SlideShare a Scribd company logo
1 of 27
FAST PHRASE SEARCH FOR
ENCRYPTED CLOUD STORAGE
Submitted to
P.V.Ramesh. Mca, M.Tech Submitted by
G. Teja llnd M.sc(cs)
CONTENTS
Abstract
1.Introduction
2. Problem Definition
2.1 Existing system
2.2 Proposed system
3. Feasibility Study
4. System Analysis
4.1 Use case diagram
4.2 Activity diagram
4.3 Sequence diagram
4.4 Collaboration diagram
5. System Design
5.1 Class Diagram
5.2 Data tables
6. System Implementation
7. System Testing
8. Conclusion
Screen shots
Abstract
 Cloud computing has generated much interest in the research community in
recent years for its many advantages, but has also raise security and privacy
concerns. The storage and access of confidential documents have been
identified as one of the central problems in the area.
 In particular, many researchers investigated solutions to search over
encrypted documents stored on remote cloud servers. While many schemes
have been proposed to perform conjunctive keyword search, less attention
has been noted on more specialized searching techniques
1.Introduction
 As organizations and individuals adopt cloud technologies, many
have become aware of the serious concerns regarding security and
privacy of accessing personal and confidential information over the
Internet.
In particular, the recent and continuing data breaches highlight
the need for more secure cloud storage systems. While it is generally
agreed that encryption is necessary, cloud providers often perform
the encryption and maintain the private keys instead of the data
owners. That is, the cloud can read any data it desired, providing no
privacy to its users. The storage of private keys and encrypted data
by the cloud provider is also problematic in case of data breach.
Hence, researchers have actively been exploring solutions for secure
storage on private and public clouds where private keys remain in
the hands of data owners.
2.2 Proposed system:
According to our experiment, it also achieves a lower storage cost than
all existing solution the solution addresses the high computational cost noted
in by reformulating phrase search as n-gram verification rather than a
location search or a sequential chain verification. Our approach is also the
first to effectively allow phrase search to run independently without first
performing a conjunctive keyword search to identify candidate documents
.
 Multiple keyword search can also performed
 Performance has been increased with the reasonable cost.
Advantages:
2.Problem definition
2.1 Existing system
 Many of the early works focused on single keyword searches.
Recently, researchers have proposed solutions on conjunctive
keyword search, which involves multiple keywords .Other
interesting problems, such as the ranking of search results and
searching with keywords that might contain errors termed fuzzy
keyword search, have also been considered. The ability to search for
phrases was also recently investigated .Some have examined the
security of the proposed solutions and, where flaws were found,
solutions were proposed.
Disadvantages:
 Single keyword searches are only possible
 Data access and retrieve ability is not efficient.
2.3 Modules
There are three modules
 Data Owner
 Cloud Consumer
 Cloud Server
Data Owner:
 In this module first register with valid details after completing registration login
with email and password then home page will appear. Now click on upload and fill
the details and upload a file.
 Cloud Consumer:
In this module first register with valid details after completing registration, login
with email and password then consumer homepage will appear. If we want to get
data from the cloud then search the file with some keyword. Then automatically
request will be sent to owner.
Cloud Server:
 In this module first login with valid details. In this we can view how many
users are registered and how many owners are registered, users requests for data
and view files uploaded by owner.
3.Feasibility Study
Three key considerations involved in the feasibility analysis are
• ECONOMICAL FEASIBILITY
• TECHNICAL FEASIBILITY
• SOCIAL FEASIBILITY
3.1ECONOMICAL FEASIBILITY
• This study is carried out to check the economic impact that the system will have on
the organization. The amount of fund that the company can pour into the research
and development of the system is limited. The expenditures must be justified.
• 3.2TECHNICAL FEASIBILITY
• This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on
the available technical resources. This will lead to high demands on the available
technical resources
• 3.3SOCIAL FEASIBILITY
• The aspect of study is to check the level of acceptance of the system by the user.
This includes the process of training the user to use the system efficiently. The user
must not feel threatened by the system, instead must accept it as a necessity
4.System Analysis
UML DIAGRAMS
 UML stands for Unified Modeling Language. UML is a standardized
general-purpose modeling language in the field of object-oriented software
engineering. The standard is managed, and was created by, the Object
Management Group.
The following are the some of the UML diagrams:
 Use case diagram
 Activity diagram
 Sequence diagram
 Collaboration diagram
4.1 Use case diagram
• A use case diagram in the Unified Modeling Language (UML) is a type of
behavioral diagram defined by and created from a Use-case analysis. Its purpose is
to present a graphical overview of the functionality provided by a system in terms
of actors, their goals
Fig 4.1 Use case diagram for user
