fuzzy final

Upload: tripathi-vina

Post on 06-Jul-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/18/2019 Fuzzy Final

    1/45

    S.I.E.S College of Arts, Science and Commerce,Sion(W), Mumbai – 400 00.

     

    A PROJECTED REPORT

    ON

    “Fuzzy Keyword Search over Encrypted Data in CloudCoputin!”

    S"#$%TED TO

    "N%&ERS%T' OF $"$#A%

    #'

    &ENNE(A K"$ARARAJA

    $)Sc)*CO$P"TER SC%ENCE+

    ,-./0,-.1

  • 8/18/2019 Fuzzy Final

    2/45

    S.I.E.S College of Arts, Science and Commerce,Sion(W), Mumbai – 400 00.

    CE!"I#ICA"E

     This is to certify that Mr / Miss. __________________________________ 

    Seat-No: _______________ has successfully completed the

    necessary course of experiments in the subject of

     __________________________________________during the academic

    year !"# $ !"% completing &ith the re'uirements of (ni)ersity

    of Mumbai* for the course of MS+ - ,,. +omputer Science.

     ______________ Prof. In-Charge

     ___________________ ____________ Head of the Department    Examiner 

    College Seal

  • 8/18/2019 Fuzzy Final

    3/45

    ACKNOWLEDGEMENT

     No pro2ect i3 ever coplete without the !uidance o4 tho3e e5pert how have already traded thi3 pa3t 6e4ore and hence 6ecoe a3ter o4 it and a3 a re3ult7 our leader) So we would li8e to ta8e

    thi3 opportunity to ta8e all tho3e individual3 how have helped u3 in vi3ualizin! thi3 pro2ect)

    9e e5pre33 out deep !ratitude to our pro2ect !uide $r3) 4or providin! tiely a33i3tant to

    our :uery and !uidance that 3he !ave owin! to her e5perience in thi3 4ield 4or pa3t any year)

    She had indeed 6een a li!hthou3e 4or u3 in thi3 2ourney)

    9e would al3o ta8e thi3 opportunity to than8 our pro2ect co;ordinate $r) 4or hi3 !uidance

    in 3electin! thi3 pro2ect and al3o 4or providin! u3 all thi3 detail3 on proper pre3entation o4 thi3 pro2ect)

    9e e5tend our 3incerity appreciation to all our Pro4e33or 4or CO((E

  • 8/18/2019 Fuzzy Final

    4/45

    ABSTRACT

     Abstract  ?   A3 Cloud Coputin! 6ecoe3 prevalent7 ore and ore

    3en3itive in4oration are 6ein! centralized into the cloud) For the

     protection o4 data privacy7 3en3itive data u3ually have to 6e encrypted

     6e4ore out3ourcin!7 which a8e3 e44ective data utilization a very

    challen!in! ta38) Althou!h traditional 3earcha6le encryption 3chee3

    allow a u3er to 3ecurely 3earch over encrypted data throu!h 8eyword3

    and 3electively retrieve 4ile3 o4 intere3t7 the3e techni:ue3 3upport only

    exact 8eyword 3earch) That i37 there i3 no tolerance o4 inor typo3 and

    4orat incon3i3tencie3 which7 on the other hand7 are typical u3er 

    3earchin! 6ehavior and happen very 4re:uently) Thi3 3i!ni4icant

    draw6ac8 a8e3 e5i3tin! techni:ue3 un3uita6le in Cloud Coputin! a3it !reatly a44ect3 3y3te u3a6ility7 renderin! u3er 3earchin! e5perience3

    very 4ru3tratin! and 3y3te e44icacy very low) %n thi3 paper7 4or the 4ir3t

    tie we 4oralize and 3olve the pro6le o4 e44ective 4uzzy 8eyword

    3earch over encrypted cloud data while aintainin! 8eyword privacy)

    Fuzzy 8eyword 3earch !reatly enhance3 3y3te u3a6ility 6y returnin!

