2014 IEEE .NET CLOUD COMPUTING PROJECT Fuzzy Keyword Search Over Encrypted Data in Cloud Computing

Published on May 2016 | Categories: Documents | Downloads: 29 | Comments: 0 | Views: 299
of 9
Download PDF   Embed   Report

To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - [email protected] Our Website: www.finalyearprojects.org

Comments

Content


















FUZZY KEYWORD SEARCH
ABSTRACT

As Cloud Computing becomes prevalent, more and more sensitive information are being
centralized into the cloud. For the protection of data privacy, sensitive data usually have to be
encrypted before outsourcing, which makes effective data utilization a very challenging task.
Although traditional searchable encryption schemes allow a user to securely search over
encrypted data through keywords and selectively retrieve files of interest, these techniques
support only exact keyword search. That is, there is no tolerance of minor types and format
inconsistencies which, on the other hand, are typical user searching behavior and happen very
frequently. This significant drawback makes existing techniques unsuitable in Cloud Computing
as it greatly affects system usability, rendering user searching experiences very frustrating and
system efficacy very low. In this paper, for the first time we formalize and solve the problem of
effective fuzzy keyword search over encrypted cloud data while maintaining keyword privacy.
Fuzzy keyword search greatly enhances system usability by returning the matching files when
users’ searching inputs exactly match the predefined keywords or the closest possible matching
files based on keyword similarity semantics, when exact match fails. In our solution, we exploit
edit distance to quantify keywords similarity and develop two advanced techniques on
constructing fuzzy keyword sets, which achieve optimized storage and representation overheads.
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:[email protected]






We further propose a brand new symbol-based trie-traverse searching scheme, where a multi-
way tree structure is built up using symbols transformed from the resulted fuzzy keyword sets.
Through rigorous security analysis, we show that our proposed solution is secure and privacy-
preserving, while correctly realizing the goal of fuzzy keyword search. Extensive experimental
results demonstrate the efficiency of the proposed solution.










Introduction

Cloud Computing, the new term for the long dreamed vision of computing as a utility, enables
convenient, on-demand network access to a centralized pool of configurable computing
resources (e.g., networks, applications, and services) that can be rapidly deployed with great
efficiency and minimal management overhead . The amazing advantages of Cloud Computing
include: on-demand self-service, ubiquitous network access, location independent resource
pooling, rapid resource elasticity, usage-based pricing, transference of risk, etc. Thus, Cloud
Computing could easily benefit its users in avoiding large capital outlays in the deployment and
management of both software and hardware. Undoubtedly, Cloud Computing brings
unprecedented paradigm shifting and benefits in the history of IT. As Cloud Computing becomes
prevalent, more and more sensitive information are being centralized into the cloud, such as
emails, personal health records, private videos and photos, company finance data, government
documents, etc. By storing their data into the cloud, the data owners can be relieved from the
burden of data storage and maintenance so as to enjoy the on-demand high quality data storage
service. However, the fact that data owners and cloud server are not in the same trusted domain
may put the outsourced data at risk, as the cloud server may no longer be fully trusted in such a
cloud environment due to a number of reasons: the cloud server may leak data information to
unauthorized entities or be hacked. It follows that sensitive data usually should be encrypted
prior to outsourcing for data privacy and combating unsolicited accesses.

System Architecture









Here the Data Owner stores her/she personal Data in cloud server in the form of Encrypted files
for security purpose, and then Users retrieve the data by searching based on the keywords.




Existing System:
Although allowing for performing searches securely and effectively, the existing searchable
encryption techniques do not suit for cloud computing scenario since they support only exact
keyword search. As common practice, users may search and retrieve the data of their respective
interests using any keywords they might come up with. It is quite common that users’ searching
input might not exactly match those pre-set keywords due to the possible types, such as Illinois
and Ilinois, representation inconsistencies, such as PO BOX and P.O. Box, and/or her lack of
exact knowledge about the data. To give a concrete example, statistics from Google [4] shows
that only less than 77% of the users’ searching input exactly matched the name of Britney,
detected in their spelling correction system within a three-month period. In other words,
searching based on exact keyword match would return unnecessary failures for more than 23%
search requests of Britney, making the searching system ineffective with low usability.
This significant drawback of existing schemes signifies the important need for new
techniquesthat support searching flexibility, tolerating both minor typos and format





inconsistencies. That is, secure fuzzy search capability is demanded for achieving enhanced
system usability in Cloud Computing. Searchable encryption schemes usually build up an index
for each keyword of interest and associate the index with the files that contain the keyword. By
integrating the trapdoors of keywords within the index information, effective keyword search can
be realized while both file content and keyword privacy are well-preserved.


