SlideShare a Scribd company logo
1 of 3
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com 
Analysis of Field Data on Web Security Vulnerabilities Private 
Searching on Streaming Data Based on Keyword Frequency 
ABSTRACT: 
Private searching on streaming data is a process to dispatch to a public server a program, which 
searches streaming sources of data without revealing searching criteria and then sends back a 
buffer containing the findings. From an Abelian group homomorphic encryption, the searching 
criteria can be constructed by only simple combinations of keywords, for example, disjunction of 
keywords. The recent breakthrough in fully homomorphic encryption has allowed us to construct 
arbitrary searching criteria theoretically. In this paper, we consider a new private query, which 
searches for documents from streaming data on the basis of keyword frequency, such that the 
frequency of a keyword is required to be higher or lower than a given threshold. This form of 
query can help us in finding more relevant documents. Based on the state of the art fully 
homomorphic encryption techniques, we give disjunctive, conjunctive, and complement 
constructions for private threshold queries based on keyword frequency. Combining the basic 
constructions, we further present a generic construction for arbitrary private threshold queries 
based on keyword frequency. Our protocols are semantically secure as long as the underlying 
fully homomorphic encryption scheme is semantically secure. 
EXISTING SYSTEM: 
Ostrovsky and Skeith gave two solutions for private searching on streaming data. One is based 
on the Paillier cryptosystem and allows to search for documents satisfying a disjunctive 
condition i.e., containing one or more classified keywords. Another is based on the Boneh 
cryptosystem and can search for documents satisfying an AND of two sets of keywords. 
Bethencourt also gave a solution to search for documents satisfying a condition. Like the idea of, 
an encrypted dictionary is used. However, rather than using one large buffer and attempting to 
avoid collisions like, Bethencourt stored the matching documents in three buffers and retrieved 
them by solving linear systems. Yi proposed a solution to search for documents containing more
than t out of n keywords, so-called (t; n) threshold searching, without increasing the dictionary 
size. The solution is built on the state of the art fully homomorphic encryption (FHE) technique 
and the buffer keeps at most m matching documents without collisions. Searching for documents 
containing one or more classified keywords like can be achieved by (1; n) threshold searching. 
DISADVANTAGES OF EXISTING SYSTEM: 
 It have not considered keyword frequency, the number of times that keyword is used in a 
document 
PROPOSED SYSTEM: 
In this paper, we consider a new private query, which searches for documents from streaming 
data based on keyword frequency, such that a number of times that a keyword appears matching 
document is required to be higher or lower than a given threshold. For example, find documents 
containing keywords k1; k2; . . . ; kn such that the frequency of the keyword kiði ¼ 1; 2; . . . ; nÞ 
in the document is higher (or lower) than ti. We take the lower case into account because terms 
that appear too frequently are often not very useful as they may not allow one to retrieve a small 
subset of documents from the streaming data. 
ADVANTAGES OF PROPOSED SYSTEM: 
 It encrypts the frequency threshold for each keyword because different keywords may 
have different frequency thresholds. 
 A new type of private threshold query based on keyword frequency, which can help us in 
finding more relevant documents from streaming data. 
SYSTEM CONFIGURATION:- 
HARDWARE REQUIREMENTS:- 
Processor – Pentium –IV 
Speed – 1.1 Ghz 
RAM – 512 MB(min) 
Hard Disk – 40 GB 
Key Board – Standard Windows Keyboard 
Mouse – Two or Three Button Mouse 
Monitor – LCD/LED 
SOFTWARE REQUIREMENTS:
Operating system : Windows XP. 
Coding Language : JAVA 
Data Base : MySQL 
Tool : Netbeans.

More Related Content

More from IEEEFINALYEARSTUDENTPROJECTS

More from IEEEFINALYEARSTUDENTPROJECTS (20)

IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS A novel time obfuscated algorithm ...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS  A novel time obfuscated algorithm ...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS  A novel time obfuscated algorithm ...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS A novel time obfuscated algorithm ...
 
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
 
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easyIEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
 
IEEE 2014 JAVA DATA MINING PROJECTS Web image re ranking using query-specific...
IEEE 2014 JAVA DATA MINING PROJECTS Web image re ranking using query-specific...IEEE 2014 JAVA DATA MINING PROJECTS Web image re ranking using query-specific...
IEEE 2014 JAVA DATA MINING PROJECTS Web image re ranking using query-specific...
 