    the atchin! 4ile3 when u3er3@ 3earchin! input3 e5actly atch the

     prede4ined 8eyword3 or the clo3e3t po33i6le atchin! 4ile3 6a3ed on

    8eyword 3iilarity 3eantic37 when exact atch 4ail3) %n our 3olution7

    we e5ploit edit di3tance to :uanti4y 8eyword3 3iilarity and develop an

  • 8/18/2019 Fuzzy Final

    5/45

    advanced techni:ue on con3tructin! 4uzzy 8eyword 3et37 which !reatly

    reduce3 the 3tora!e and repre3entation overhead3) Throu!h ri!orou3

    3ecurity analy3i37 we 3how that our propo3ed 3olution i3 3ecure and

     privacy;pre3ervin!7 while correctly realizin! the !oal o4 4uzzy 8eyword

    3earch)

  • 8/18/2019 Fuzzy Final

    6/45

    INDEX

    SR.NSR.NOO

    TITLE PG.NO

    1)1) INTRODUCTION1

    2)2) LITERATURE SURVEY5

    3)3) PROBLEM DEFINITION8

    4)4) REQUIREMENT ANALYSIS

    11

    5)5) PLANNING AND ESTIMATION13

    6)6) ALGORITHM15

    7)7) IMPLEMENTATION22

    8)8) ADVANTAGES & DISADVANTAGES27

    9)9) FUTURE MODIFICATIONS29

    10)10) APPLICATION31

    11)11) BIBLIOGRAPHY33

    12)12) SCREENSHOTS!

    13)13) SOURCE CODE

  • 8/18/2019 Fuzzy Final

    7/45

    INTRODUCTIONINTRODUCTION

  • 8/18/2019 Fuzzy Final

    8/45

    INTRODUCTION

    A3 Cloud Coputin! 6ecoe3 prevalent7 ore and ore 3en3itive

    in4oration are 6ein! centralized into the cloud7 3uch a3 eail37 per3onal

    health record37 !overnent docuent37 etc) #y 3torin! their data into the

    cloud7 the data owner3 can 6e relieved 4ro the 6urden o4 data 3tora!e

    and aintenance 3o a3 to en2oy the on;deand hi!h :uality data 3tora!e

    3ervice) =owever7 the 4act that data owner3 and cloud 3erver are not in

    the 3ae tru3ted doain ay put the out3ourced data at ri387 a3 the

    cloud 3erver ay no lon!er 6e 4ully tru3ted) %t 4ollow3 that 3en3itive data

    u3ually 3hould 6e encrypted prior to out3ourcin! 4or data privacy and

    co6atin! un3olicited acce33e3) =owever7 data encryption a8e3

    e44ective data utilization a very challen!in! ta38 !iven that there could

     6e a lar!e aount o4 out3ourced data 4ile3) $oreover7 in Cloud

    Coputin!7 data owner3 ay 3hare their out3ourced data with a lar!e

    nu6er o4 u3er3) The individual u3er3 i!ht want to only retrieve certain

    3peci4ic data 4ile3 they are intere3ted in durin! a !iven 3e33ion) One o4 

    the o3t popular way3 i3 to 3electively retrieve 4ile3 throu!h 8eyword;

     6a3ed 3earch in3tead o4 retrievin! all the encrypted 4ile3 6ac8 which i3

    copletely ipractical in cloud coputin! 3cenario3) Such 8eyword;

     6a3ed 3earch techni:ue allow3 u3er3 to 3electively retrieve 4ile3 o4 

  • 8/18/2019 Fuzzy Final

    9/45

    intere3t and ha3 6een widely applied in plainte5t 3earch 3cenario37 3uch

    a3

  • 8/18/2019 Fuzzy Final

    10/45

    3pell chec8 echani33) =owever7 thi3 approach doe3 not copletely

    3olve the pro6le and 3oetie3 can 6e ine44ective due to the 4ollowin!

