Influencing policy (training slides from Fast Track Impact)
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
1. FAST PHRASE SEARCH FOR
ENCRYPTED CLOUD STORAGE
Submitted to
P.V.Ramesh. Mca, M.Tech Submitted by
G. Teja llnd M.sc(cs)
2. CONTENTS
Abstract
1.Introduction
2. Problem Definition
2.1 Existing system
2.2 Proposed system
3. Feasibility Study
4. System Analysis
4.1 Use case diagram
4.2 Activity diagram
4.3 Sequence diagram
4.4 Collaboration diagram
5. System Design
5.1 Class Diagram
5.2 Data tables
6. System Implementation
7. System Testing
8. Conclusion
Screen shots
3. Abstract
Cloud computing has generated much interest in the research community in
recent years for its many advantages, but has also raise security and privacy
concerns. The storage and access of confidential documents have been
identified as one of the central problems in the area.
In particular, many researchers investigated solutions to search over
encrypted documents stored on remote cloud servers. While many schemes
have been proposed to perform conjunctive keyword search, less attention
has been noted on more specialized searching techniques
4. 1.Introduction
As organizations and individuals adopt cloud technologies, many
have become aware of the serious concerns regarding security and
privacy of accessing personal and confidential information over the
Internet.
In particular, the recent and continuing data breaches highlight
the need for more secure cloud storage systems. While it is generally
agreed that encryption is necessary, cloud providers often perform
the encryption and maintain the private keys instead of the data
owners. That is, the cloud can read any data it desired, providing no
privacy to its users. The storage of private keys and encrypted data
by the cloud provider is also problematic in case of data breach.
Hence, researchers have actively been exploring solutions for secure
storage on private and public clouds where private keys remain in
the hands of data owners.
5. 2.2 Proposed system:
According to our experiment, it also achieves a lower storage cost than
all existing solution the solution addresses the high computational cost noted
in by reformulating phrase search as n-gram verification rather than a
location search or a sequential chain verification. Our approach is also the
first to effectively allow phrase search to run independently without first
performing a conjunctive keyword search to identify candidate documents
.
Multiple keyword search can also performed
Performance has been increased with the reasonable cost.
Advantages:
6. 2.Problem definition
2.1 Existing system
Many of the early works focused on single keyword searches.
Recently, researchers have proposed solutions on conjunctive
keyword search, which involves multiple keywords .Other
interesting problems, such as the ranking of search results and
searching with keywords that might contain errors termed fuzzy
keyword search, have also been considered. The ability to search for
phrases was also recently investigated .Some have examined the
security of the proposed solutions and, where flaws were found,
solutions were proposed.
Disadvantages:
Single keyword searches are only possible
Data access and retrieve ability is not efficient.
7. 2.3 Modules
There are three modules
Data Owner
Cloud Consumer
Cloud Server
Data Owner:
In this module first register with valid details after completing registration login
with email and password then home page will appear. Now click on upload and fill
the details and upload a file.
Cloud Consumer:
In this module first register with valid details after completing registration, login
with email and password then consumer homepage will appear. If we want to get
data from the cloud then search the file with some keyword. Then automatically
request will be sent to owner.
Cloud Server:
In this module first login with valid details. In this we can view how many
users are registered and how many owners are registered, users requests for data
and view files uploaded by owner.
8. 3.Feasibility Study
Three key considerations involved in the feasibility analysis are
• ECONOMICAL FEASIBILITY
• TECHNICAL FEASIBILITY
• SOCIAL FEASIBILITY
3.1ECONOMICAL FEASIBILITY
• This study is carried out to check the economic impact that the system will have on
the organization. The amount of fund that the company can pour into the research
and development of the system is limited. The expenditures must be justified.
• 3.2TECHNICAL FEASIBILITY
• This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on
the available technical resources. This will lead to high demands on the available
technical resources
• 3.3SOCIAL FEASIBILITY
• The aspect of study is to check the level of acceptance of the system by the user.
This includes the process of training the user to use the system efficiently. The user
must not feel threatened by the system, instead must accept it as a necessity
9. 4.System Analysis
UML DIAGRAMS
UML stands for Unified Modeling Language. UML is a standardized
general-purpose modeling language in the field of object-oriented software
engineering. The standard is managed, and was created by, the Object
Management Group.
