fuzzy final
TRANSCRIPT
-
8/18/2019 Fuzzy Final
1/45
S.I.E.S College of Arts, Science and Commerce,Sion(W), Mumbai – 400 00.
A PROJECTED REPORT
ON
“Fuzzy Keyword Search over Encrypted Data in CloudCoputin!”
S"#$%TED TO
"N%&ERS%T' OF $"$#A%
#'
&ENNE(A K"$ARARAJA
$)Sc)*CO$P"TER SC%ENCE+
,-./0,-.1
-
8/18/2019 Fuzzy Final
2/45
S.I.E.S College of Arts, Science and Commerce,Sion(W), Mumbai – 400 00.
CE!"I#ICA"E
This is to certify that Mr / Miss. __________________________________
Seat-No: _______________ has successfully completed the
necessary course of experiments in the subject of
__________________________________________during the academic
year !"# $ !"% completing &ith the re'uirements of (ni)ersity
of Mumbai* for the course of MS+ - ,,. +omputer Science.
______________ Prof. In-Charge
___________________ ____________ Head of the Department Examiner
College Seal
-
8/18/2019 Fuzzy Final
3/45
ACKNOWLEDGEMENT
No pro2ect i3 ever coplete without the !uidance o4 tho3e e5pert how have already traded thi3 pa3t 6e4ore and hence 6ecoe a3ter o4 it and a3 a re3ult7 our leader) So we would li8e to ta8e
thi3 opportunity to ta8e all tho3e individual3 how have helped u3 in vi3ualizin! thi3 pro2ect)
9e e5pre33 out deep !ratitude to our pro2ect !uide $r3) 4or providin! tiely a33i3tant to
our :uery and !uidance that 3he !ave owin! to her e5perience in thi3 4ield 4or pa3t any year)
She had indeed 6een a li!hthou3e 4or u3 in thi3 2ourney)
9e would al3o ta8e thi3 opportunity to than8 our pro2ect co;ordinate $r) 4or hi3 !uidance
in 3electin! thi3 pro2ect and al3o 4or providin! u3 all thi3 detail3 on proper pre3entation o4 thi3 pro2ect)
9e e5tend our 3incerity appreciation to all our Pro4e33or 4or CO((E
-
8/18/2019 Fuzzy Final
4/45
ABSTRACT
Abstract ? A3 Cloud Coputin! 6ecoe3 prevalent7 ore and ore
3en3itive in4oration are 6ein! centralized into the cloud) For the
protection o4 data privacy7 3en3itive data u3ually have to 6e encrypted
6e4ore out3ourcin!7 which a8e3 e44ective data utilization a very
challen!in! ta38) Althou!h traditional 3earcha6le encryption 3chee3
allow a u3er to 3ecurely 3earch over encrypted data throu!h 8eyword3
and 3electively retrieve 4ile3 o4 intere3t7 the3e techni:ue3 3upport only
exact 8eyword 3earch) That i37 there i3 no tolerance o4 inor typo3 and
4orat incon3i3tencie3 which7 on the other hand7 are typical u3er
3earchin! 6ehavior and happen very 4re:uently) Thi3 3i!ni4icant
draw6ac8 a8e3 e5i3tin! techni:ue3 un3uita6le in Cloud Coputin! a3it !reatly a44ect3 3y3te u3a6ility7 renderin! u3er 3earchin! e5perience3
very 4ru3tratin! and 3y3te e44icacy very low) %n thi3 paper7 4or the 4ir3t
tie we 4oralize and 3olve the pro6le o4 e44ective 4uzzy 8eyword
3earch over encrypted cloud data while aintainin! 8eyword privacy)
Fuzzy 8eyword 3earch !reatly enhance3 3y3te u3a6ility 6y returnin!