    rea3on3 on the one hand7 it re:uire3 additional interaction o4 u3er to

    deterine the correct word 4ro the candidate3 !enerated 6y the 3pell

    chec8 al!orith7 which unnece33arily co3t3 u3er@3 e5tra coputation

    e44ort on the other hand7 in ca3e that u3er accidentally type3 3oe other 

    valid 8eyword3 6y i3ta8e *4or e5aple7 3earch 4or GhatH 6y carele33ly

    typin! GcatH+7 the 3pell chec8 al!orith would not even wor8 at all7 a3 it

    can never di44erentiate 6etween two actual valid word3) Thu37 the

    draw6ac83 o4 e5i3tin! 3chee3 3i!ni4y the iportant need 4or new

    techni:ue3 that 3upport 3earchin! 4le5i6ility7 toleratin! 6oth inor typo3

    and 4orat incon3i3tencie3) %n thi3 paper7 we 4ocu3 on ena6lin! e44ective

    yet privacy pre3ervin! 4uzzy 8eyword 3earch in Cloud Coputin!) To

    the 6e3t o4 our 8nowled!e7 we 4oralize 4or the 4ir3t tie the pro6le o4 

    e44ective 4uzzy 8eyword 3earch over encrypted cloud data while

    aintainin! 8eyword privacy) Fuzzy 8eyword 3earch !reatly enhance3

    3y3te u3a6ility 6y returnin! the atchin! 4ile3 when u3er3@ 3earchin!

    input3 e5actly atch the prede4ined 8eyword3 or the clo3e3t po33i6le

    atchin! 4ile3 6a3ed on 8eyword 3iilarity 3eantic37 when exact atch

    4ail3) $ore 3peci4ically7 we u3e edit di3tance to :uanti4y 8eyword33iilarity and develop a novel techni:ue7 i)e)7 an wildcard;6a3ed

    techni:ue7 4or the con3truction o4 4uzzy 8eyword 3et3) Thi3 techni:ue

    eliinate3 the need 4or enueratin! all the 4uzzy 8eyword3 and the

  • 8/18/2019 Fuzzy Final

    11/45

    re3ulted 3ize o4 the 4uzzy 8eyword 3et3 i3 3i!ni4icantly reduced) #a3ed

    on the con3tructed 4uzzy 8eyword 3et37 we propo3e an e44icient 4uzzy

    8eyword 3earch 3chee) Throu!h ri!orou3 3ecurity analy3i37 we 3how

    that the propo3ed 3olution i3 3ecure and privacy;pre3ervin!7 while

    correctly realizin! the !oal o4 4uzzy 8eyword 3earch)

  • 8/18/2019 Fuzzy Final

    12/45

    LITERATURELITERATURESURVEY SURVEY 

  • 8/18/2019 Fuzzy Final

    13/45

    M"#$%#$"'

    P($' #)*# +,--. /).0" )456

    Recently7 the iportance o4 4uzzy 3earch ha3 received attention in the

    conte5t o4 plainte5t 3earchin! in in4oration retrieval counity ..B0 

    ./B) They addre33ed thi3 pro6le in the traditional in4orationacce33

     paradi! 6y allowin! u3er to 3earch without u3in! try;and;3ee approach

    4or 4indin! relevant in4oration 6a3ed on appro5iate 3trin! atchin!)

