SlideShare a Scribd company logo
Dynamic Multi-Keyword Ranked Search Based on Bloom
Filter Over Encrypted Cloud Data
ABSTRACT:
Cloud computing has become a popular approach to manage personal data for the
economic savings and management flexibility in recent year. However, the
sensitive data must be encrypted before outsourcing to cloud servers for the
consideration of privacy, which makes some traditional data utilization functions,
such as the plaintext keyword search, impossible. To solve this problem, we
present a multi-keyword ranked search scheme over encrypted cloud data
supporting dynamic operations efficiently. Our scheme utilizes the vector space
model combined with TFX IDF rule and cosine similarity measure to achieve a
multi-keyword ranked search. However, traditional solutions have to suffer high
computational costs. In order to achieve the sub-linear search time, our scheme
introduces Bloom filter to build a search index tree. What is more, our scheme can
support dynamic operation properly and effectively on the account of the property
of the Bloom filter, which means that the updating cost of our scheme is lower than
other schemes. We present our basic scheme first, which is secure under the known
ciphertext model. Then, the enhanced scheme is presented later to guarantee
security even under the known background model. The experiments on the real-
world data set show that the performances of our proposed schemes are
satisfactory.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1 GB
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7.
 Coding Language : JAVA.
 Tool : Netbeans 7.2.1
 Database : MYSQL
REFERENCE:
CHENG GUO 1,2, RUHAN ZHUANG 1,2, CHIN-CHEN CHANG 3, AND
QIONGQIONG YUAN, “Dynamic Multi-Keyword Ranked Search Based on
Bloom Filter Over Encrypted Cloud Data”, IEEE Access, 2019.

More Related Content

What's hot

Cyber Attacks Spatial Analysis
Cyber Attacks Spatial AnalysisCyber Attacks Spatial Analysis
Cyber Attacks Spatial Analysis
Shwetha Narayanan
 
Log Monitoring and Anomaly Detection at Scale at ORNL
Log Monitoring and Anomaly Detection at Scale at ORNLLog Monitoring and Anomaly Detection at Scale at ORNL
Log Monitoring and Anomaly Detection at Scale at ORNL
Elasticsearch
 
Elastic Stack Roadmap
Elastic Stack RoadmapElastic Stack Roadmap
Elastic Stack Roadmap
Imma Valls Bernaus
 
Big data in action
Big data in actionBig data in action
Big data in action
Tu Pham
 
Consent , crypto and information infrastructure systems
Consent , crypto and information infrastructure systemsConsent , crypto and information infrastructure systems
Consent , crypto and information infrastructure systems
Anand Venkatanarayanan
 
Augmenting Mongo DB with treasure data
Augmenting Mongo DB with treasure dataAugmenting Mongo DB with treasure data
Augmenting Mongo DB with treasure data
Treasure Data, Inc.
 
Au cœur de la roadmap de la Suite Elastic
Au cœur de la roadmap de la Suite ElasticAu cœur de la roadmap de la Suite Elastic
Au cœur de la roadmap de la Suite Elastic
Elasticsearch
 
Design Computation - Call 04/2012 - Digital Realities
Design Computation - Call 04/2012 - Digital RealitiesDesign Computation - Call 04/2012 - Digital Realities
Design Computation - Call 04/2012 - Digital Realities
Tyler Selby
 
MongoDB on Azure
MongoDB on AzureMongoDB on Azure
MongoDB on Azure
Norberto Leite
 
Elk - An introduction
Elk - An introductionElk - An introduction
Elk - An introduction
Hossein Shemshadi
 
Google Cloud Spanner Preview
Google Cloud Spanner PreviewGoogle Cloud Spanner Preview
Google Cloud Spanner Preview
DoiT International
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Shakas Technologies
 
Anthill inside-2017-talk-proposal
Anthill inside-2017-talk-proposalAnthill inside-2017-talk-proposal
Anthill inside-2017-talk-proposal
Akbar Ladak
 
MongoDB and the Internet of Things
MongoDB and the Internet of ThingsMongoDB and the Internet of Things
MongoDB and the Internet of Things
MongoDB
 
MongoDB World 2016: Get MEAN and Lean with MongoDB and Kubernetes
MongoDB World 2016: Get MEAN and Lean with MongoDB and KubernetesMongoDB World 2016: Get MEAN and Lean with MongoDB and Kubernetes
MongoDB World 2016: Get MEAN and Lean with MongoDB and Kubernetes
MongoDB
 
Journey to Containerized Application / Google Container Engine
Journey to Containerized Application / Google Container EngineJourney to Containerized Application / Google Container Engine
Journey to Containerized Application / Google Container Engine
Google Cloud Platform - Japan
 
