This document summarizes a student project on implementing a lightweight fine-grained search system over encrypted data in fog computing. The proposed system aims to address limitations of existing cloud-based systems like lower bandwidth and security issues. It utilizes fog computing to distribute encrypted data across multiple fog nodes for lower latency. The system design extends cipher text-policy attribute-based encryption and searchable encryption technologies to allow fine-grained access control and keyword searches on encrypted data distributed across fog nodes. The framework is designed to support lightweight computation, conjunctive keyword searches, and dynamic attribute updates.
Lightweight Fine-Grained Search over Encrypted Data in Fog Computing
1.
2. ABSTRACT SEMINAR
Light Weight Fine-Grained Search over
Encrypted Data in Fog Computing
INTERNAL GUIDE: Mr.P.Jagadesh
Asst.Professor CSE
DEPARTMENT OF COMPUTER
SCIENCE
By:
SaiKiran(17507)
ChandraVamsi(16582)
Raviteja(17501)
3. Content :
Introduction
Existing system
Limitation of Existing system
Proposed System Advantages
Framework Design Phases
System Architecture
System requriments
Conclusion
4. Introduction
Fog computing as an extension of cloud
computing,but closer to the things that works
with IoT data
Fog computing acts as a intermediate
between the cloud and end devices which
brings processing storage and networking
services closer to the end devices
I don’t need a hard disk in my computer if I can
get to the server faster… carrying around these
non-connected computers
5. Existing system
Cloud computing is the on demand computing
services over the internet on pay as go basis.
Cloud computing is emerging technology that use the
central remote server to maintain data and
applications
6. Everything is powered by data, and data is managed via cloud
storages. However, with the increasing demand and usage of
cloud, the game is going beyond its capacity, requiring an
improved approach.
8. PROPOSED SYSTEM
FOG COMPUTING
Fog computing, as an extension of cloud
computing, outsources the encrypted
sensitive data to multiple fog nodes on the
edge of Internet of Things (IoT) to
decrease latency and network congestion
existing cipher text retrieval schemes
rarely focus on the fog computing
environment and most of them still
impose high computational and storage
9. •Fog computing was introduced to meet
three primary goals-
1. To improve efficiency and trim the
amount of data that requires to be
transmitted for processing, analysis and
storage.
2.Place the data close to the end user.
3.Provide security and compliance to the
data transmission over cloud.
10. we are presenting a Lightweight Fine-
Grained cipher texts Search (LFGS)
system in fog computing by
extending Cipher text-Policy
Attribute-Based Encryption (CP-ABE)
and Searchable Encryption (SE)
technologies, which can achieve fine-
grained access control and keyword
search simultaneously
11. To decrease latency and network congestion, it is
an extension of cloud computing services to
network edge has been a relatively recent
research topic.
To mitigate the data privacy leakage risks, data
encryption is an efficient mechanism to protect
data confidentiality Identity-Based Encryption
(IBE) and Attribute-Based Encryption (ABE) can
protect data security by providing coarse-grained
and fine-grained access control mechanisms.
12. SEARCHABLE ENCRYPTION
Searchable Encryption (SE) technology which enables data
users to securely search and selectively retrieve records of
interest over encrypted data according to user-specified
keywords, has been extensively explored
CIPHER TEXT-POLICY ATTRIBUTE BASED
Keyword Search (CP-ABKS) has gained much
attention in both industrial and academic fields
13. FRAME WORK DESIGN
Fine-grained keyword search
LFGS system gains one-to-many rather than one-to-
one encryption and specifies flexible access control over
shared data.
Lightweight computation on end users.
With the help of fog nodes, LFGS system reliefs the
large computational burden from data owners or end
users
14. Conjunctive keyword search.
system allows end users to issue multiple keywords
in a single search query so that it can improve the user
search experience as the conjunctive keyword
Attribute update.
supports attribute update and just needs to update
the keys and cipher texts associated with the updated
attributes
16. SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
System : Intel Dual Core.
Hard Disk : 120 GB.
Ram : 1GB.
SOFTWARE REQUIREMENTS:
Operating system : Windows 7.
Coding Language : JAVA/J2EE
Tool : Net beans 8.1
Database : MYSQL
17. CONCLUSION
Basic LFGS system could greatly reduce the computational
and storage burden of EUs by outsourcing partial computation
and storage to the honest-but-curious FNs without leaking
sensitive information