17
SSPM’s SOMESHWAR ENGINEERING COLLEGE SOMESHWARNAGAR Department of Computer Engineering Seminar On “Privacy-preserving Multi-keyword Fuzzy Search Over Encrypted Data In The Cloud” Guide Name: Presented By, Prof. Shinde V.D. Miss-Limbarkar Archana 17/03/16 1

cloud fuzzy search

Embed Size (px)

Citation preview

Page 1: cloud fuzzy search

SSPM’sSOMESHWAR ENGINEERING COLLEGE

SOMESHWARNAGAR Department of Computer Engineering

Seminar On

“Privacy-preserving Multi-keyword Fuzzy Search Over Encrypted Data In The Cloud”

Guide Name: Presented By, Prof. Shinde V.D. Miss-Limbarkar Archana

Roll no:-22

17/03/16 1

Page 2: cloud fuzzy search

CONTENTS

IntroductionProblem definitionExisting SystemLiterature SurveyDisadvantages of Existing SystemArchitectureMethodologyMathematical ModelAdvantages/FeaturesConclusionReferences

17/03/16 2

Page 3: cloud fuzzy search

INTRODUCTION

Cloud Computing

Scalable

Elastic Storage

Computation Resources

Outsourcing Data Services.

17/03/16 3

Page 4: cloud fuzzy search

PROBLEM DEFINITION

High privacy

Keyword collection

Search and a trapdoor

17/03/16 4

Page 5: cloud fuzzy search

EXISTING SYSTEM

Cloud computing

Ranking to meet the effective data retrieval need.

Searchable encryption

Cloud computing contains more private and sensitive information’s such as emails,

government documents, personnel records

MRSE technique

17/03/16 5

Page 6: cloud fuzzy search

LITERATURE SURVEY

17/03/16 6

Page 7: cloud fuzzy search

DISADVANTAGES OF EXISTING SYSTEM

Secure ranked search over encrypted data problem.

Efficient encrypted data search mechanism.

Privacy problem.

Time delay.

17/03/16 7

Page 8: cloud fuzzy search

ARCHITECTURE

17/03/16 8Fig-System Architecture of Search over Encrypted data on cloud computing

Page 9: cloud fuzzy search

METHODOLOGY

1.KeyGen(m)-Key Generation

2.Index Enc(SK; I)-Index Encryption

3.Query Enc(SK;Q)-Query Encryption

4.BuildIndex(D; SK; l)-Index Building

5.Trapdoor(Q; SK)-Trapdoor Generation

6.Search(EncSK(Q);EncSK(ID))-Searching

17/03/16 9

Page 10: cloud fuzzy search

MATHEMATICAL MODEL

Let us consider S as a set of inputs.

S= { }

INPUT:

Identify the inputs as keyword transformation

information

F= {f1, f2, f3 ....., fn| ‘F’ as set of functions to execute the process}

I= {i1, i2, i3…|’I’ sets of inputs to the function set}

O= {o1, o2, o3….|’O’ Set of outputs from the function sets}

S= {I, F, O}

I = {keyword transformation information}

O = {Index,Query}

F = {Build index,trapdoor generation}

17/03/1610

Page 11: cloud fuzzy search

ADVANTAGES

Multi-Keyword Fuzzy Search

Privacy Guarantee

Result Accuracy

No Predefined Dictionary

Security

Performance

17/03/16 11

Page 12: cloud fuzzy search

FEATURES

Efficiency

Enhanced Scheme

F-measure

Security Analysis of Enhanced Scheme

Performance Analysis

17/03/16 12

Page 13: cloud fuzzy search

CONCLUSION

In this seminar, we tackled the challenging multi-keyword fuzzy search problem over the encrypted data.

We proposed and integrated several innovative designs to solve the multiple keywords search and the fuzzy search problems simultaneously with high efficiency.

17/03/16 13

Page 14: cloud fuzzy search

REFERENCES

1. D. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted

data,” S&P 2000, vol. 8, pp. 44–55, 2000.

2.W. Sun, B. Wang, N. Cao, M. Li, W. Lou, T. Hou, and H. Li, “Privacypreserving multi-

keyword text search in the cloud supporting similaritybased ranking,” in ASIACCS

2013, May 2013.

3.D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with

keyword search,” EUROCRYPTO 2004, pp. 506–522,2004.

4. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword

ranked search over encrypted cloud data,” INFOCOM 2011, pp. 829–837, 2011

17/03/16 14

Page 15: cloud fuzzy search

CONTINUES….

1.Y. Hwang and P. Lee, “Public key encryption with conjunctive keyword

search and its extension to a multi-user system,” Pairing 2007, pp. 2–

22,2007.

2. D. Boneh and B. Waters, “Conjunctive, subset, and range queries on

encrypted data,” Theory of Cryptography, vol. 4392, pp. 535–554, 2007.

3.P. Golle, J. Staddon, and B. Waters, “Secure conjunctive keyword search

over encrypted data,” ACNS 2004, vol. 3089, pp. 31–45, 2004.

4.C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword

search over encrypted cloud data,” ICDCS 2010, pp. 253–262, 2010.17/03/16 15

Page 16: cloud fuzzy search

QUESTIONS???

17/03/16 16

Page 17: cloud fuzzy search

THANK YOU…!!!

17/03/16 17