IEEE 2014 JAVA DATA MINING PROJECTS Towards multi tenant performance sl os
IEEE 2014 JAVA DATA MINING PROJECTS Towards multi tenant performance sl osIEEE 2014 JAVA DATA MINING PROJECTS Towards multi tenant performance sl os
IEEE 2014 JAVA DATA MINING PROJECTS Towards multi tenant performance sl os
 

Recently uploaded

Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Lovely Professional University
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
Madan Karki
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
BalamuruganV28
 

Recently uploaded (20)

Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
BURGER ORDERING SYSYTEM PROJECT REPORT..pdf
BURGER ORDERING SYSYTEM PROJECT REPORT..pdfBURGER ORDERING SYSYTEM PROJECT REPORT..pdf
BURGER ORDERING SYSYTEM PROJECT REPORT..pdf
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdf
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
Circuit Breaker arc phenomenon.pdf engineering
Circuit Breaker arc phenomenon.pdf engineeringCircuit Breaker arc phenomenon.pdf engineering
Circuit Breaker arc phenomenon.pdf engineering
 
EMPLOYEE MANAGEMENT SYSTEM FINAL presentation
EMPLOYEE MANAGEMENT SYSTEM FINAL presentationEMPLOYEE MANAGEMENT SYSTEM FINAL presentation
EMPLOYEE MANAGEMENT SYSTEM FINAL presentation
 
Lesson no16 application of Induction Generator in Wind.ppsx
Lesson no16 application of Induction Generator in Wind.ppsxLesson no16 application of Induction Generator in Wind.ppsx
Lesson no16 application of Induction Generator in Wind.ppsx
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
 
Introduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of ArduinoIntroduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of Arduino
 
Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docx
 
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Artificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian ReasoningArtificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian Reasoning
 
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 

IEEE 2014 JAVA NETWORK SECURITY PROJECTS Analysis of field data on web security vulnerabilities private searching on streaming data based on keyword frequency

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com Analysis of Field Data on Web Security Vulnerabilities Private Searching on Streaming Data Based on Keyword Frequency ABSTRACT: Private searching on streaming data is a process to dispatch to a public server a program, which searches streaming sources of data without revealing searching criteria and then sends back a buffer containing the findings. From an Abelian group homomorphic encryption, the searching criteria can be constructed by only simple combinations of keywords, for example, disjunction of keywords. The recent breakthrough in fully homomorphic encryption has allowed us to construct arbitrary searching criteria theoretically. In this paper, we consider a new private query, which searches for documents from streaming data on the basis of keyword frequency, such that the frequency of a keyword is required to be higher or lower than a given threshold. This form of query can help us in finding more relevant documents. Based on the state of the art fully homomorphic encryption techniques, we give disjunctive, conjunctive, and complement constructions for private threshold queries based on keyword frequency. Combining the basic constructions, we further present a generic construction for arbitrary private threshold queries based on keyword frequency. Our protocols are semantically secure as long as the underlying fully homomorphic encryption scheme is semantically secure. EXISTING SYSTEM: Ostrovsky and Skeith gave two solutions for private searching on streaming data. One is based on the Paillier cryptosystem and allows to search for documents satisfying a disjunctive condition i.e., containing one or more classified keywords. Another is based on the Boneh cryptosystem and can search for documents satisfying an AND of two sets of keywords. Bethencourt also gave a solution to search for documents satisfying a condition. Like the idea of, an encrypted dictionary is used. However, rather than using one large buffer and attempting to avoid collisions like, Bethencourt stored the matching documents in three buffers and retrieved them by solving linear systems. Yi proposed a solution to search for documents containing more
  • 2. than t out of n keywords, so-called (t; n) threshold searching, without increasing the dictionary size. The solution is built on the state of the art fully homomorphic encryption (FHE) technique and the buffer keeps at most m matching documents without collisions. Searching for documents containing one or more classified keywords like can be achieved by (1; n) threshold searching. DISADVANTAGES OF EXISTING SYSTEM:  It have not considered keyword frequency, the number of times that keyword is used in a document PROPOSED SYSTEM: In this paper, we consider a new private query, which searches for documents from streaming data based on keyword frequency, such that a number of times that a keyword appears matching document is required to be higher or lower than a given threshold. For example, find documents containing keywords k1; k2; . . . ; kn such that the frequency of the keyword kiði ¼ 1; 2; . . . ; nÞ in the document is higher (or lower) than ti. We take the lower case into account because terms that appear too frequently are often not very useful as they may not allow one to retrieve a small subset of documents from the streaming data. ADVANTAGES OF PROPOSED SYSTEM:  It encrypts the frequency threshold for each keyword because different keywords may have different frequency thresholds.  A new type of private threshold query based on keyword frequency, which can help us in finding more relevant documents from streaming data. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:- Processor – Pentium –IV Speed – 1.1 Ghz RAM – 512 MB(min) Hard Disk – 40 GB Key Board – Standard Windows Keyboard Mouse – Two or Three Button Mouse Monitor – LCD/LED SOFTWARE REQUIREMENTS:
  • 3. Operating system : Windows XP. Coding Language : JAVA Data Base : MySQL Tool : Netbeans.