The following are the some of the UML diagrams:
Use case diagram
Activity diagram
Sequence diagram
Collaboration diagram
10. 4.1 Use case diagram
• A use case diagram in the Unified Modeling Language (UML) is a type of
behavioral diagram defined by and created from a Use-case analysis. Its purpose is
to present a graphical overview of the functionality provided by a system in terms
of actors, their goals
Fig 4.1 Use case diagram for user
user
Register
Login
Searching for Data
View Response from Owner
Encrypt the data and upload
Send Req for data download
11. owner
Upload File
View Files
Response for Users Req
View File Req from User
Fig4.1.1 Use case diagram for owner
serv er
Login'
View Users
View Files'
View Users req & Sending Files
Fig4.1.2 Use case diagram for server
12. 4.2 Activity diagram
• Activity diagrams are graphical representations of workflows of stepwise activities
and actions with support for choice, iteration and concurrency. An activity diagram
shows overall flow of control.
Owner User
Server
Register
login
Upload Files
View Files
Response for Users Req
View Files Req From Users
Searching the Data
View Resonse from the Owner
Encrypt the Data
Send Req for File Download
View Users
View Owners
View Files
View Req from Users and Sending Files
Logout
Fig4.2 Activity diagram for owner user and server
13. 4.3 Sequence diagram
A sequence diagram in Unified Modeling Language (UML) is a kind of interaction diagram that
shows how processes operate with one another and in what order. It is a construct of a
Message Sequence Chart.
User Owner Serv
er System
Register
Rgister
Login
View Users
View Owners
Loign
Upload Files
Login
Search Data and Send req to Owner
processing
Accept Req and Send response
Encrypt the Data & Send Files Req
Send Files to Cloud
Send Req for File Download
Accept and generate Key
Download File
Fig 4.3 Sequence diagram for owner, user and system
14. 4.4 Collaboration diagram
In collaboration diagram the method call sequence is indicated by some
numbering technique as shown below. The number indicates how the
methods are called one after another. We have taken the same order
management system to describe the collaboration diagram
User
Owner
Server
System
1: Register
2: Rgister
3: Login
4: View Users
5: View Owners
6: Loign
7: Upload Files
8: Login
9: Search Data and Send req to Owner
10: processing 11: Accept Req and Send response
12: Encrypt the Data & Send Files Req
13: Send Files to Cloud
14: Send Req for File Download
15: Accept and generate Key
16: Download File
Fig 4.4 collaboration diagram for owner ,server, and system
15. 5.System Design
5.1 CLASS DIAGRAM:
• In software engineering, a class diagram in the Unified Modeling Language (UML)
is a type of static structure diagram that describes the structure of a system by
showing the system's classes, their attributes, operations (or methods), and the
relationships among the classes
Owner
+Email
+Password
+Register()
+Login()
+Upload file()
+View Files()
+Response for users Req()
+View File Req fromUser()
User
+Email
+Password
+Register()
+Login()
+Searching the Data()
+View Resonse fromthe owner()
+Encrypt the data()
+Send Req for File download()
Server
+Email
+Password
+Login()
+View Users()
+View Owners()
+View Files()
+View Req Fromuser and sending files()
Fig 4.1 Class diagram for owner, user and server
18. 6. System implementation
H/W System Configuration:-
Processor - I3/Intel Processor
RAM - 4GB (min)
Hard Disk - 160GB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
S/W System Configuration:-
Application Server : Tomcat 7.0
Front End : HTML, JSP
Scripts : JavaScript.
Server side Script : Java Server Pages.
Database : My SQL 6.0
Database Connectivity : JDBC
19. 7. System Testing
The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub assemblies, assemblies and/or a finished product.
7.1 .1TYPES OF TESTING:
Unit testing:
Unit testing involves the design of test cases that validate that the internal program logic
is functioning properly, and that program inputs produce valid outputs. All decision
branches and internal code flow should be validated. It is the testing of individual
software units of the application .
7.1.2 Integration testing:
Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the
basic outcome of screens or fields.
7.1.3 FUNCTIONAL TESTING|:
Functional tests provide systematic demonstrations that functions tested are available
as specified by the business and technical requirements, system documentation, and
user manuals.
20. 8.Conclusion
In this paper, we presented a phrase search scheme basedon Bloom filter
that is significantly faster than existingapproaches, requiring only a single
round of communicationand Bloom filter verifications. The solution
addresses thehigh computational cost noted by reformulatingphrase search
as n-gram verification rather than a locationsearch or a sequential chain
verification. Our schemes consider only the existence of a phrase,omitting
any information of its location. Our schemes do not require sequential
verification, is parallelizableand has a practical storage requirement. Our
approachis also the first to effectively allow phrase search to run
independentlywithout first performing a conjunctive keywordsearch to
identify candidate documents. The technique ofconstructing a Bloom filter
index introduced enables fast verification of Bloom filters in the same
manneras indexing. According to our experiment, it also achievesa lower
storage cost than all existing solutions,where a higher computational cost
was exchanged in favorof lower storage.