    At the 4ir3t !lance7 it 3ee3 po33i6le 4or one to directly apply the3e 3trin!

    atchin! al!orith3 to the conte5t o4 3earcha6le encryption 6y

    coputin! the trapdoor3 on a character 6a3e within an alpha6et)

    =owever7 thi3 trivial con3truction 3u44er3 4ro the dictionary and

    3tati3tic3 attac83 and 4ail3 to achieve the 3earch privacy

    S)45() )'4.8#$"'6

    Traditional 3earcha6le encryption ,B0IB7 .-B ha3 6een widely 3tudied

    in the conte5t o4  crypto!raphy) Aon! tho3e wor837 o3t are 4ocu3ed

    on e44iciency iproveent3 and 3ecurity de4inition 4oralization3) The

    4ir3t con3truction o4 3earcha6le encryption wa3 propo3ed 6y Son! et al)

    /B7 in which each word in 

    the docuent i3 encrypted independentlyunder a 3pecial two;layered encryption con3truction)

  • 8/18/2019 Fuzzy Final

    14/45

     6oth propo3ed 3iilar Ginde5H approache37 where  a 3in!le encrypted

    ha3h ta6le inde5 i3 6uilt 4or the entire 4ile collection) %n the inde5 ta6le7

    each entry con3i3t3 o4 the trapdoor o4 a 8eyword and an encrypted 3et o4 

    4ile identi4ier3 who3e corre3pondin! data 4ile3 contain the 8eyword) A3

    a copleentary approach7 #oneh et al) B pre3ented a  pu6lic;8ey

     6a3ed 3earcha6le encryption 3chee7 with an analo!ou3 3cenario to that

    o4 /B) Note that all the3e e5i3tin! 3chee3 3upport only e5act 8eyword

    3earch7 and thu3 are not 3uita6le 4or Cloud Coputin!) 

    O#5)6

    Private atchin! .1B7 a3 another related notion7 ha3 6een 3tudied o3tly

    in the conte5t o4 3ecure ultiparty coputation to let di44erent partie3

    copute 3oe 4unction o4 their own data colla6oratively without

    revealin! their data to the other3) The3e 4unction3 could 6e inter3ection

    or appro5iate private atchin! o4 two 3et37 etc) The private

    in4oration retrieval .B i3 an o4ten;u3ed techni:ue to retrieve theatchin! ite3 3ecretly7 which ha3 6een widely applied in in4oration

    retrieval 4ro data6a3e and u3ually incur3 une5pectedly coputation

    cople5ity)

  • 8/18/2019 Fuzzy Final

    15/45

    PROBLEMPROBLEMDEFINITIONDEFINITION

  • 8/18/2019 Fuzzy Final

    16/45

    P"()9 ##)9)'#

    %n thi3 paper7 we con3ider a cloud data 3y3te con3i3tin! o4 data owner7

    data u3er and cloud 3erver)

  • 8/18/2019 Fuzzy Final

    17/45

    S4"8)

    9e propo3e a 3y3te where Fuzzy 8eyword 3earch !reatly enhance3

    3y3te u3a6ility 6y returnin! the atchin! 4ile3 when u3er3@ 3earchin!

    input3 e5actly atch the prede4ined 8eyword3 or the clo3e3t po33i6le

    atchin! 4ile3 6a3ed on 8eyword 3iilarity 3eantic37 when exact atch

    4ail3)

    E*$#$': S.#)9

    For the protection o4 data privacy7 3en3itive data u3ually have to 6e

    encrypted 6e4ore out3ourcin!7 which a8e3 e44ective data utilization a

    very challen!in! ta38) Althou!h traditional 3earcha6le encryption

    3chee3 allow a u3er to 3ecurely 3earch over encrypted data throu!h

    8eyword3 and 3electively retrieve 4ile3 o4 intere3t7 the3e techni:ue3

    3upport only exact 8eyword 3earch) That i37 there i3 no tolerance o4 

    inor typo3 and 4orat incon3i3tencie3 which7 on the other hand7 are

    typical u3er 3earchin! 6ehavior and happen very 4re:uently) Thi3

    3i!ni4icant draw6ac8 a8e3 e5i3tin! techni:ue3 un3uita6le in Cloud

    Coputin! a3 it !reatly a44ect3 3y3te u3a6ility7 renderin! u3er 

    3earchin! e5perience3 very 4ru3tratin! and 3y3te e44icacy very low)