Análisis del roadmap del Elastic Stack
Análisis del roadmap del Elastic StackAnálisis del roadmap del Elastic Stack
Análisis del roadmap del Elastic Stack
Elasticsearch
 
Google's Infrastructure and Specific IoT Services
Google's Infrastructure and Specific IoT ServicesGoogle's Infrastructure and Specific IoT Services
Google's Infrastructure and Specific IoT Services
Intel® Software
 
IoT at Google Scale
IoT at Google ScaleIoT at Google Scale
IoT at Google Scale
James Chittenden
 
Big data
Big dataBig data
Big data
heena verma
 

What's hot (20)

Cyber Attacks Spatial Analysis
Cyber Attacks Spatial AnalysisCyber Attacks Spatial Analysis
Cyber Attacks Spatial Analysis
 
Log Monitoring and Anomaly Detection at Scale at ORNL
Log Monitoring and Anomaly Detection at Scale at ORNLLog Monitoring and Anomaly Detection at Scale at ORNL
Log Monitoring and Anomaly Detection at Scale at ORNL
 
Elastic Stack Roadmap
Elastic Stack RoadmapElastic Stack Roadmap
Elastic Stack Roadmap
 
Big data in action
Big data in actionBig data in action
Big data in action
 
Consent , crypto and information infrastructure systems
Consent , crypto and information infrastructure systemsConsent , crypto and information infrastructure systems
Consent , crypto and information infrastructure systems
 
Augmenting Mongo DB with treasure data
Augmenting Mongo DB with treasure dataAugmenting Mongo DB with treasure data
Augmenting Mongo DB with treasure data
 
Au cœur de la roadmap de la Suite Elastic
Au cœur de la roadmap de la Suite ElasticAu cœur de la roadmap de la Suite Elastic
Au cœur de la roadmap de la Suite Elastic
 
Design Computation - Call 04/2012 - Digital Realities
Design Computation - Call 04/2012 - Digital RealitiesDesign Computation - Call 04/2012 - Digital Realities
Design Computation - Call 04/2012 - Digital Realities
 
MongoDB on Azure
MongoDB on AzureMongoDB on Azure
MongoDB on Azure
 
Elk - An introduction
Elk - An introductionElk - An introduction
Elk - An introduction
 
Google Cloud Spanner Preview
Google Cloud Spanner PreviewGoogle Cloud Spanner Preview
Google Cloud Spanner Preview
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
 
Anthill inside-2017-talk-proposal
Anthill inside-2017-talk-proposalAnthill inside-2017-talk-proposal
Anthill inside-2017-talk-proposal
 
MongoDB and the Internet of Things
MongoDB and the Internet of ThingsMongoDB and the Internet of Things
MongoDB and the Internet of Things
 
MongoDB World 2016: Get MEAN and Lean with MongoDB and Kubernetes
MongoDB World 2016: Get MEAN and Lean with MongoDB and KubernetesMongoDB World 2016: Get MEAN and Lean with MongoDB and Kubernetes
MongoDB World 2016: Get MEAN and Lean with MongoDB and Kubernetes
 
Journey to Containerized Application / Google Container Engine
Journey to Containerized Application / Google Container EngineJourney to Containerized Application / Google Container Engine
Journey to Containerized Application / Google Container Engine
 
Análisis del roadmap del Elastic Stack
Análisis del roadmap del Elastic StackAnálisis del roadmap del Elastic Stack
Análisis del roadmap del Elastic Stack
 
Google's Infrastructure and Specific IoT Services
Google's Infrastructure and Specific IoT ServicesGoogle's Infrastructure and Specific IoT Services
Google's Infrastructure and Specific IoT Services
 
IoT at Google Scale
IoT at Google ScaleIoT at Google Scale
IoT at Google Scale
 
Big data
Big dataBig data
Big data
 

Similar to Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data

Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET Journal
 
privacy-preserving multi-keyword ranked search
privacy-preserving multi-keyword ranked searchprivacy-preserving multi-keyword ranked search
privacy-preserving multi-keyword ranked search
swathi78
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Shakas Technologies
 
A secure and dynamic multi keyword ranked
A secure and dynamic multi keyword rankedA secure and dynamic multi keyword ranked
A secure and dynamic multi keyword ranked
jpstudcorner
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
 
Tees an efficient search scheme over
Tees an efficient search scheme overTees an efficient search scheme over
Tees an efficient search scheme over
Kumar Dlk
 
privacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud dataprivacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud data
swathi78
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Papitha Velumani
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
Enabling fine grained multi-keyword search
Enabling fine grained multi-keyword searchEnabling fine grained multi-keyword search
Enabling fine grained multi-keyword search
jpstudcorner
 
