SlideShare a Scribd company logo
1 of 17
SSPM’s
SOMESHWAR ENGINEERING COLLEGE
SOMESHWARNAGAR
Department of Computer Engineering
Seminar On
“Privacy-preserving Multi-keyword Fuzzy Search Over Encrypted Data In The
Cloud”
Guide Name: Presented By,
Prof. Shinde V.D. Miss-Limbarkar Archana
Roll no:-22
17/03/16
1
CONTENTS
Introduction
Problem definition
Existing System
Literature Survey
Disadvantages of Existing System
Architecture
Methodology
Mathematical Model
Advantages/Features
Conclusion
References
17/03/16
2
INTRODUCTION
Cloud Computing
 Scalable
 Elastic Storage
 Computation Resources
Outsourcing Data Services.
17/03/16
3
PROBLEM DEFINITION
 High privacy
Keyword collection
Search and a trapdoor
17/03/16
4
EXISTING SYSTEM
 Cloud computing
 Ranking to meet the effective data retrieval need.
 Searchable encryption
Cloud computing contains more private and sensitive information’s such as emails,
government documents, personnel records
MRSE technique
17/03/16
5
LITERATURE SURVEY
17/03/16
6
DISADVANTAGES OF EXISTING SYSTEM
 Secure ranked search over encrypted data problem.
Efficient encrypted data search mechanism.
Privacy problem.
Time delay.
17/03/16
7
ARCHITECTURE
17/03/16
8
Fig-System Architecture of Search over Encrypted data on cloud computing
METHODOLOGY
1.KeyGen(m)-Key Generation
2.Index Enc(SK; I)-Index Encryption
3.Query Enc(SK;Q)-Query Encryption
4.BuildIndex(D; SK; l)-Index Building
5.Trapdoor(Q; SK)-Trapdoor Generation
6.Search(EncSK(Q);EncSK(ID))-Searching
17/03/16
9
MATHEMATICAL MODEL
Let us consider S as a set of inputs.
S= { }
INPUT:
Identify the inputs as keyword transformation
information
F= {f1, f2, f3 ....., fn| ‘F’ as set of functions to execute the process}
I= {i1, i2, i3…|’I’ sets of inputs to the function set}
O= {o1, o2, o3….|’O’ Set of outputs from the function sets}
S= {I, F, O}
I = {keyword transformation information}
O = {Index,Query}
F = {Build index,trapdoor generation}
17/03/16
10
ADVANTAGES
Multi-Keyword Fuzzy Search
Privacy Guarantee
Result Accuracy
No Predefined Dictionary
Security
Performance
17/03/16
11
FEATURES
Efficiency
Enhanced Scheme
F-measure
Security Analysis of Enhanced Scheme
Performance Analysis
17/03/16
12
CONCLUSION
In this seminar, we tackled the challenging multi-keyword fuzzy search problem over the
encrypted data.
We proposed and integrated several innovative designs to solve the multiple keywords
search and the fuzzy search problems simultaneously with high efficiency.
17/03/16
13
REFERENCES
1. D. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted
data,” S&P 2000, vol. 8, pp. 44–55, 2000.
2.W. Sun, B. Wang, N. Cao, M. Li, W. Lou, T. Hou, and H. Li, “Privacypreserving multi-
keyword text search in the cloud supporting similaritybased ranking,” in ASIACCS
2013, May 2013.
1.D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with
keyword search,” EUROCRYPTO 2004, pp. 506–522,2004.
2. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword
ranked search over encrypted cloud data,” INFOCOM 2011, pp. 829–837, 2011
17/03/16
14
CONTINUES….
1.Y. Hwang and P. Lee, “Public key encryption with conjunctive keyword search and
its extension to a multi-user system,” Pairing 2007, pp. 2–22,2007.
2. D. Boneh and B. Waters, “Conjunctive, subset, and range queries on encrypted
data,” Theory of Cryptography, vol. 4392, pp. 535–554, 2007.
3.P. Golle, J. Staddon, and B. Waters, “Secure conjunctive keyword search over
encrypted data,” ACNS 2004, vol. 3089, pp. 31–45, 2004.
4.C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over
encrypted cloud data,” ICDCS 2010, pp. 253–262, 2010.
17/03/16
15
QUESTIONS???
17/03/16
16
THANK YOU…!!!
17/03/16
17