  • 8/18/2019 Fuzzy Final

    18/45

    D$%'#:) "+ E*$#$': S.#)9

    .+ Dependent on E5act Keyword techni:ue

    ,+ no tolerance o4 inor typo3 and 4orat incon3i3tencie3

  • 8/18/2019 Fuzzy Final

    19/45

    P"8") S.#)9

  • 8/18/2019 Fuzzy Final

    20/45

    Proposed System:

    Main Modules:

      1. Wildcard !ased Tec"ni#ue

      $. %ram & !ased Tec"ni#ue 

    1. Wildcard !ased Tec"ni#ue:  In the above straightforward approach, all the variants of the keywords

    have to be listed even if an operation is performed at the same position.Based on the above observation, we proposed to use an wildcard to denote

    edit operations at the same position. The wildcard-based fuzzy set editsdistance to solve the problems.

    For eample, for the keyword !"#T$% with the pre-set edit distance &, its

    wildcard based fuzzy keyword set can be constructed as

    SC'ST()* 1 + ,C'ST()* -C'ST()*-'ST()* C-'ST()* C-ST()* C'ST(-)* C'ST(-*C'ST()-.

    )dit Distance:

    a) #ubstitution

     6) 'eletion

    c) Insertion

    a) Su/stitution ( changing one character to another in a word)

     6) Deletion ( deleting one character from a word)

    c) Insertion( inserting a single character into a word.

  • 8/18/2019 Fuzzy Final

    21/45

    $. %ram !ased Tec"ni#ue:

     Another e44icient techni:ue 4or con3tructin! 4uzzy 3et i3 6a3ed on

    !ra3) The !ra o4 a 3trin! i3 a ,#$':  that can 6e u3ed a3 a

    3i!nature 4or e44icient appro5iate 3earch) 9hile !ra ha3 6een widely

    u3ed 4or con3tructin! inverted li3t 4or appro5iate 3trin! 3earch7 we u3e

    !ra 4or the atchin! purpo3e) 9e propo3e to utilize the 4act that any

     priitive edit operation will a44ect at o3t one 3peci4ic character o4 the

    8eyword7 leavin! all the reainin! character3 untouched) %n other 

    word37 the relative order o4 the reainin! character3 a4ter the priitive

    operation3 i3 alway3 8ept the 3ae a3 it i3 6e4ore the operation3)

    For e5aple7 the !ra;6a3ed 4uzzy 3et SCAST(E7 . 4or 8eyword

    CAST(E can 6e con3tructed a3

  • 8/18/2019 Fuzzy Final

    22/45

      ;CASTLE< CSTLE< CATLE< CASLE< CASTE< CASTL<

    ASTLE=6

    'l0orit"m Description:  The appro5iate 3trin! atchin! al!orith3 aon! the can 6e

    cla33i4ied into two cate!orie3 on;line and o44;line) The on;line

    techni:ue37 per4orin! 3earch without an inde57 are unaccepta6le 4or 

    their low 3earch e44iciency7 while the o44;line approach7 utilizin!inde5in! techni:ue37 a8e3 it draatically 4a3ter) A variety o4 inde5in!

    al!orith37 3uch a3 3u44i5 tree37 etric tree3 and :;!ra ethod37 have

     6een pre3ented) At the 4ir3t !lance7 it 3ee3 po33i6le 4or one to directly

    apply the3e 3trin! atchin! al!orith3 to the conte5t o4 3earcha6le

    encryption 6y coputin! the trapdoor3 on a character 6a3e within an

    alpha6et) =owever7 thi3 trivial con3truction 3u44er3 4ro the dictionary

    and 3tati3tic3 attac83 and 4ail3 to achieve the 3earch privacy) An in3tance

     M  o4 the data type string-matching  i3 an o62ect aintainin! a pattern and

    a 3trin!) %t provide3 a collection o4 di44erent al!orith3 4or coputation

    o4 the e5act 3trin! atchin! pro6le) Each 4unction copute3 a li3t o4 

    all 3tartin! po3ition3 o4 occurrence3 o4 the pattern in the 3trin!)

