SlideShare a Scribd company logo
1 of 2
Dynamic Multi-Keyword Ranked Search Based on Bloom
Filter Over Encrypted Cloud Data
ABSTRACT:
Cloud computing has become a popular approach to manage personal data for the
economic savings and management flexibility in recent year. However, the
sensitive data must be encrypted before outsourcing to cloud servers for the
consideration of privacy, which makes some traditional data utilization functions,
such as the plaintext keyword search, impossible. To solve this problem, we
present a multi-keyword ranked search scheme over encrypted cloud data
supporting dynamic operations efficiently. Our scheme utilizes the vector space
model combined with TFX IDF rule and cosine similarity measure to achieve a
multi-keyword ranked search. However, traditional solutions have to suffer high
computational costs. In order to achieve the sub-linear search time, our scheme
introduces Bloom filter to build a search index tree. What is more, our scheme can
support dynamic operation properly and effectively on the account of the property
of the Bloom filter, which means that the updating cost of our scheme is lower than
other schemes. We present our basic scheme first, which is secure under the known
ciphertext model. Then, the enhanced scheme is presented later to guarantee
security even under the known background model. The experiments on the real-
world data set show that the performances of our proposed schemes are
satisfactory.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1 GB
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7.
 Coding Language : JAVA.
 Tool : Netbeans 7.2.1
 Database : MYSQL
REFERENCE:
CHENG GUO 1,2, RUHAN ZHUANG 1,2, CHIN-CHEN CHANG 3, AND
QIONGQIONG YUAN, “Dynamic Multi-Keyword Ranked Search Based on
Bloom Filter Over Encrypted Cloud Data”, IEEE Access, 2019.

More Related Content

What's hot

MongoDB and the Internet of Things
MongoDB and the Internet of ThingsMongoDB and the Internet of Things
MongoDB and the Internet of Things
MongoDB
 

What's hot (20)

Cyber Attacks Spatial Analysis
Cyber Attacks Spatial AnalysisCyber Attacks Spatial Analysis
Cyber Attacks Spatial Analysis
 
Log Monitoring and Anomaly Detection at Scale at ORNL
Log Monitoring and Anomaly Detection at Scale at ORNLLog Monitoring and Anomaly Detection at Scale at ORNL
Log Monitoring and Anomaly Detection at Scale at ORNL
 
Elastic Stack Roadmap
Elastic Stack RoadmapElastic Stack Roadmap
Elastic Stack Roadmap
 
Big data in action
Big data in actionBig data in action
Big data in action
 
Consent , crypto and information infrastructure systems
Consent , crypto and information infrastructure systemsConsent , crypto and information infrastructure systems
Consent , crypto and information infrastructure systems
 
Augmenting Mongo DB with treasure data
Augmenting Mongo DB with treasure dataAugmenting Mongo DB with treasure data
Augmenting Mongo DB with treasure data
 
Au cœur de la roadmap de la Suite Elastic
Au cœur de la roadmap de la Suite ElasticAu cœur de la roadmap de la Suite Elastic
Au cœur de la roadmap de la Suite Elastic
 
Design Computation - Call 04/2012 - Digital Realities
Design Computation - Call 04/2012 - Digital RealitiesDesign Computation - Call 04/2012 - Digital Realities
Design Computation - Call 04/2012 - Digital Realities
 
MongoDB on Azure
MongoDB on AzureMongoDB on Azure
MongoDB on Azure
 
Elk - An introduction
Elk - An introductionElk - An introduction
Elk - An introduction
 
Google Cloud Spanner Preview
Google Cloud Spanner PreviewGoogle Cloud Spanner Preview
Google Cloud Spanner Preview
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
 
Anthill inside-2017-talk-proposal
Anthill inside-2017-talk-proposalAnthill inside-2017-talk-proposal
Anthill inside-2017-talk-proposal
 
MongoDB and the Internet of Things
MongoDB and the Internet of ThingsMongoDB and the Internet of Things
MongoDB and the Internet of Things
 
MongoDB World 2016: Get MEAN and Lean with MongoDB and Kubernetes
MongoDB World 2016: Get MEAN and Lean with MongoDB and KubernetesMongoDB World 2016: Get MEAN and Lean with MongoDB and Kubernetes
MongoDB World 2016: Get MEAN and Lean with MongoDB and Kubernetes
 
Journey to Containerized Application / Google Container Engine
Journey to Containerized Application / Google Container EngineJourney to Containerized Application / Google Container Engine
Journey to Containerized Application / Google Container Engine
 
Análisis del roadmap del Elastic Stack
Análisis del roadmap del Elastic StackAnálisis del roadmap del Elastic Stack
Análisis del roadmap del Elastic Stack
 
Google's Infrastructure and Specific IoT Services
Google's Infrastructure and Specific IoT ServicesGoogle's Infrastructure and Specific IoT Services
Google's Infrastructure and Specific IoT Services
 
IoT at Google Scale
IoT at Google ScaleIoT at Google Scale
IoT at Google Scale
 
Big data
Big dataBig data
Big data
 

Similar to Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data

Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 

Similar to Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data (20)

Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
 
privacy-preserving multi-keyword ranked search
privacy-preserving multi-keyword ranked searchprivacy-preserving multi-keyword ranked search
privacy-preserving multi-keyword ranked search
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
A secure and dynamic multi keyword ranked
A secure and dynamic multi keyword rankedA secure and dynamic multi keyword ranked
A secure and dynamic multi keyword ranked
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Tees an efficient search scheme over
Tees an efficient search scheme overTees an efficient search scheme over
Tees an efficient search scheme over
 
privacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud dataprivacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud data
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Enabling fine grained multi-keyword search
Enabling fine grained multi-keyword searchEnabling fine grained multi-keyword search
Enabling fine grained multi-keyword search
 
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
 
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
trusted db a trusted hardware-based database with privacy and data confidenti...
trusted db a trusted hardware-based database with privacy and data confidenti...trusted db a trusted hardware-based database with privacy and data confidenti...
trusted db a trusted hardware-based database with privacy and data confidenti...
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
 
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
 
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
 

More from JAYAPRAKASH JPINFOTECH

Java Web Application Project Titles 2023-2024.pdf
Java Web Application Project Titles 2023-2024.pdfJava Web Application Project Titles 2023-2024.pdf
Java Web Application Project Titles 2023-2024.pdf
JAYAPRAKASH JPINFOTECH
 
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdfMATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
JAYAPRAKASH JPINFOTECH
 
Python IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdfPython IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdf
JAYAPRAKASH JPINFOTECH
 

More from JAYAPRAKASH JPINFOTECH (20)

Java Web Application Project Titles 2023-2024.pdf
Java Web Application Project Titles 2023-2024.pdfJava Web Application Project Titles 2023-2024.pdf
Java Web Application Project Titles 2023-2024.pdf
 
Dot Net Final Year IEEE Project Titles.pdf
Dot Net Final Year IEEE Project Titles.pdfDot Net Final Year IEEE Project Titles.pdf
Dot Net Final Year IEEE Project Titles.pdf
 
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdfMATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
 
Python IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdfPython IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdf
 
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
Python ieee project titles 2021 -  2022 | Machine Learning Final Year Project...Python ieee project titles 2021 -  2022 | Machine Learning Final Year Project...
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
 
Spammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social NetworksSpammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social Networks
 
Sentiment Classification using N-gram IDF and Automated Machine Learning
Sentiment Classification using N-gram IDF and Automated Machine LearningSentiment Classification using N-gram IDF and Automated Machine Learning
Sentiment Classification using N-gram IDF and Automated Machine Learning
 
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
 
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
FunkR-pDAE: Personalized Project Recommendation Using Deep LearningFunkR-pDAE: Personalized Project Recommendation Using Deep Learning
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
 
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
 
Crop Yield Prediction and Efficient use of Fertilizers
Crop Yield Prediction and Efficient use of FertilizersCrop Yield Prediction and Efficient use of Fertilizers
Crop Yield Prediction and Efficient use of Fertilizers
 
Collaborative Filtering-based Electricity Plan Recommender System
Collaborative Filtering-based Electricity Plan Recommender SystemCollaborative Filtering-based Electricity Plan Recommender System
Collaborative Filtering-based Electricity Plan Recommender System
 
Achieving Data Truthfulness and Privacy Preservation in Data Markets
Achieving Data Truthfulness and Privacy Preservation in Data MarketsAchieving Data Truthfulness and Privacy Preservation in Data Markets
Achieving Data Truthfulness and Privacy Preservation in Data Markets
 
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
 
Towards Fast and Reliable Multi-hop Routing in VANETs
Towards Fast and Reliable Multi-hop Routing in VANETsTowards Fast and Reliable Multi-hop Routing in VANETs
Towards Fast and Reliable Multi-hop Routing in VANETs
 
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
 
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc NetworksRobust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
 
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
 
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Novel Intrusion Detection and Prevention for Mobile Ad Hoc NetworksNovel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
 
Node-Level Trust Evaluation in Wireless Sensor Networks
Node-Level Trust Evaluation in Wireless Sensor NetworksNode-Level Trust Evaluation in Wireless Sensor Networks
Node-Level Trust Evaluation in Wireless Sensor Networks
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data

  • 1. Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data ABSTRACT: Cloud computing has become a popular approach to manage personal data for the economic savings and management flexibility in recent year. However, the sensitive data must be encrypted before outsourcing to cloud servers for the consideration of privacy, which makes some traditional data utilization functions, such as the plaintext keyword search, impossible. To solve this problem, we present a multi-keyword ranked search scheme over encrypted cloud data supporting dynamic operations efficiently. Our scheme utilizes the vector space model combined with TFX IDF rule and cosine similarity measure to achieve a multi-keyword ranked search. However, traditional solutions have to suffer high computational costs. In order to achieve the sub-linear search time, our scheme introduces Bloom filter to build a search index tree. What is more, our scheme can support dynamic operation properly and effectively on the account of the property of the Bloom filter, which means that the updating cost of our scheme is lower than other schemes. We present our basic scheme first, which is secure under the known ciphertext model. Then, the enhanced scheme is presented later to guarantee security even under the known background model. The experiments on the real- world data set show that the performances of our proposed schemes are satisfactory. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:
  • 2.  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED  Input Devices : Keyboard, Mouse  Ram : 1 GB SOFTWARE REQUIREMENTS:  Operating system : Windows 7.  Coding Language : JAVA.  Tool : Netbeans 7.2.1  Database : MYSQL REFERENCE: CHENG GUO 1,2, RUHAN ZHUANG 1,2, CHIN-CHEN CHANG 3, AND QIONGQIONG YUAN, “Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data”, IEEE Access, 2019.