More Related Content

What's hot

PhD Research Topics in IoT Research Ideas
PhD Research Topics in IoT Research IdeasPhD Research Topics in IoT Research Ideas
PhD Research Topics in IoT Research IdeasPhD Services
 
PhD Projects in Learning Technologies Research Guidance
PhD Projects in Learning Technologies Research GuidancePhD Projects in Learning Technologies Research Guidance
PhD Projects in Learning Technologies Research GuidancePhD Services
 
Guidelines For PhD Research Projects
Guidelines For PhD Research ProjectsGuidelines For PhD Research Projects
Guidelines For PhD Research ProjectsPhD Services
 

What's hot (7)

Kadai1
Kadai1Kadai1
Kadai1
 
Week13
Week13Week13
Week13
 
PhD Research Topics in IoT Research Ideas
PhD Research Topics in IoT Research IdeasPhD Research Topics in IoT Research Ideas
PhD Research Topics in IoT Research Ideas
 
PhD Projects in Learning Technologies Research Guidance
PhD Projects in Learning Technologies Research GuidancePhD Projects in Learning Technologies Research Guidance
PhD Projects in Learning Technologies Research Guidance
 
Guidelines For PhD Research Projects
Guidelines For PhD Research ProjectsGuidelines For PhD Research Projects
Guidelines For PhD Research Projects
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week12 b
Week12 bWeek12 b
Week12 b
 

Viewers also liked

2008年全年开奖结果
2008年全年开奖结果2008年全年开奖结果
2008年全年开奖结果xuoo1985
 
Ветряная оспа
Ветряная оспаВетряная оспа
Ветряная оспаnialse2507
 
ANÁLISIS DE UNA IMAGEN
ANÁLISIS DE UNA IMAGENANÁLISIS DE UNA IMAGEN
ANÁLISIS DE UNA IMAGENjawad97
 
Folosirea corecta a bastoanelor ortopedice de mers
Folosirea corecta a bastoanelor ortopedice de mersFolosirea corecta a bastoanelor ortopedice de mers
Folosirea corecta a bastoanelor ortopedice de mersSisteme Ortopedice
 
Paisajes de Masueco II
Paisajes de Masueco IIPaisajes de Masueco II
Paisajes de Masueco IIOscar Herrera
 
Music Magazine Market Research and Analysis of Covers, Contents, DPS
Music Magazine Market Research and Analysis of Covers, Contents, DPSMusic Magazine Market Research and Analysis of Covers, Contents, DPS
Music Magazine Market Research and Analysis of Covers, Contents, DPSDan Topham
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...eSAT Journals
 
Environmental sustainability in Sabah (Justine Sentian)
Environmental sustainability in Sabah (Justine Sentian)Environmental sustainability in Sabah (Justine Sentian)
Environmental sustainability in Sabah (Justine Sentian)ESD UNU-IAS
 
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the CloudPrivacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the CloudMateus S. H. Cruz
 
20 avions-du-futur
20 avions-du-futur20 avions-du-futur
20 avions-du-futurBalcon60
 
Nouveaux indicateurs de richesse
Nouveaux indicateurs de richesse Nouveaux indicateurs de richesse
Nouveaux indicateurs de richesse Gouvernement
 

Viewers also liked (16)

Acogida familias 2016
Acogida familias 2016Acogida familias 2016
Acogida familias 2016
 