    S$stem Arc%itecture&

  • 8/18/2019 Fuzzy Final

    23/45

    A%'#:) "+ P"8") .#)9

    .+ %prove the 3ucce33 rate o4 prediction)

    2> Reduce incorrect 4ile retrieval)

    /+ Not dependent on E5act Keyword techni:ue

  • 8/18/2019 Fuzzy Final

    24/45

    1+ Tolerance o4 inor typo3 and 4orat incon3i3tencie3

  • 8/18/2019 Fuzzy Final

    25/45

    HARDARE "HARDARE "

    SOFTARESOFTARERE#UIREMENTRE#UIREMENT

  • 8/18/2019 Fuzzy Final

    26/45

    H0) ' S"+#0) )?,$)9)'#

    =ardware

    .) Proce33or Pentiu 1

    ,) RA$ ., $# or ore

    /) =ard di38 .M

  • 8/18/2019 Fuzzy Final

    27/45

    PLANNIN$ ANDPLANNIN$ AND

    ESTIMATIONESTIMATION

  • 8/18/2019 Fuzzy Final

    28/45

    P"@)4# M)#5""(":.

    S"+#0) )%)("89)'# L$+) C.4()

    The entire pro2ect 3panned 4or duration o4 M onth3) %n order to

    e44ectively de3i!n and d evelop a co3t;e44ective odel the 9ater4all odel

    wa3 practiced)

    Requirement gathering and Analysis phase:

    This phase started at the beginning of our project, we had

    formed groups and modularized the project. Important points of

    consideration were

  • 8/18/2019 Fuzzy Final

    29/45

    1 Define and visualize al l the objectives clearly.

    2 ather re!uirements and evaluate them.

    " #onsider the technical re!uirements needed and then col lect

    technical specifications of various peripheral components

    $%ardware& re!uired.

    ' (nalyze the coding languages needed for the project.

    ) Def ine coding strategies.

    * (nalyze future r is+s problems.

    - Def ine strateg ies to avo id this r is+s e lse def ine a lternate

    solutions to this ris+s.

    #hec+ f inancial feasibil ity.

    / Define antt charts and assign time span for each phase.

    0y studying the project etensively we developed a antt

    chart to trac+ and schedule the project. 0elow is the antt chart

    of our project.

    TimeLine

    Cost Estimation

  • 8/18/2019 Fuzzy Final

    30/45

    #ost estimation is done using cocomo model

    cost ri)ers

    !atings

    eryo& o&

    Nominal 0igh

    ery0igh

    1xtra0igh

    'roduct attributes

    2e'uired soft&are reliability !.34 !.55 ".!! "."4 ".%!

    Si6e of application database !.7% ".!! ".!5 "."8

    +omplexity of the product !.3! !.54 ".!! "."4 ".#! ".84

    ardare attributes

    2un-time performance constraints ".!! "."" ".#! ".88

    Memory constraints ".!! ".!8 "." ".48

    olatility of the )irtual machine en)ironment

      !.53 ".!! "."4 ".#!

    2e'uired turnabout time !.53 ".!! ".!3 "."4

    'ersonnel attributes

    9nalyst capability ".%8 "."7 ".!! !.58 !.3"

    9pplications experience ".7 "."# ".!! !.7" !.5

    Soft&are engineer capability ".% "."3 ".!! !.58 !.3!

    irtual machine experience "." "."! ".!! !.7!

    rogramming language experience "."% ".!3 ".!! !.74

    'ro*ect attributes

  • 8/18/2019 Fuzzy Final

    31/45

    (se of soft&are tools ".% "."! ".!! !.7" !.5

    9pplication of soft&are engineeringmethods

    ".% "."! ".!! !.7" !.5#

    2e'uired de)elopment schedule ".# ".!5 ".!! ".!% "."!