user
Register
Login
Searching for Data
View Response from Owner
Encrypt the data and upload
Send Req for data download
owner
Upload File
View Files
Response for Users Req
View File Req from User
Fig4.1.1 Use case diagram for owner
serv er
Login'
View Users
View Files'
View Users req & Sending Files
Fig4.1.2 Use case diagram for server
4.2 Activity diagram
• Activity diagrams are graphical representations of workflows of stepwise activities
and actions with support for choice, iteration and concurrency. An activity diagram
shows overall flow of control.
Owner User
Server
Register
login
Upload Files
View Files
Response for Users Req
View Files Req From Users
Searching the Data
View Resonse from the Owner
Encrypt the Data
Send Req for File Download
View Users
View Owners
View Files
View Req from Users and Sending Files
Logout
Fig4.2 Activity diagram for owner user and server
4.3 Sequence diagram
A sequence diagram in Unified Modeling Language (UML) is a kind of interaction diagram that
shows how processes operate with one another and in what order. It is a construct of a
Message Sequence Chart.
User Owner Serv
er System
Register
Rgister
Login
View Users
View Owners
Loign
Upload Files
Login
Search Data and Send req to Owner
processing
Accept Req and Send response
Encrypt the Data & Send Files Req
Send Files to Cloud
Send Req for File Download
Accept and generate Key
Download File
Fig 4.3 Sequence diagram for owner, user and system
4.4 Collaboration diagram
In collaboration diagram the method call sequence is indicated by some
numbering technique as shown below. The number indicates how the
methods are called one after another. We have taken the same order
management system to describe the collaboration diagram
User
Owner
Server
System
1: Register
2: Rgister
3: Login
4: View Users
5: View Owners
6: Loign
7: Upload Files
8: Login
9: Search Data and Send req to Owner
10: processing 11: Accept Req and Send response
12: Encrypt the Data & Send Files Req
13: Send Files to Cloud
14: Send Req for File Download
15: Accept and generate Key
16: Download File
Fig 4.4 collaboration diagram for owner ,server, and system
5.System Design
5.1 CLASS DIAGRAM:
• In software engineering, a class diagram in the Unified Modeling Language (UML)
is a type of static structure diagram that describes the structure of a system by
showing the system's classes, their attributes, operations (or methods), and the
relationships among the classes
Owner
+Email
+Password
+Register()
+Login()
+Upload file()
+View Files()
+Response for users Req()
+View File Req fromUser()
User
+Email
+Password
+Register()
+Login()
+Searching the Data()
+View Resonse fromthe owner()
+Encrypt the data()
+Send Req for File download()
Server
+Email
+Password
+Login()
+View Users()
+View Owners()
+View Files()
+View Req Fromuser and sending files()
Fig 4.1 Class diagram for owner, user and server
5.2 Data set Tables
• AUK
CRegister
CREQ
Files
KREQ
OREQ
6. System implementation
H/W System Configuration:-
 Processor - I3/Intel Processor
 RAM - 4GB (min)
 Hard Disk - 160GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
S/W System Configuration:-
 Application Server : Tomcat 7.0
 Front End : HTML, JSP
 Scripts : JavaScript.
 Server side Script : Java Server Pages.
 Database : My SQL 6.0
 Database Connectivity : JDBC
7. System Testing
 The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub assemblies, assemblies and/or a finished product.
7.1 .1TYPES OF TESTING:
Unit testing:
 Unit testing involves the design of test cases that validate that the internal program logic
is functioning properly, and that program inputs produce valid outputs. All decision
branches and internal code flow should be validated. It is the testing of individual
software units of the application .
7.1.2 Integration testing:
 Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the
basic outcome of screens or fields.
7.1.3 FUNCTIONAL TESTING|:
 Functional tests provide systematic demonstrations that functions tested are available
as specified by the business and technical requirements, system documentation, and
user manuals.
8.Conclusion
 In this paper, we presented a phrase search scheme basedon Bloom filter
that is significantly faster than existingapproaches, requiring only a single
round of communicationand Bloom filter verifications. The solution
addresses thehigh computational cost noted by reformulatingphrase search
as n-gram verification rather than a locationsearch or a sequential chain
verification. Our schemes consider only the existence of a phrase,omitting
any information of its location. Our schemes do not require sequential
verification, is parallelizableand has a practical storage requirement. Our
approachis also the first to effectively allow phrase search to run
independentlywithout first performing a conjunctive keywordsearch to
identify candidate documents. The technique ofconstructing a Bloom filter
index introduced enables fast verification of Bloom filters in the same
manneras indexing. According to our experiment, it also achievesa lower
storage cost than all existing solutions,where a higher computational cost
was exchanged in favorof lower storage.
Screen shots
Owner Registration
Owner Registration form
Owner login
Owner login form
Uploading the file:
Owner viewing the files
User registration
User login page:
Searching the data
Owner responding to the user key request
User viewing the response for his/her key request
Encrypting the keyword
Cloud server login
View users
View Owners

