Vous êtes sur la page 1sur 4

Enabling Secure and Efcient Ranked

Keyword
ABSTRACT
Cloud computing economically enables the
paradigm of data service outsourcing. However, to protect
data privacy, sensitive
cloud data has to be encrypted before outsourced to the
commercial public cloud, which makes efective data
utilization service a very
challenging task. Although traditional searchable encryption
techniques allow users to securely search over encrypted
data through
keywords, they support only oolean search and are not yet
su!cient to meet the efective data utilization need that is
inherently
demanded by large number of users and huge amount of
data "les in cloud. #n this paper, we de"ne and solve the
problem of
secure ranked keyword search over encrypted cloud data.
$anked search greatly enhances system usability by
enabling search result
relevance ranking instead of sending undiferentiated
results, and further ensures the "le retrieval accuracy.
%peci"cally, we e&plore
the statistical measure approach, i.e. relevance score, from
information retrieval to build a secure searchable inde&, and
develop a one'to'many order'preserving mapping technique
to properly protect those sensitive score information. (he
resulting design is able
to facilitate e!cient server'side ranking without losing
keyword privacy. (horough analysis shows that our proposed
solution en)oys
*as'strong'as'possible+ security guarantee compared to
previous searchable encryption schemes, while correctly
realizing the goal of
ranked keyword search. ,&tensive e&perimental results
demonstrate the e!ciency of the proposed solution.
Interaction Model
1.Client-driven interventions
Client-driven interventions are the means to protect
customers from unreliable services. For example, services that
miss deadlines or do not respond at all for a longer time are
replaced by other more reliable services in future discovery
operations.
2.Provider-driven interventions
Provider-driven interventions are desired and initiated by the
service owners to shield themselves from malicious clients. For
instance, requests of clients performing a denial of service attack
by sending multiple requests in relatively short intervals are
blocked (instead of processed) by the service.
MODULES
1.Encrypt Module
2.Client Module
3.Multi-keyword Module
4.Admin Module
Encrypt Module:
This module is used to help the server to encrypt the document
using RSA Algorithm and to convert the encrypted document to the Zip
fle with activation code and then activation code send to the user for
download.
Client Module:
This module is used to help the client to search the fle using the
multiple key words concept and get the accurate result list based on the
user query. The user is going to select the required fle and register the
user details and get activation code in mail from the
customerservice404 email before enter the activation code. After user
can download the Zip fle and extract that fle.
Multi-keyword Module:
This module is used to help the user to get the accurate result
based on the multiple keyword concepts. The users can enter the
multiple words query, the server is going to split that query into a single
word after search that word fle in our database. Finally, display the
matched word list from the database and the user gets the fle from that
list.
Admin Module:
This module is used to help the server to view details and upload
fles with the security. Admin uses the log key to the login time. Before
the admin logout, change the log key. The admin can change the
password after the login and view the user downloading details and the
counting of fle request details on fowchart. The admin can upload the
fle after the conversion of the Zip fle format.
SYSTEM SPECIFICATION
Hardware Requirements:
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floy Dri!e : ".44 #$.
#onitor : "4% &olour #onitor.
#ouse : 'ti(al #ouse.
)am : *"2 #$.
+ey$oard : "0" +ey$oard.
Sotware Requirements:
'eratin, system : -indo.s /P.
&odin, 0an,ua,e : 1SP.2et .it3 &4
Data Base : S50 Ser!er 200*.