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
IEEEMEMTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
IEEEMEMTECHSTUDENTSPROJECTS
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Papitha Velumani
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Papitha Velumani
 
trusted db a trusted hardware-based database with privacy and data confidenti...
trusted db a trusted hardware-based database with privacy and data confidenti...trusted db a trusted hardware-based database with privacy and data confidenti...
trusted db a trusted hardware-based database with privacy and data confidenti...
swathi78
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET Journal
 
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
chennaijp
 
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
JPINFOTECH JAYAPRAKASH
 

Similar to Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data (20)

Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
 
privacy-preserving multi-keyword ranked search
privacy-preserving multi-keyword ranked searchprivacy-preserving multi-keyword ranked search
privacy-preserving multi-keyword ranked search
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
A secure and dynamic multi keyword ranked
A secure and dynamic multi keyword rankedA secure and dynamic multi keyword ranked
A secure and dynamic multi keyword ranked
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Tees an efficient search scheme over
Tees an efficient search scheme overTees an efficient search scheme over
Tees an efficient search scheme over
 
privacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud dataprivacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud data
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Enabling fine grained multi-keyword search
Enabling fine grained multi-keyword searchEnabling fine grained multi-keyword search
Enabling fine grained multi-keyword search
 
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
 
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
trusted db a trusted hardware-based database with privacy and data confidenti...
trusted db a trusted hardware-based database with privacy and data confidenti...trusted db a trusted hardware-based database with privacy and data confidenti...
trusted db a trusted hardware-based database with privacy and data confidenti...
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
 
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
 
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
 

More from JAYAPRAKASH JPINFOTECH

Java Web Application Project Titles 2023-2024.pdf
Java Web Application Project Titles 2023-2024.pdfJava Web Application Project Titles 2023-2024.pdf
Java Web Application Project Titles 2023-2024.pdf
JAYAPRAKASH JPINFOTECH
 
Dot Net Final Year IEEE Project Titles.pdf
Dot Net Final Year IEEE Project Titles.pdfDot Net Final Year IEEE Project Titles.pdf
Dot Net Final Year IEEE Project Titles.pdf
JAYAPRAKASH JPINFOTECH
 
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdfMATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
JAYAPRAKASH JPINFOTECH
 
Python IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdfPython IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdf
JAYAPRAKASH JPINFOTECH
 
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
Python ieee project titles 2021 -  2022 | Machine Learning Final Year Project...Python ieee project titles 2021 -  2022 | Machine Learning Final Year Project...
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
JAYAPRAKASH JPINFOTECH
 
Spammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social NetworksSpammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social Networks
JAYAPRAKASH JPINFOTECH
 
Sentiment Classification using N-gram IDF and Automated Machine Learning
Sentiment Classification using N-gram IDF and Automated Machine LearningSentiment Classification using N-gram IDF and Automated Machine Learning
Sentiment Classification using N-gram IDF and Automated Machine Learning
JAYAPRAKASH JPINFOTECH
 
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
JAYAPRAKASH JPINFOTECH
 
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
FunkR-pDAE: Personalized Project Recommendation Using Deep LearningFunkR-pDAE: Personalized Project Recommendation Using Deep Learning
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
JAYAPRAKASH JPINFOTECH
 
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
JAYAPRAKASH JPINFOTECH
 
Crop Yield Prediction and Efficient use of Fertilizers
Crop Yield Prediction and Efficient use of FertilizersCrop Yield Prediction and Efficient use of Fertilizers
Crop Yield Prediction and Efficient use of Fertilizers
JAYAPRAKASH JPINFOTECH
 
Collaborative Filtering-based Electricity Plan Recommender System
Collaborative Filtering-based Electricity Plan Recommender SystemCollaborative Filtering-based Electricity Plan Recommender System
Collaborative Filtering-based Electricity Plan Recommender System
JAYAPRAKASH JPINFOTECH
 
Achieving Data Truthfulness and Privacy Preservation in Data Markets
Achieving Data Truthfulness and Privacy Preservation in Data MarketsAchieving Data Truthfulness and Privacy Preservation in Data Markets
Achieving Data Truthfulness and Privacy Preservation in Data Markets
JAYAPRAKASH JPINFOTECH
 
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
JAYAPRAKASH JPINFOTECH
 
Towards Fast and Reliable Multi-hop Routing in VANETs
Towards Fast and Reliable Multi-hop Routing in VANETsTowards Fast and Reliable Multi-hop Routing in VANETs
Towards Fast and Reliable Multi-hop Routing in VANETs
JAYAPRAKASH JPINFOTECH
 
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
JAYAPRAKASH JPINFOTECH
 
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc NetworksRobust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
JAYAPRAKASH JPINFOTECH
 