the atchin! 4ile3 when u3er3@ 3earchin! input3 e5actly atch the
prede4ined 8eyword3 or the clo3e3t po33i6le atchin! 4ile3 6a3ed on
8eyword 3iilarity 3eantic37 when exact atch 4ail3) %n our 3olution7
we e5ploit edit di3tance to :uanti4y 8eyword3 3iilarity and develop an
-
8/18/2019 Fuzzy Final
5/45
advanced techni:ue on con3tructin! 4uzzy 8eyword 3et37 which !reatly
reduce3 the 3tora!e and repre3entation overhead3) Throu!h ri!orou3
3ecurity analy3i37 we 3how that our propo3ed 3olution i3 3ecure and
privacy;pre3ervin!7 while correctly realizin! the !oal o4 4uzzy 8eyword
3earch)
-
8/18/2019 Fuzzy Final
6/45
INDEX
SR.NSR.NOO
TITLE PG.NO
1)1) INTRODUCTION1
2)2) LITERATURE SURVEY5
3)3) PROBLEM DEFINITION8
4)4) REQUIREMENT ANALYSIS
11
5)5) PLANNING AND ESTIMATION13
6)6) ALGORITHM15
7)7) IMPLEMENTATION22
8)8) ADVANTAGES & DISADVANTAGES27
9)9) FUTURE MODIFICATIONS29
10)10) APPLICATION31
11)11) BIBLIOGRAPHY33
12)12) SCREENSHOTS!
13)13) SOURCE CODE
-
8/18/2019 Fuzzy Final
7/45
INTRODUCTIONINTRODUCTION
-
8/18/2019 Fuzzy Final
8/45
INTRODUCTION
A3 Cloud Coputin! 6ecoe3 prevalent7 ore and ore 3en3itive
in4oration are 6ein! centralized into the cloud7 3uch a3 eail37 per3onal
health record37 !overnent docuent37 etc) #y 3torin! their data into the
cloud7 the data owner3 can 6e relieved 4ro the 6urden o4 data 3tora!e
and aintenance 3o a3 to en2oy the on;deand hi!h :uality data 3tora!e
3ervice) =owever7 the 4act that data owner3 and cloud 3erver are not in
the 3ae tru3ted doain ay put the out3ourced data at ri387 a3 the
cloud 3erver ay no lon!er 6e 4ully tru3ted) %t 4ollow3 that 3en3itive data
u3ually 3hould 6e encrypted prior to out3ourcin! 4or data privacy and
co6atin! un3olicited acce33e3) =owever7 data encryption a8e3
e44ective data utilization a very challen!in! ta38 !iven that there could
6e a lar!e aount o4 out3ourced data 4ile3) $oreover7 in Cloud
Coputin!7 data owner3 ay 3hare their out3ourced data with a lar!e
nu6er o4 u3er3) The individual u3er3 i!ht want to only retrieve certain
3peci4ic data 4ile3 they are intere3ted in durin! a !iven 3e33ion) One o4
the o3t popular way3 i3 to 3electively retrieve 4ile3 throu!h 8eyword;
6a3ed 3earch in3tead o4 retrievin! all the encrypted 4ile3 6ac8 which i3
copletely ipractical in cloud coputin! 3cenario3) Such 8eyword;
6a3ed 3earch techni:ue allow3 u3er3 to 3electively retrieve 4ile3 o4
-
8/18/2019 Fuzzy Final
9/45
intere3t and ha3 6een widely applied in plainte5t 3earch 3cenario37 3uch
a3
-
8/18/2019 Fuzzy Final
10/45
3pell chec8 echani33) =owever7 thi3 approach doe3 not copletely
3olve the pro6le and 3oetie3 can 6e ine44ective due to the 4ollowin!