More Related Content

Similar to FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx

Paper id 28201425
Paper id 28201425Paper id 28201425
Paper id 28201425IJRAT
 
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...Nikhil Jain
 
Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueSecure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueEswar Publications
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and designRobinsonObura
 
Online eaxmination
Online eaxminationOnline eaxmination
Online eaxminationAditi_17
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...ASAITHAMBIRAJAA
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search SchemesIRJET Journal
 
Authorized Duplicate Check Scheme
Authorized Duplicate Check SchemeAuthorized Duplicate Check Scheme
Authorized Duplicate Check SchemeIRJET Journal
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...IRJET Journal
 
Cyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .netCyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .netGeorgekutty Francis
 
Research Article
Research ArticleResearch Article
Research Articlesparwaiz
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentationNitesh Kumar
 
enhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudenhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudINFOGAIN PUBLICATION
 
IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for CloudIRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for CloudIRJET Journal
 
Query Management system-Ist Review presentation
Query Management system-Ist Review presentationQuery Management system-Ist Review presentation
Query Management system-Ist Review presentationlogeshprabu
 
Ooad lab manual(original)
Ooad lab manual(original)Ooad lab manual(original)
Ooad lab manual(original)dipenpatelpatel
 

Similar to FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx (20)

Paper id 28201425
Paper id 28201425Paper id 28201425
Paper id 28201425
 
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
 
Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueSecure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption Technique
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
Online eaxmination
Online eaxminationOnline eaxmination
Online eaxmination
 
Job portal
Job portalJob portal
Job portal
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
 
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
Documentation
DocumentationDocumentation
Documentation
 
Authorized Duplicate Check Scheme
Authorized Duplicate Check SchemeAuthorized Duplicate Check Scheme
Authorized Duplicate Check Scheme
 
Visual Studio Profiler
Visual Studio ProfilerVisual Studio Profiler
Visual Studio Profiler
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
 
Cyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .netCyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .net
 
Research Article
Research ArticleResearch Article
Research Article
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation
 
enhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudenhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloud
 
IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for CloudIRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
 
Query Management system-Ist Review presentation
Query Management system-Ist Review presentationQuery Management system-Ist Review presentation
Query Management system-Ist Review presentation
 
Ooad lab manual(original)
Ooad lab manual(original)Ooad lab manual(original)
Ooad lab manual(original)
 

Recently uploaded

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 

Recently uploaded (20)