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
JAYAPRAKASH JPINFOTECH
 
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Novel Intrusion Detection and Prevention for Mobile Ad Hoc NetworksNovel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
JAYAPRAKASH JPINFOTECH
 
Node-Level Trust Evaluation in Wireless Sensor Networks
Node-Level Trust Evaluation in Wireless Sensor NetworksNode-Level Trust Evaluation in Wireless Sensor Networks
Node-Level Trust Evaluation in Wireless Sensor Networks
JAYAPRAKASH JPINFOTECH
 

More from JAYAPRAKASH JPINFOTECH (20)

Java Web Application Project Titles 2023-2024.pdf
Java Web Application Project Titles 2023-2024.pdfJava Web Application Project Titles 2023-2024.pdf
Java Web Application Project Titles 2023-2024.pdf
 
Dot Net Final Year IEEE Project Titles.pdf
Dot Net Final Year IEEE Project Titles.pdfDot Net Final Year IEEE Project Titles.pdf
Dot Net Final Year IEEE Project Titles.pdf
 
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdfMATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
 
Python IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdfPython IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdf
 
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
Python ieee project titles 2021 -  2022 | Machine Learning Final Year Project...Python ieee project titles 2021 -  2022 | Machine Learning Final Year Project...
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
 
Spammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social NetworksSpammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social Networks
 
Sentiment Classification using N-gram IDF and Automated Machine Learning
Sentiment Classification using N-gram IDF and Automated Machine LearningSentiment Classification using N-gram IDF and Automated Machine Learning
Sentiment Classification using N-gram IDF and Automated Machine Learning
 
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
 
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
FunkR-pDAE: Personalized Project Recommendation Using Deep LearningFunkR-pDAE: Personalized Project Recommendation Using Deep Learning
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
 
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
 
Crop Yield Prediction and Efficient use of Fertilizers
Crop Yield Prediction and Efficient use of FertilizersCrop Yield Prediction and Efficient use of Fertilizers
Crop Yield Prediction and Efficient use of Fertilizers
 
Collaborative Filtering-based Electricity Plan Recommender System
Collaborative Filtering-based Electricity Plan Recommender SystemCollaborative Filtering-based Electricity Plan Recommender System
Collaborative Filtering-based Electricity Plan Recommender System
 
Achieving Data Truthfulness and Privacy Preservation in Data Markets
Achieving Data Truthfulness and Privacy Preservation in Data MarketsAchieving Data Truthfulness and Privacy Preservation in Data Markets
Achieving Data Truthfulness and Privacy Preservation in Data Markets
 
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
 
Towards Fast and Reliable Multi-hop Routing in VANETs
Towards Fast and Reliable Multi-hop Routing in VANETsTowards Fast and Reliable Multi-hop Routing in VANETs
Towards Fast and Reliable Multi-hop Routing in VANETs
 
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
 
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc NetworksRobust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
 
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
 
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Novel Intrusion Detection and Prevention for Mobile Ad Hoc NetworksNovel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
 
Node-Level Trust Evaluation in Wireless Sensor Networks
Node-Level Trust Evaluation in Wireless Sensor NetworksNode-Level Trust Evaluation in Wireless Sensor Networks
Node-Level Trust Evaluation in Wireless Sensor Networks
 

Recently uploaded

How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 

Recently uploaded (20)

How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 

Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data

  • 1. Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data ABSTRACT: Cloud computing has become a popular approach to manage personal data for the economic savings and management flexibility in recent year. However, the sensitive data must be encrypted before outsourcing to cloud servers for the consideration of privacy, which makes some traditional data utilization functions, such as the plaintext keyword search, impossible. To solve this problem, we present a multi-keyword ranked search scheme over encrypted cloud data supporting dynamic operations efficiently. Our scheme utilizes the vector space model combined with TFX IDF rule and cosine similarity measure to achieve a multi-keyword ranked search. However, traditional solutions have to suffer high computational costs. In order to achieve the sub-linear search time, our scheme introduces Bloom filter to build a search index tree. What is more, our scheme can support dynamic operation properly and effectively on the account of the property of the Bloom filter, which means that the updating cost of our scheme is lower than other schemes. We present our basic scheme first, which is secure under the known ciphertext model. Then, the enhanced scheme is presented later to guarantee security even under the known background model. The experiments on the real- world data set show that the performances of our proposed schemes are satisfactory. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:
  • 2.  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED  Input Devices : Keyboard, Mouse  Ram : 1 GB SOFTWARE REQUIREMENTS:  Operating system : Windows 7.  Coding Language : JAVA.  Tool : Netbeans 7.2.1  Database : MYSQL REFERENCE: CHENG GUO 1,2, RUHAN ZHUANG 1,2, CHIN-CHEN CHANG 3, AND QIONGQIONG YUAN, “Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data”, IEEE Access, 2019.