Disadvantages:
 The existing searchable encryption techniques do not suit for cloud computing scenario
since they support only exact keyword search.
 Searching input might not exactly match those pre-set keywords due to the possible types



Proposed system:

In this paper, we focus on enabling effective yet privacy-preserving fuzzy keyword search in
Cloud Computing. To the best of our knowledge, we formalize for the first time the problem of
effective fuzzy keyword search over encrypted cloud data while maintaining keyword privacy.
Fuzzy keyword search greatly enhances system usability by returning the matching files when
users’ searching inputs exactly match the predefined keywords or the closest possible matching
files based on keyword similarity semantics, when exact match fails. More specifically, we use
edit distance to quantify keywords similarity and develop two novel techniques, i.e., an
wildcard-based technique and a gram-based technique, for the construction of fuzzy keyword
sets. Both techniques eliminate the need for enumerating all the fuzzy keywords and the resulted
size of the fuzzy keyword sets is significantly reduced. Based on the constructed fuzzy keyword
sets, we further propose an advanced symbol-based tree-traverse searching scheme, where a
multi-way tree structure is built up using symbols transformed from the fuzzy keywords.
Through rigorous security analysis, we show that the proposed solution is secure and privacy-





preserving, while correctly realizing the goal of fuzzy keyword search. Extensive experimental
results demonstrate the efficiency of the proposed solution.





Advantages:
 we focus on enabling effective yet privacy-preserving fuzzy keyword search in Cloud
Computing.
 More specifically, we use edit distance to quantify keywords similarity and develop two
novel techniques:- an wildcard-based technique and a gram-based technique.





Applications:

Used in mobile healthcare applications where the resources of memory, computation and
connectivity are extremely limited.

Modules:
 Wildcard – Based Technique

 Gram – Based Technique
 Searchable Encryption
 Construction of Effective Fuzzy Keyword Search in Cloud.

Modules Description
 Wildcard – Based Technique






In the above straightforward approach, all the variants of the keywords have to be
listed even if an operation is performed at the same position. Based on the above observation, we
proposed to use an wildcard to denote edit operations at the same position. The wildcard-based
fuzzy set edits distance to solve the problems.

For example, for the keyword CASTLE with the preset edit distance 1, its wildcard based
fuzzy keyword set can be constructed as

SCASTLE, 1 = {CASTLE, *CASTLE,*ASTLE, C*ASTLE, C*STLE, CASTL*E, CASTL*,
CASTLE*}.
Edit Distance:
a. Substitution
b. Deletion
c. Insertion

a) Substitution : changing one character to another in a word;
b) Deletion : deleting one character from a word;
c) Insertion: inserting a single character into a word.








 Gram – Based Technique

Another efficient technique for constructing fuzzy set is based on grams. The
gram of a string is a substring that can be used as a signature for efficient approximate search.
While gram has been widely used for constructing inverted list for approximate string search, we
use gram for the matching purpose. We propose to utilize the fact that any primitive edit
operation will affect at most one specific character of the keyword, leaving all the remaining
characters untouched. In other words, the relative order of the remaining characters after the
primitive operations is
always kept the same as it is before the operations.

For example, the gram-based fuzzy set SCASTLE, 1 for keyword CASTLE can be constructed
as {CASTLE, CSTLE, CATLE, CASLE, CASTE, CASTL, ASTLE}.


 Searchable Encryption






Traditional searchable encryption has been widely studied in the context of cryptography.
Among those works, most are focused on efficiency improvements and security definition
formalizations. The first construction of searchable encryption was proposed by Song et al., in
which each word in the document is encrypted independently under a special two-layered
encryption construction. Goh proposed to use Bloom filters to construct the indexes for the data
files. To achieve more efficient search, Chang et al. and Curtmola et al. both proposed similar
“index” approaches, where a single encrypted hash table index is built for the entire file
collection. In the index table, each entry consists of the trapdoor of a keyword and an
encrypted set of file identifiers Whose corresponding data files contain the keyword.
As a complementary approach, Boneh et al. presented a public-key based searchable encryption
scheme, with an analogous scenario to that of Note that all these existing schemes support only
exact keyword search, and thus are not suitable for Cloud Computing.

 Construction of Effective Fuzzy Keyword Search in Cloud

The key idea behind our secure fuzzy keyword search is two-fold:
1) Building up fuzzy keyword sets that incorporate not only the exact keywords but
also the ones differing slightly due to minor typos, format inconsistencies, etc.
2) Designing an efficient and secure searching approach for file retrieval based on the
resulted fuzzy keyword sets.







System Requirements:

Hardware Requirements:

 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 44 Mb.
 Monitor : 15 VGA Colour.
 Ram : 512 Mb.










Software Requirements:

 Operating system : Windows XP/7.
 Coding Language : net, C#.net
 Tool : Visual Studio 2010



CONCLUSION AND FURTHER RESEARCH
In this paper, for the first time we formalize and solve the problem of supporting efficient yet
privacy-preserving fuzzy search for achieving effective utilization of remotely stored encrypted
data in Cloud Computing. We design two advanced techniques (i.e., wildcard-based and gram-
based techniques) to construct the storage-efficient fuzzy keyword sets by exploiting two
significant observations on the similarity metric of edit distance. Based on the constructed fuzzy
keyword sets, we further propose a brand new symbol-based trie-traverse searching scheme,
where a multi- way tree structure is built up using symbols transformed from the resulted fuzzy
keyword sets. Through rigorous security analysis, we show that our proposed solution is secure
and privacy- preserving, while correctly realizing the goal of fuzzy keyword search. Extensive
experimental results demonstrate the efficiency of our solution.


As our ongoing work, we will continue to research on security mechanisms that support
1) Search semantics that takes into consideration conjunction of keywords, sequence of
keywords, and even the complex natural language semantics to produce highly relevant
search results. and
2) Search ranking that sorts the searching results according to the relevance criteria.







Sponsor Documents

Recommended


View All
Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close