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 

FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx

  • 1. FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE Submitted to P.V.Ramesh. Mca, M.Tech Submitted by G. Teja llnd M.sc(cs)
  • 2. CONTENTS Abstract 1.Introduction 2. Problem Definition 2.1 Existing system 2.2 Proposed system 3. Feasibility Study 4. System Analysis 4.1 Use case diagram 4.2 Activity diagram 4.3 Sequence diagram 4.4 Collaboration diagram 5. System Design 5.1 Class Diagram 5.2 Data tables 6. System Implementation 7. System Testing 8. Conclusion Screen shots
  • 3. Abstract  Cloud computing has generated much interest in the research community in recent years for its many advantages, but has also raise security and privacy concerns. The storage and access of confidential documents have been identified as one of the central problems in the area.  In particular, many researchers investigated solutions to search over encrypted documents stored on remote cloud servers. While many schemes have been proposed to perform conjunctive keyword search, less attention has been noted on more specialized searching techniques
  • 4. 1.Introduction  As organizations and individuals adopt cloud technologies, many have become aware of the serious concerns regarding security and privacy of accessing personal and confidential information over the Internet. In particular, the recent and continuing data breaches highlight the need for more secure cloud storage systems. While it is generally agreed that encryption is necessary, cloud providers often perform the encryption and maintain the private keys instead of the data owners. That is, the cloud can read any data it desired, providing no privacy to its users. The storage of private keys and encrypted data by the cloud provider is also problematic in case of data breach. Hence, researchers have actively been exploring solutions for secure storage on private and public clouds where private keys remain in the hands of data owners.
  • 5. 2.2 Proposed system: According to our experiment, it also achieves a lower storage cost than all existing solution the solution addresses the high computational cost noted in by reformulating phrase search as n-gram verification rather than a location search or a sequential chain verification. Our approach is also the first to effectively allow phrase search to run independently without first performing a conjunctive keyword search to identify candidate documents .  Multiple keyword search can also performed  Performance has been increased with the reasonable cost. Advantages:
  • 6. 2.Problem definition 2.1 Existing system  Many of the early works focused on single keyword searches. Recently, researchers have proposed solutions on conjunctive keyword search, which involves multiple keywords .Other interesting problems, such as the ranking of search results and searching with keywords that might contain errors termed fuzzy keyword search, have also been considered. The ability to search for phrases was also recently investigated .Some have examined the security of the proposed solutions and, where flaws were found, solutions were proposed. Disadvantages:  Single keyword searches are only possible  Data access and retrieve ability is not efficient.
  • 7. 2.3 Modules There are three modules  Data Owner  Cloud Consumer  Cloud Server Data Owner:  In this module first register with valid details after completing registration login with email and password then home page will appear. Now click on upload and fill the details and upload a file.  Cloud Consumer: In this module first register with valid details after completing registration, login with email and password then consumer homepage will appear. If we want to get data from the cloud then search the file with some keyword. Then automatically request will be sent to owner. Cloud Server:  In this module first login with valid details. In this we can view how many users are registered and how many owners are registered, users requests for data and view files uploaded by owner.
  • 8. 3.Feasibility Study Three key considerations involved in the feasibility analysis are • ECONOMICAL FEASIBILITY • TECHNICAL FEASIBILITY • SOCIAL FEASIBILITY 3.1ECONOMICAL FEASIBILITY • This study is carried out to check the economic impact that the system will have on the organization. The amount of fund that the company can pour into the research and development of the system is limited. The expenditures must be justified. • 3.2TECHNICAL FEASIBILITY • This study is carried out to check the technical feasibility, that is, the technical requirements of the system. Any system developed must not have a high demand on the available technical resources. This will lead to high demands on the available technical resources • 3.3SOCIAL FEASIBILITY • The aspect of study is to check the level of acceptance of the system by the user. This includes the process of training the user to use the system efficiently. The user must not feel threatened by the system, instead must accept it as a necessity
  • 9. 4.System Analysis UML DIAGRAMS  UML stands for Unified Modeling Language. UML is a standardized general-purpose modeling language in the field of object-oriented software engineering. The standard is managed, and was created by, the Object Management Group. The following are the some of the UML diagrams:  Use case diagram  Activity diagram  Sequence diagram  Collaboration diagram
  • 10. 4.1 Use case diagram • A use case diagram in the Unified Modeling Language (UML) is a type of behavioral diagram defined by and created from a Use-case analysis. Its purpose is to present a graphical overview of the functionality provided by a system in terms of actors, their goals Fig 4.1 Use case diagram for user user Register Login Searching for Data View Response from Owner Encrypt the data and upload Send Req for data download