rea3on3 on the one hand7 it re:uire3 additional interaction o4 u3er to
deterine the correct word 4ro the candidate3 !enerated 6y the 3pell
chec8 al!orith7 which unnece33arily co3t3 u3er@3 e5tra coputation
e44ort on the other hand7 in ca3e that u3er accidentally type3 3oe other
valid 8eyword3 6y i3ta8e *4or e5aple7 3earch 4or GhatH 6y carele33ly
typin! GcatH+7 the 3pell chec8 al!orith would not even wor8 at all7 a3 it
can never di44erentiate 6etween two actual valid word3) Thu37 the
draw6ac83 o4 e5i3tin! 3chee3 3i!ni4y the iportant need 4or new
techni:ue3 that 3upport 3earchin! 4le5i6ility7 toleratin! 6oth inor typo3
and 4orat incon3i3tencie3) %n thi3 paper7 we 4ocu3 on ena6lin! e44ective
yet privacy pre3ervin! 4uzzy 8eyword 3earch in Cloud Coputin!) To
the 6e3t o4 our 8nowled!e7 we 4oralize 4or the 4ir3t tie the pro6le o4
e44ective 4uzzy 8eyword 3earch over encrypted cloud data while
aintainin! 8eyword privacy) Fuzzy 8eyword 3earch !reatly enhance3
3y3te u3a6ility 6y returnin! the atchin! 4ile3 when u3er3@ 3earchin!
input3 e5actly atch the prede4ined 8eyword3 or the clo3e3t po33i6le
atchin! 4ile3 6a3ed on 8eyword 3iilarity 3eantic37 when exact atch
4ail3) $ore 3peci4ically7 we u3e edit di3tance to :uanti4y 8eyword33iilarity and develop a novel techni:ue7 i)e)7 an wildcard;6a3ed
techni:ue7 4or the con3truction o4 4uzzy 8eyword 3et3) Thi3 techni:ue
eliinate3 the need 4or enueratin! all the 4uzzy 8eyword3 and the
-
8/18/2019 Fuzzy Final
11/45
re3ulted 3ize o4 the 4uzzy 8eyword 3et3 i3 3i!ni4icantly reduced) #a3ed
on the con3tructed 4uzzy 8eyword 3et37 we propo3e an e44icient 4uzzy
8eyword 3earch 3chee) Throu!h ri!orou3 3ecurity analy3i37 we 3how
that the propo3ed 3olution i3 3ecure and privacy;pre3ervin!7 while
correctly realizin! the !oal o4 4uzzy 8eyword 3earch)
-
8/18/2019 Fuzzy Final
12/45
LITERATURELITERATURESURVEY SURVEY
-
8/18/2019 Fuzzy Final
13/45
M"#$%#$"'
P($' #)*# +,--. /).0" )456
Recently7 the iportance o4 4uzzy 3earch ha3 received attention in the
conte5t o4 plainte5t 3earchin! in in4oration retrieval counity ..B0
./B) They addre33ed thi3 pro6le in the traditional in4orationacce33
paradi! 6y allowin! u3er to 3earch without u3in! try;and;3ee approach
4or 4indin! relevant in4oration 6a3ed on appro5iate 3trin! atchin!)
At the 4ir3t !lance7 it 3ee3 po33i6le 4or one to directly apply the3e 3trin!
atchin! al!orith3 to the conte5t o4 3earcha6le encryption 6y
coputin! the trapdoor3 on a character 6a3e within an alpha6et)
=owever7 thi3 trivial con3truction 3u44er3 4ro the dictionary and
3tati3tic3 attac83 and 4ail3 to achieve the 3earch privacy
S)45() )'4.8#$"'6
Traditional 3earcha6le encryption ,B0IB7 .-B ha3 6een widely 3tudied
in the conte5t o4 crypto!raphy) Aon! tho3e wor837 o3t are 4ocu3ed
on e44iciency iproveent3 and 3ecurity de4inition 4oralization3) The
4ir3t con3truction o4 3earcha6le encryption wa3 propo3ed 6y Son! et al)
/B7 in which each word in
the docuent i3 encrypted independentlyunder a 3pecial two;layered encryption con3truction)
-
8/18/2019 Fuzzy Final
14/45
6oth propo3ed 3iilar Ginde5H approache37 where a 3in!le encrypted
ha3h ta6le inde5 i3 6uilt 4or the entire 4ile collection) %n the inde5 ta6le7
each entry con3i3t3 o4 the trapdoor o4 a 8eyword and an encrypted 3et o4
4ile identi4ier3 who3e corre3pondin! data 4ile3 contain the 8eyword) A3
a copleentary approach7 #oneh et al) B pre3ented a pu6lic;8ey
6a3ed 3earcha6le encryption 3chee7 with an analo!ou3 3cenario to that
o4 /B) Note that all the3e e5i3tin! 3chee3 3upport only e5act 8eyword
3earch7 and thu3 are not 3uita6le 4or Cloud Coputin!)