2008年全年开奖结果
2008年全年开奖结果2008年全年开奖结果
2008年全年开奖结果
 
Ветряная оспа
Ветряная оспаВетряная оспа
Ветряная оспа
 
Simsimilli
SimsimilliSimsimilli
Simsimilli
 
ANÁLISIS DE UNA IMAGEN
ANÁLISIS DE UNA IMAGENANÁLISIS DE UNA IMAGEN
ANÁLISIS DE UNA IMAGEN
 
Folosirea corecta a bastoanelor ortopedice de mers
Folosirea corecta a bastoanelor ortopedice de mersFolosirea corecta a bastoanelor ortopedice de mers
Folosirea corecta a bastoanelor ortopedice de mers
 
Paisajes de Masueco II
Paisajes de Masueco IIPaisajes de Masueco II
Paisajes de Masueco II
 
RHA Presentation
RHA PresentationRHA Presentation
RHA Presentation
 
Music Magazine Market Research and Analysis of Covers, Contents, DPS
Music Magazine Market Research and Analysis of Covers, Contents, DPSMusic Magazine Market Research and Analysis of Covers, Contents, DPS
Music Magazine Market Research and Analysis of Covers, Contents, DPS
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...
 
Power publi
Power publiPower publi
Power publi
 
Environmental sustainability in Sabah (Justine Sentian)
Environmental sustainability in Sabah (Justine Sentian)Environmental sustainability in Sabah (Justine Sentian)
Environmental sustainability in Sabah (Justine Sentian)
 
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the CloudPrivacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
 
Overview of MONOMI
Overview of MONOMIOverview of MONOMI
Overview of MONOMI
 
20 avions-du-futur
20 avions-du-futur20 avions-du-futur
20 avions-du-futur
 
Nouveaux indicateurs de richesse
Nouveaux indicateurs de richesse Nouveaux indicateurs de richesse
Nouveaux indicateurs de richesse
 

Similar to cloud fuzzy search

ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTION...
 ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTION... ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTION...
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTION...Nexgen Technology
 
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked SearchAccurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked SearchDakshineshwar Swain
 
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataIRJET Journal
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...redpel dot com
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Pvrtechnologies Nellore
 
Enabling efficient multi keyword ranked
Enabling efficient multi keyword rankedEnabling efficient multi keyword ranked
Enabling efficient multi keyword rankedSakthi Sundaram
 
Secure Syntactic key Ranked Search over Encrypted Cloud in Data
Secure Syntactic key Ranked Search over Encrypted Cloud in DataSecure Syntactic key Ranked Search over Encrypted Cloud in Data
Secure Syntactic key Ranked Search over Encrypted Cloud in DataIJERA Editor
 
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingFuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingIJERA Editor
 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsIRJET Journal
 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data JAYAPRAKASH JPINFOTECH
 
Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataEfficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataIRJET Journal
 
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...I3E Technologies
 
Secry poster
Secry posterSecry poster
Secry posterALIN BABU
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET Journal
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...AIRCC Publishing Corporation
 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataPrivacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataJAYAPRAKASH JPINFOTECH
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...AIRCC Publishing Corporation
 

Similar to cloud fuzzy search (20)

ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTION...
 ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTION... ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTION...
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTION...
 
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked SearchAccurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
 
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted Data
 
IJET-V2I6P33
IJET-V2I6P33IJET-V2I6P33
IJET-V2I6P33
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
Enabling efficient multi keyword ranked
Enabling efficient multi keyword rankedEnabling efficient multi keyword ranked
Enabling efficient multi keyword ranked
 
Secure Syntactic key Ranked Search over Encrypted Cloud in Data
Secure Syntactic key Ranked Search over Encrypted Cloud in DataSecure Syntactic key Ranked Search over Encrypted Cloud in Data
Secure Syntactic key Ranked Search over Encrypted Cloud in Data
 
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingFuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
 
Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataEfficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted Data
 
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
 
Secry poster
Secry posterSecry poster
Secry poster
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...
 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataPrivacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Final 1st
Final 1stFinal 1st
Final 1st
 
New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...
 

