Efficient Privacy Preserving Clustering Based Multi Keyword Search
atheeq_seminar_project !!!
1.
2. SEMINAR PROJECT
An Efficient Privacy-
Preserving Ranked
Keyword Search
Method
IEEE TRANSACTIONS ON PARALLEL AND
DISTRIBUTED SYSTEMS, VOL. 27, NO. 4, APRIL
2016
3. ABSTRACT—
• Cloud data owners prefer to outsource
documents in an encrypted form for the
purpose of privacy preserving. Therefore it is
essential to develop efficient and reliable
ciphertext search techniques.
4. PROBLEM STATEMENT:
• As the size of the data increases complexity
also increases.
• Keeping track of flow is difficult especially
when huge amount of data is altogether
encrypted.
5. DISADVANTAGES:
• complexity increases with increase in
data
• Tracking flow of execution is difficult
• a full search will be done if element is in
last position
6. PROPOSED SYSTEM:
It is divided into following:-
• Single Keyword Searchable
Encryption
• Verifiable Search Based on
Authenticated Index
• Multiple Keyword Searchable
Encryption
• Relevance Measure
• Quality Hierarchical Clustering
Algorithm
7. • Search Algorithm
• Search Result Verification
• Dynamic Data Collection
EFFICIENCY AND SECURITY
• Search Efficiency
• Security Analysis
10. • Single Keyword Searchable Encryption -
each word in the document is encrypted
independently.
• Multiple Keyword Searchable Encryption -
They propose to encrypt multiple words in the
document.
11. • Verifiable Search Based on Authenticated
Index -
Merkel hash tree technique of cryptography is
used
Authentication for hierarchical clustering index as
above:-
12. • Relevance Measure - It is used to quantify the
relevance of document- query and document-
document
• Quality Hierarchical Clustering Algorithm -
partition clustering method is used
13. • Search Algorithm - The cloud server needs to
find the cluster that most matches the query
• Search Result Verification - The search result is
verified
• Dynamic Data Collection - As the documents
stored at server may be deleted or modified
14. EFFICIENCY AND SECURITY
• Search Efficiency - The search process can be
divided into Trapdoor phase and Search phase
• Security Analysis - MRSE-HCI is secure under
know ciphertext model.
15. Advantages:
• preserves privacy
• provides secure keyword search
• provides security
• Search efficiency
• Retrieval accuracy
• Integrity of the search result
16. CONCLUSION:
• In this paper, we investigated ciphertext search
in the scenario of cloud storage
• We explore the problem of maintaining the
semantic relationship between different plain
• We also propose the MRSE-HCI architecture
• the correctness and completeness of search
results
• A verifying mechanism is present
17. • we analyze the search efficiency and security
• architecture not only properly solves the multi-
keyword ranked search problem, but also brings
an improvement in the following :-
• search efficiency
• rank security
• relevance between retrieved documents.
18. REFERENCES
[1] S. Grzonkowski, P. M. Corcoran, and T. Coughlin, “Security analysis
of authentication protocols for next-generation mobile and
CE cloud services,” in Proc. IEEE Int. Conf. Consumer Electron.,
2011, Berlin, Germany, 2011, pp. 83–87.
[2] D. X. D. Song, D. Wagner, and A. Perrig, “Practical techniques for
searches on encrypted data,” in Proc. IEEE Symp. Security Priv.,
BERKELEY, CA, 2000, pp. 44–55.
[3] D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public
key encryption with keyword search,” in Proc. EUROCRYPT,
Interlaken, SWITZERLAND, 2004, pp. 506–522.
[4] Y. C. Chang and M. Mitzenmacher, “Privacy preserving keyword
searches on remote encrypted data,” in Proc. 3rd Int.
Conf. Applied Cryptography Netw. Security, New York, NY, 2005,
pp. 442–455.