O#5)6
Private atchin! .1B7 a3 another related notion7 ha3 6een 3tudied o3tly
in the conte5t o4 3ecure ultiparty coputation to let di44erent partie3
copute 3oe 4unction o4 their own data colla6oratively without
revealin! their data to the other3) The3e 4unction3 could 6e inter3ection
or appro5iate private atchin! o4 two 3et37 etc) The private
in4oration retrieval .B i3 an o4ten;u3ed techni:ue to retrieve theatchin! ite3 3ecretly7 which ha3 6een widely applied in in4oration
retrieval 4ro data6a3e and u3ually incur3 une5pectedly coputation
cople5ity)
-
8/18/2019 Fuzzy Final
15/45
PROBLEMPROBLEMDEFINITIONDEFINITION
-
8/18/2019 Fuzzy Final
16/45
P"()9 ##)9)'#
%n thi3 paper7 we con3ider a cloud data 3y3te con3i3tin! o4 data owner7
data u3er and cloud 3erver)
-
8/18/2019 Fuzzy Final
17/45
S4"8)
9e propo3e a 3y3te where Fuzzy 8eyword 3earch !reatly enhance3
3y3te u3a6ility 6y returnin! the atchin! 4ile3 when u3er3@ 3earchin!
input3 e5actly atch the prede4ined 8eyword3 or the clo3e3t po33i6le
atchin! 4ile3 6a3ed on 8eyword 3iilarity 3eantic37 when exact atch
4ail3)
E*$#$': S.#)9
For the protection o4 data privacy7 3en3itive data u3ually have to 6e
encrypted 6e4ore out3ourcin!7 which a8e3 e44ective data utilization a
very challen!in! ta38) Althou!h traditional 3earcha6le encryption
3chee3 allow a u3er to 3ecurely 3earch over encrypted data throu!h
8eyword3 and 3electively retrieve 4ile3 o4 intere3t7 the3e techni:ue3
3upport only exact 8eyword 3earch) That i37 there i3 no tolerance o4
inor typo3 and 4orat incon3i3tencie3 which7 on the other hand7 are
typical u3er 3earchin! 6ehavior and happen very 4re:uently) Thi3
3i!ni4icant draw6ac8 a8e3 e5i3tin! techni:ue3 un3uita6le in Cloud
Coputin! a3 it !reatly a44ect3 3y3te u3a6ility7 renderin! u3er
3earchin! e5perience3 very 4ru3tratin! and 3y3te e44icacy very low)
-
8/18/2019 Fuzzy Final
18/45
D$%'#:) "+ E*$#$': S.#)9
.+ Dependent on E5act Keyword techni:ue
,+ no tolerance o4 inor typo3 and 4orat incon3i3tencie3
-
8/18/2019 Fuzzy Final
19/45
P"8") S.#)9
-
8/18/2019 Fuzzy Final
20/45
Proposed System:
Main Modules:
1. Wildcard !ased Tec"ni#ue
$. %ram & !ased Tec"ni#ue
1. Wildcard !ased Tec"ni#ue: In the above straightforward approach, all the variants of the keywords
have to be listed even if an operation is performed at the same position.Based on the above observation, we proposed to use an wildcard to denote
edit operations at the same position. The wildcard-based fuzzy set editsdistance to solve the problems.
For eample, for the keyword !"#T$% with the pre-set edit distance &, its
wildcard based fuzzy keyword set can be constructed as
SC'ST()* 1 + ,C'ST()* -C'ST()*-'ST()* C-'ST()* C-ST()* C'ST(-)* C'ST(-*C'ST()-.