    The %nterediate Cocoo 4orula now ta8e3 the 4or

    Eai KL"C>(b

    i  )6EAF

    sing above calculation we found that

    The total tie period o4 the pro2ect i3 around M onth37 the per onth co3t coe3 out to 6e

    R3).,7--- 7 3o the total coe3 to 6e R3),7---

    FEASIBILITY STUDY

      Fea3i6ility 3tudy i3 ade to 3ee i4 the pro2ect on copletion will 3erve the purpo3e o4 the

    or!anization 4or the aount o4 wor87 e44ort and the tie that 3pend on it) Fea3i6ility 3tudy let3the developer 4ore3ee the 4uture o4 the pro2ect and the u3e4ulne33) A 4ea3i6ility 3tudy o4 a 3y3te

     propo3al i3 accordin! to it3 wor8a6ility7 which i3 the ipact on the or!anization7 a6ility to eet

    their u3er need3 and e44ective u3e o4 re3ource3) Thu3 when a new application i3 propo3ed it

    norally !oe3 throu!h a 4ea3i6ility 3tudy 6e4ore it i3 approved 4or developent)

      The docuent provide the 4ea3i6ility o4 the pro2ect that i3 6ein! de3i!ned and li3t3 variou3

    area3 that were con3idered very care4ully durin! the 4ea3i6ility 3tudy o4 thi3 pro2ect 3uch a3Technical7 Econoic and Operational 4ea3i6ilitie3) The 4ollowin! are it3 4eature3

    TECHNICAL FEASIBILITY

      The 3y3te u3t 6e evaluated 4ro the technical point o4 view 4ir3t) The a33e33ent o4 thi34ea3i6ility u3t 6e 6a3ed on an outline de3i!n o4 the 3y3te re:uireent in the ter3 o4 input7

    output7 pro!ra3 and procedure3) =avin! identi4ied an outline 3y3te7 the inve3ti!ation u3t !o

    on to 3u!!e3t the type o4 e:uipent7 re:uired ethod developin! the 3y3te7 o4 runnin! the3y3te once it ha3 6een de3i!ned)

  • 8/18/2019 Fuzzy Final

    32/45

    Technical i33ue3 rai3ed durin! the inve3ti!ation are

    Doe3 the e5i3tin! technolo!y 3u44icient 4or the 3u!!e3ted oneCan the 3y3te e5pand i4 developed

      The pro2ect 3hould 6e developed 3uch that the nece33ary 4unction3 and per4orance areachieved within the con3traint3) The pro2ect i3 developed within late3t technolo!y) Throu!h the

    technolo!y ay 6ecoe o63olete a4ter 3oe period o4 tie7 due to the 4act that never ver3ion o4 

    3ae 3o4tware 3upport3 older ver3ion37 the 3y3te ay 3till 6e u3ed) So there are inialcon3traint3 involved with thi3 pro2ect) The 3y3te ha3 6een developed u3in! Java the pro2ect i3

    technically 4ea3i6le 4or developent)

     ECONOMIC FEASIBILITY

      The developin! 3y3te u3t 6e 2u3ti4ied 6y co3t and 6ene4it) Criteria to en3ure that e44ort i3

    concentrated on pro2ect7 which will !ive 6e3t7 return at the earlie3t) One o4 the 4actor37 which

    a44ect the developent o4 a new 3y3te7 i3 the co3t it would re:uire) 

    The 4ollowin! are 3oe o4 the iportant 4inancial :ue3tion3 a38ed durin! preliinaryinve3ti!ation

    • The co3t3 conduct a 4ull 3y3te inve3ti!ation)

    • The co3t o4 the hardware and 3o4tware)

    • The 6ene4it3 in the 4or o4 reduced co3t3 or 4ewer co3tly error3)

