High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
cloud fuzzy search
1. SSPM’s
SOMESHWAR ENGINEERING COLLEGE
SOMESHWARNAGAR
Department of Computer Engineering
Seminar On
“Privacy-preserving Multi-keyword Fuzzy Search Over Encrypted Data In The
Cloud”
Guide Name: Presented By,
Prof. Shinde V.D. Miss-Limbarkar Archana
Roll no:-22
17/03/16
1
5. EXISTING SYSTEM
Cloud computing
Ranking to meet the effective data retrieval need.
Searchable encryption
Cloud computing contains more private and sensitive information’s such as emails,
government documents, personnel records
MRSE technique
17/03/16
5
7. DISADVANTAGES OF EXISTING SYSTEM
Secure ranked search over encrypted data problem.
Efficient encrypted data search mechanism.
Privacy problem.
Time delay.
17/03/16
7
10. MATHEMATICAL MODEL
Let us consider S as a set of inputs.
S= { }
INPUT:
Identify the inputs as keyword transformation
information
F= {f1, f2, f3 ....., fn| ‘F’ as set of functions to execute the process}
I= {i1, i2, i3…|’I’ sets of inputs to the function set}
O= {o1, o2, o3….|’O’ Set of outputs from the function sets}
S= {I, F, O}
I = {keyword transformation information}
O = {Index,Query}
F = {Build index,trapdoor generation}
17/03/16
10
13. CONCLUSION
In this seminar, we tackled the challenging multi-keyword fuzzy search problem over the
encrypted data.
We proposed and integrated several innovative designs to solve the multiple keywords
search and the fuzzy search problems simultaneously with high efficiency.
17/03/16
13
14. REFERENCES
1. D. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted
data,” S&P 2000, vol. 8, pp. 44–55, 2000.
2.W. Sun, B. Wang, N. Cao, M. Li, W. Lou, T. Hou, and H. Li, “Privacypreserving multi-
keyword text search in the cloud supporting similaritybased ranking,” in ASIACCS
2013, May 2013.
1.D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with
keyword search,” EUROCRYPTO 2004, pp. 506–522,2004.
2. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword
ranked search over encrypted cloud data,” INFOCOM 2011, pp. 829–837, 2011
17/03/16
14
15. CONTINUES….
1.Y. Hwang and P. Lee, “Public key encryption with conjunctive keyword search and
its extension to a multi-user system,” Pairing 2007, pp. 2–22,2007.
2. D. Boneh and B. Waters, “Conjunctive, subset, and range queries on encrypted
data,” Theory of Cryptography, vol. 4392, pp. 535–554, 2007.
3.P. Golle, J. Staddon, and B. Waters, “Secure conjunctive keyword search over
encrypted data,” ACNS 2004, vol. 3089, pp. 31–45, 2004.
4.C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over
encrypted cloud data,” ICDCS 2010, pp. 253–262, 2010.
17/03/16
15