)dit Distance:
a) #ubstitution
6) 'eletion
c) Insertion
a) Su/stitution ( changing one character to another in a word)
6) Deletion ( deleting one character from a word)
c) Insertion( inserting a single character into a word.
-
8/18/2019 Fuzzy Final
21/45
$. %ram !ased Tec"ni#ue:
Another e44icient techni:ue 4or con3tructin! 4uzzy 3et i3 6a3ed on
!ra3) The !ra o4 a 3trin! i3 a ,#$': that can 6e u3ed a3 a
3i!nature 4or e44icient appro5iate 3earch) 9hile !ra ha3 6een widely
u3ed 4or con3tructin! inverted li3t 4or appro5iate 3trin! 3earch7 we u3e
!ra 4or the atchin! purpo3e) 9e propo3e to utilize the 4act that any
priitive edit operation will a44ect at o3t one 3peci4ic character o4 the
8eyword7 leavin! all the reainin! character3 untouched) %n other
word37 the relative order o4 the reainin! character3 a4ter the priitive
operation3 i3 alway3 8ept the 3ae a3 it i3 6e4ore the operation3)
For e5aple7 the !ra;6a3ed 4uzzy 3et SCAST(E7 . 4or 8eyword
CAST(E can 6e con3tructed a3
-
8/18/2019 Fuzzy Final
22/45
;CASTLE< CSTLE< CATLE< CASLE< CASTE< CASTL<
ASTLE=6
'l0orit"m Description: The appro5iate 3trin! atchin! al!orith3 aon! the can 6e
cla33i4ied into two cate!orie3 on;line and o44;line) The on;line
techni:ue37 per4orin! 3earch without an inde57 are unaccepta6le 4or
their low 3earch e44iciency7 while the o44;line approach7 utilizin!inde5in! techni:ue37 a8e3 it draatically 4a3ter) A variety o4 inde5in!
al!orith37 3uch a3 3u44i5 tree37 etric tree3 and :;!ra ethod37 have
6een pre3ented) At the 4ir3t !lance7 it 3ee3 po33i6le 4or one to directly
apply the3e 3trin! atchin! al!orith3 to the conte5t o4 3earcha6le
encryption 6y coputin! the trapdoor3 on a character 6a3e within an
alpha6et) =owever7 thi3 trivial con3truction 3u44er3 4ro the dictionary
and 3tati3tic3 attac83 and 4ail3 to achieve the 3earch privacy) An in3tance
M o4 the data type string-matching i3 an o62ect aintainin! a pattern and
a 3trin!) %t provide3 a collection o4 di44erent al!orith3 4or coputation
o4 the e5act 3trin! atchin! pro6le) Each 4unction copute3 a li3t o4
all 3tartin! po3ition3 o4 occurrence3 o4 the pattern in the 3trin!)
S$stem Arc%itecture&
-
8/18/2019 Fuzzy Final
23/45
A%'#:) "+ P"8") .#)9
.+ %prove the 3ucce33 rate o4 prediction)
2> Reduce incorrect 4ile retrieval)
/+ Not dependent on E5act Keyword techni:ue
-
8/18/2019 Fuzzy Final
24/45
1+ Tolerance o4 inor typo3 and 4orat incon3i3tencie3
-
8/18/2019 Fuzzy Final
25/45
HARDARE "HARDARE "
SOFTARESOFTARERE#UIREMENTRE#UIREMENT
-
8/18/2019 Fuzzy Final
26/45
H0) ' S"+#0) )?,$)9)'#
=ardware
.) Proce33or Pentiu 1
,) RA$ ., $# or ore
/) =ard di38 .M
-
8/18/2019 Fuzzy Final
27/45
PLANNIN$ ANDPLANNIN$ AND
ESTIMATIONESTIMATION
-
8/18/2019 Fuzzy Final
28/45
P"@)4# M)#5""(":.