  • 11. owner Upload File View Files Response for Users Req View File Req from User Fig4.1.1 Use case diagram for owner serv er Login' View Users View Files' View Users req & Sending Files Fig4.1.2 Use case diagram for server
  • 12. 4.2 Activity diagram • Activity diagrams are graphical representations of workflows of stepwise activities and actions with support for choice, iteration and concurrency. An activity diagram shows overall flow of control. Owner User Server Register login Upload Files View Files Response for Users Req View Files Req From Users Searching the Data View Resonse from the Owner Encrypt the Data Send Req for File Download View Users View Owners View Files View Req from Users and Sending Files Logout Fig4.2 Activity diagram for owner user and server
  • 13. 4.3 Sequence diagram A sequence diagram in Unified Modeling Language (UML) is a kind of interaction diagram that shows how processes operate with one another and in what order. It is a construct of a Message Sequence Chart. User Owner Serv er System Register Rgister Login View Users View Owners Loign Upload Files Login Search Data and Send req to Owner processing Accept Req and Send response Encrypt the Data & Send Files Req Send Files to Cloud Send Req for File Download Accept and generate Key Download File Fig 4.3 Sequence diagram for owner, user and system
  • 14. 4.4 Collaboration diagram In collaboration diagram the method call sequence is indicated by some numbering technique as shown below. The number indicates how the methods are called one after another. We have taken the same order management system to describe the collaboration diagram User Owner Server System 1: Register 2: Rgister 3: Login 4: View Users 5: View Owners 6: Loign 7: Upload Files 8: Login 9: Search Data and Send req to Owner 10: processing 11: Accept Req and Send response 12: Encrypt the Data & Send Files Req 13: Send Files to Cloud 14: Send Req for File Download 15: Accept and generate Key 16: Download File Fig 4.4 collaboration diagram for owner ,server, and system
  • 15. 5.System Design 5.1 CLASS DIAGRAM: • In software engineering, a class diagram in the Unified Modeling Language (UML) is a type of static structure diagram that describes the structure of a system by showing the system's classes, their attributes, operations (or methods), and the relationships among the classes Owner +Email +Password +Register() +Login() +Upload file() +View Files() +Response for users Req() +View File Req fromUser() User +Email +Password +Register() +Login() +Searching the Data() +View Resonse fromthe owner() +Encrypt the data() +Send Req for File download() Server +Email +Password +Login() +View Users() +View Owners() +View Files() +View Req Fromuser and sending files() Fig 4.1 Class diagram for owner, user and server
  • 16. 5.2 Data set Tables • AUK CRegister CREQ
  • 18. 6. System implementation H/W System Configuration:-  Processor - I3/Intel Processor  RAM - 4GB (min)  Hard Disk - 160GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA S/W System Configuration:-  Application Server : Tomcat 7.0  Front End : HTML, JSP  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : My SQL 6.0  Database Connectivity : JDBC
  • 19. 7. System Testing  The purpose of testing is to discover errors. Testing is the process of trying to discover every conceivable fault or weakness in a work product. It provides a way to check the functionality of components, sub assemblies, assemblies and/or a finished product. 7.1 .1TYPES OF TESTING: Unit testing:  Unit testing involves the design of test cases that validate that the internal program logic is functioning properly, and that program inputs produce valid outputs. All decision branches and internal code flow should be validated. It is the testing of individual software units of the application . 7.1.2 Integration testing:  Integration tests are designed to test integrated software components to determine if they actually run as one program. Testing is event driven and is more concerned with the basic outcome of screens or fields. 7.1.3 FUNCTIONAL TESTING|:  Functional tests provide systematic demonstrations that functions tested are available as specified by the business and technical requirements, system documentation, and user manuals.
  • 20. 8.Conclusion  In this paper, we presented a phrase search scheme basedon Bloom filter that is significantly faster than existingapproaches, requiring only a single round of communicationand Bloom filter verifications. The solution addresses thehigh computational cost noted by reformulatingphrase search as n-gram verification rather than a locationsearch or a sequential chain verification. Our schemes consider only the existence of a phrase,omitting any information of its location. Our schemes do not require sequential verification, is parallelizableand has a practical storage requirement. Our approachis also the first to effectively allow phrase search to run independentlywithout first performing a conjunctive keywordsearch to identify candidate documents. The technique ofconstructing a Bloom filter index introduced enables fast verification of Bloom filters in the same manneras indexing. According to our experiment, it also achievesa lower storage cost than all existing solutions,where a higher computational cost was exchanged in favorof lower storage.
  • 22. Owner login Owner login form Uploading the file:
  • 23. Owner viewing the files User registration
  • 25. Owner responding to the user key request User viewing the response for his/her key request