Recently uploaded

IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

cloud fuzzy search

  • 1. SSPM’s SOMESHWAR ENGINEERING COLLEGE SOMESHWARNAGAR Department of Computer Engineering Seminar On “Privacy-preserving Multi-keyword Fuzzy Search Over Encrypted Data In The Cloud” Guide Name: Presented By, Prof. Shinde V.D. Miss-Limbarkar Archana Roll no:-22 17/03/16 1
  • 2. CONTENTS Introduction Problem definition Existing System Literature Survey Disadvantages of Existing System Architecture Methodology Mathematical Model Advantages/Features Conclusion References 17/03/16 2
  • 3. INTRODUCTION Cloud Computing  Scalable  Elastic Storage  Computation Resources Outsourcing Data Services. 17/03/16 3
  • 4. PROBLEM DEFINITION  High privacy Keyword collection Search and a trapdoor 17/03/16 4
  • 5. EXISTING SYSTEM  Cloud computing  Ranking to meet the effective data retrieval need.  Searchable encryption Cloud computing contains more private and sensitive information’s such as emails, government documents, personnel records MRSE technique 17/03/16 5
  • 7. DISADVANTAGES OF EXISTING SYSTEM  Secure ranked search over encrypted data problem. Efficient encrypted data search mechanism. Privacy problem. Time delay. 17/03/16 7
  • 8. ARCHITECTURE 17/03/16 8 Fig-System Architecture of Search over Encrypted data on cloud computing
  • 9. METHODOLOGY 1.KeyGen(m)-Key Generation 2.Index Enc(SK; I)-Index Encryption 3.Query Enc(SK;Q)-Query Encryption 4.BuildIndex(D; SK; l)-Index Building 5.Trapdoor(Q; SK)-Trapdoor Generation 6.Search(EncSK(Q);EncSK(ID))-Searching 17/03/16 9
  • 10. MATHEMATICAL MODEL Let us consider S as a set of inputs. S= { } INPUT: Identify the inputs as keyword transformation information F= {f1, f2, f3 ....., fn| ‘F’ as set of functions to execute the process} I= {i1, i2, i3…|’I’ sets of inputs to the function set} O= {o1, o2, o3….|’O’ Set of outputs from the function sets} S= {I, F, O} I = {keyword transformation information} O = {Index,Query} F = {Build index,trapdoor generation} 17/03/16 10
  • 11. ADVANTAGES Multi-Keyword Fuzzy Search Privacy Guarantee Result Accuracy No Predefined Dictionary Security Performance 17/03/16 11
  • 12. FEATURES Efficiency Enhanced Scheme F-measure Security Analysis of Enhanced Scheme Performance Analysis 17/03/16 12
  • 13. CONCLUSION In this seminar, we tackled the challenging multi-keyword fuzzy search problem over the encrypted data. We proposed and integrated several innovative designs to solve the multiple keywords search and the fuzzy search problems simultaneously with high efficiency. 17/03/16 13
  • 14. REFERENCES 1. D. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” S&P 2000, vol. 8, pp. 44–55, 2000. 2.W. Sun, B. Wang, N. Cao, M. Li, W. Lou, T. Hou, and H. Li, “Privacypreserving multi- keyword text search in the cloud supporting similaritybased ranking,” in ASIACCS 2013, May 2013. 1.D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” EUROCRYPTO 2004, pp. 506–522,2004. 2. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” INFOCOM 2011, pp. 829–837, 2011 17/03/16 14
  • 15. CONTINUES…. 1.Y. Hwang and P. Lee, “Public key encryption with conjunctive keyword search and its extension to a multi-user system,” Pairing 2007, pp. 2–22,2007. 2. D. Boneh and B. Waters, “Conjunctive, subset, and range queries on encrypted data,” Theory of Cryptography, vol. 4392, pp. 535–554, 2007. 3.P. Golle, J. Staddon, and B. Waters, “Secure conjunctive keyword search over encrypted data,” ACNS 2004, vol. 3089, pp. 31–45, 2004. 4.C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over encrypted cloud data,” ICDCS 2010, pp. 253–262, 2010. 17/03/16 15