single keyword and

retrieve documents o
f interest.
The
direct application

of these approaches to deploy secure large scale cloud data

utilization system
would not be necessarily suitable, as they

are developed as crypto primitives and cannot
accommodate

such high service
-
level requirements like

system usability, user

searching
experience, and easy information discovery in mind.

Disadvantage:



Large scale cloud utilization gets less security



Service level is not ell for users

PROPOSED SYSTEM

In this project,
define and solve the

problem of multi
-
keyword ranked search over
encrypted cloud

data (MRSE) while preserving strict system
-
wise privacy in

cloud computing
paradigm. Among various multi
-
keyword

semantics, we choose the efficient principle of
“coordinate

matching”,

it
many matches as possible,
to capture

the similarity between search
query and data documents.

Specifically, we use “inner product similarity”
,

the

number of query
keywords appearing in a document, to

quantitatively evaluate the similarity of that document to
the

search query in “coo
rdinate matching” principle.


To
improve various privacy requirements in two levels of threat models.

T
he first time,
we explore the problem of multi

keyword

ranked search over encrypted cloud data, and

establish
a set of strict privacy requirements for su
ch a

secure cloud data utilization system to become a
reality.

The
propose two MRSE schemes following the principle

of “coordinate matching” while
meeting different privacy

requirements in two levels of threat models.

Thorough analysis
investigating privac
y and efficiency

guarantees of proposed schemes is given, and experiments

REVENIR DEVELOPMENT SYSTEM Pvt. Ltd


Ph
.No. 9405607989/9373114165

Revenir Development Systems, Flat no
-
2, Neelkanth Apartments, Deep Bunglow Chowk, Model Colony,
Shivaji Nagar, Pune 411016


on the real
-
world dataset further show proposed

schemes indeed introduce low overhead on
computation

and communication.

Advantage:



Multi key word ranking for secure the cloud data



Se
arching on the encrypted data will give an expected data

SYSTEM MODELS


HARDWARE REQUIREMENT

CPU type : Intel Pentium 4

Clock speed : 3.0 GHz

Ram size : 512 MB

Hard disk capacity

: 40 GB

Monitor type : 15 Inch color monitor

Keyboard type : internet keyboard


SOFTWARE REQUIREMENT

Oper at i ng Sys t em: Andr oi d


Language : J AVA



Back End :
SQ
Lite


Document at i on

:

Ms
-
Office



REVENIR DEVELOPMENT SYSTEM Pvt. Ltd


Ph
.No. 9405607989/9373114165

Revenir Development Systems, Flat no
-
2, Neelkanth Apartments, Deep Bunglow Chowk, Model Colony,
Shivaji Nagar, Pune 411016









MODULES

I. server



Network checking



Data encrypt



Store to cloud server



Send decrypted key to user

II. Cloud server



Retrieve request from user



Searching index/rank calculation



Response to user

III. User



Request to cloud server



Retri
eve decrypted key from admin & document from cloud server



Decrypt file


MODULE DESCRIPTIONS

I. Server


The server
maintain the following process,

Network checking

REVENIR DEVELOPMENT SYSTEM Pvt. Ltd


Ph
.No. 9405607989/9373114165

Revenir Development Systems, Flat no
-
2, Neelkanth Apartments, Deep Bunglow Chowk, Model Colony,
Shivaji Nagar, Pune 411016



Initializing the server to check the network connection

from cloud server and user. The
conn
ections are successfully, and then the processes are executed.


Data encrypt


The main server first encrypts the data’s, and then stored the cloud server.
Cloud server is
considered as “honest
-
but
-
curious” in our

model, which is consistent with the most re
lated works
on

searchable encryption. Specifically, cloud server acts in an

“honest” fashion and correctly
follows the designated protocol

specification.




Store to cloud server

The cloud server collects the some different encrypted documents.
In this pro
cess
encrypted data to store with cloud server.

S
earch result should be ranked by cloud
.

The cloud
server according to some ranking criteria
.


Send decrypted key to user


The main server encrypts the some documents. It used by the some encryptions keys.
Fi
nally the users search the document from the cloud server.


II. Cloud server

The cloud server maintain the process,

Retrieve request from user


The anyone
user wants

to request the data

and then server able to send the user request.
The retrieve the data
from

server to user.


Searching index/rank calculation

REVENIR DEVELOPMENT SYSTEM Pvt. Ltd


Ph
.No. 9405607989/9373114165

Revenir Development Systems, Flat no
-
2, Neelkanth Apartments, Deep Bunglow Chowk, Model Colony,
Shivaji Nagar, Pune 411016



On the one hand, to meet the effective data retrieval need,

large amount of documents
demand cloud server to perform

result relevance ranking, instead of returning undifferentiated

result. Ranked se
arch can also elegantly eliminate

unnecessary network traffic by sending back
only the most

relevant data.

Response to user


The server response to user
s request with the rank and index estimation while search a
document in cloud.

III. User

The user

mainta
in the following process,

Request to cloud server


The

client request for our needs send to cloud server.

Specifically, cloud server acts in an

“honest” fashion and correctly follows the designated protocol

specification.



Retrieve decrypted key from admi
n & document from cloud server



All encrypted key data to

send to admin of the cloud server, the admin to take the

encrypted data
. Then all the data to store in cloud server.

Decrypt file

The

trivial solution of downloading all the data and decrypting

loc
ally is clearly
impractical, due to the huge amount of

bandwidth cost in cloud scale systems.

T
he access control
mechanism is employed to

manage decryption capabilities given to users.







REVENIR DEVELOPMENT SYSTEM Pvt. Ltd


Ph
.No. 9405607989/9373114165

Revenir Development Systems, Flat no
-
2, Neelkanth Apartments, Deep Bunglow Chowk, Model Colony,
Shivaji Nagar, Pune 411016










Work flow diagram:





















Data User

Cloud server

Search control

Access Control

Rank Result


Search request

Da
ta owner

Encrypted data Index



REVENIR DEVELOPMENT SYSTEM Pvt. Ltd


Ph
.No. 9405607989/9373114165

Revenir Development Systems, Flat no
-
2, Neelkanth Apartments, Deep Bunglow Chowk, Model Colony,
Shivaji Nagar, Pune 411016














CO
NCLUSION

W
e

define and solve the

problem of multi
-
keyword ranked search over encrypted cloud

data, and begin a variety of privacy requirements. Among

different multi
-
keyword semantics, we
choose the efficient

principle of “coordinate matching”, as many mat
ches

as possible, to
effectively capture similarity between query

keywords and outsourced documents, and use “inner
product

similarity” to quantitatively formalize such a principle for similarity

measurement. For
meeting the challenge of supporting

multi
-
k
eyword semantic without privacy breaches,
the
propose a basic MRSE scheme using secure inner product

computation, and significantly
improve it to achieve privacy

requirements in two levels of threat models. Thorough analysis

investigating privacy and effic
iency guarantees of proposed

schemes is given, and experiments
on the real
-
world dataset

show our proposed schemes introduce low overhead on both

computation and communication.