      Since the 3y3te i3 developed a3 part o4 pro2ect wor87 there i3 no anual co3t to 3pend 4or the

     propo3ed 3y3te) Al3o all the re3ource3 are already availa6le7 it !ive an indication o4 the 3y3te

    i3 econoically po33i6le 4or developent)

    BEHAVIORAL FEASIBILITY

    Thi3 include3 the 4ollowin! :ue3tion3

    %3 there 3u44icient 3upport 4or the u3er3

    9ill the propo3ed 3y3te cau3e har

     The pro2ect would 6e 6ene4icial 6ecau3e it 3ati34ie3 the o62ective3 when developed and

    in3talled) All 6ehavioral a3pect3 are con3idered care4ully and conclude that the pro2ect i3

     6ehaviorally 4ea3i6le)

  • 8/18/2019 Fuzzy Final

    33/45

    D%&'( "D%&'( "

    I*+,%*%--'/I*+,%*%--'/

  • 8/18/2019 Fuzzy Final

    34/45

    Start

    %nput lo!in credential3

    %4 veri4ied

     No

    'e3

    Select 4ile to upload

    Encrypt data with 8ey

  • 8/18/2019 Fuzzy Final

    35/45

    1 ())( D2D

    "pload encrypted 4ile

  • 8/18/2019 Fuzzy Final

    36/45

    $ le3el D2D

  • 8/18/2019 Fuzzy Final

    37/45

    APPLICATIONAPPLICATION

  • 8/18/2019 Fuzzy Final

    38/45

    .+ 3earch 3eantic3

    ,+ 3earch ran8in!

    /+ File retrieval

  • 8/18/2019 Fuzzy Final

    39/45

    C"'4(,$"'

  • 8/18/2019 Fuzzy Final

    40/45

    C"'4(,$"'

  • 8/18/2019 Fuzzy Final

    41/45

    %n thi3 paper7 4or the 4ir3t tie we 4oralize and 3olve the pro6le o4 

    3upportin! e44icient yet privacy;pre3ervin! 4uzzy 3earch 4or achievin!

    e44ective utilization o4 reotely 3tored encrypted data in Cloud

    Coputin!) 9e de3i!n an advanced techni:ue *i)e)7 wildcard;6a3ed

    techni:ue+ to con3truct the 3tora!e;e44icient 4uzzy 8eyword 3et3 6y

    e5ploitin! a 3i!ni4icant o63ervation on the 3iilarity etric o4 edit

    di3tance) #a3ed on the con3tructed 4uzzy 8eyword 3et37 we 4urther 

     propo3e an e44icient 4uzzy 8eyword 3earch 3chee) Throu!h ri!orou3

    3ecurity analy3i37 we 3how that our propo3ed 3olution i3 3ecure and

     privacy;pre3ervin!7 while correctly realizin! the !oal o4 4uzzy 8eyword

    3earch)

  • 8/18/2019 Fuzzy Final

    42/45

    FUTURE MODIFICATION

  • 8/18/2019 Fuzzy Final

    43/45

    FUTURE MODIFICATION

    A3 our on!oin! wor87 we will continue to re3earch on 3ecurity

    echani33 that 3upport.+ 3earch 3eantic3 that ta8e3 into con3ideration con2unction o4 

    8eyword37 3e:uence o4 8eyword37 and even the cople5 natural

    lan!ua!e 3eantic3 to produce hi!hly relevant 3earch re3ult3 and

    ,+ 3earch ran8in! that 3ort3 the 3earchin! re3ult3 accordin! to the

    relevance criteria)

    BIBILIOGRAPHYBIBILIOGRAPHY

  • 8/18/2019 Fuzzy Final

    44/45

    B$($":85.

    .B

  • 8/18/2019 Fuzzy Final

    45/45

    3earche3 on reote encrypted data7H in Proc. of C&'*047 ,--)

    IB R) Curtola7 J) A)