S"+#0) )%)("89)'# L$+) C.4()
The entire pro2ect 3panned 4or duration o4 M onth3) %n order to
e44ectively de3i!n and d evelop a co3t;e44ective odel the 9ater4all odel
wa3 practiced)
Requirement gathering and Analysis phase:
This phase started at the beginning of our project, we had
formed groups and modularized the project. Important points of
consideration were
-
8/18/2019 Fuzzy Final
29/45
1 Define and visualize al l the objectives clearly.
2 ather re!uirements and evaluate them.
" #onsider the technical re!uirements needed and then col lect
technical specifications of various peripheral components
$%ardware& re!uired.
' (nalyze the coding languages needed for the project.
) Def ine coding strategies.
* (nalyze future r is+s problems.
- Def ine strateg ies to avo id this r is+s e lse def ine a lternate
solutions to this ris+s.
#hec+ f inancial feasibil ity.
/ Define antt charts and assign time span for each phase.
0y studying the project etensively we developed a antt
chart to trac+ and schedule the project. 0elow is the antt chart
of our project.
TimeLine
Cost Estimation
-
8/18/2019 Fuzzy Final
30/45
#ost estimation is done using cocomo model
cost ri)ers
!atings
eryo& o&
Nominal 0igh
ery0igh
1xtra0igh
'roduct attributes
2e'uired soft&are reliability !.34 !.55 ".!! "."4 ".%!
Si6e of application database !.7% ".!! ".!5 "."8
+omplexity of the product !.3! !.54 ".!! "."4 ".#! ".84
ardare attributes
2un-time performance constraints ".!! "."" ".#! ".88
Memory constraints ".!! ".!8 "." ".48
olatility of the )irtual machine en)ironment
!.53 ".!! "."4 ".#!
2e'uired turnabout time !.53 ".!! ".!3 "."4
'ersonnel attributes
9nalyst capability ".%8 "."7 ".!! !.58 !.3"
9pplications experience ".7 "."# ".!! !.7" !.5
Soft&are engineer capability ".% "."3 ".!! !.58 !.3!
irtual machine experience "." "."! ".!! !.7!
rogramming language experience "."% ".!3 ".!! !.74
'ro*ect attributes
-
8/18/2019 Fuzzy Final
31/45
(se of soft&are tools ".% "."! ".!! !.7" !.5
9pplication of soft&are engineeringmethods
".% "."! ".!! !.7" !.5#
2e'uired de)elopment schedule ".# ".!5 ".!! ".!% "."!
The %nterediate Cocoo 4orula now ta8e3 the 4or
Eai KL"C>(b
i )6EAF
sing above calculation we found that
The total tie period o4 the pro2ect i3 around M onth37 the per onth co3t coe3 out to 6e
R3).,7--- 7 3o the total coe3 to 6e R3),7---
FEASIBILITY STUDY
Fea3i6ility 3tudy i3 ade to 3ee i4 the pro2ect on copletion will 3erve the purpo3e o4 the
or!anization 4or the aount o4 wor87 e44ort and the tie that 3pend on it) Fea3i6ility 3tudy let3the developer 4ore3ee the 4uture o4 the pro2ect and the u3e4ulne33) A 4ea3i6ility 3tudy o4 a 3y3te
propo3al i3 accordin! to it3 wor8a6ility7 which i3 the ipact on the or!anization7 a6ility to eet
their u3er need3 and e44ective u3e o4 re3ource3) Thu3 when a new application i3 propo3ed it
norally !oe3 throu!h a 4ea3i6ility 3tudy 6e4ore it i3 approved 4or developent)
The docuent provide the 4ea3i6ility o4 the pro2ect that i3 6ein! de3i!ned and li3t3 variou3
area3 that were con3idered very care4ully durin! the 4ea3i6ility 3tudy o4 thi3 pro2ect 3uch a3Technical7 Econoic and Operational 4ea3i6ilitie3) The 4ollowin! are it3 4eature3
TECHNICAL FEASIBILITY
The 3y3te u3t 6e evaluated 4ro the technical point o4 view 4ir3t) The a33e33ent o4 thi34ea3i6ility u3t 6e 6a3ed on an outline de3i!n o4 the 3y3te re:uireent in the ter3 o4 input7
output7 pro!ra3 and procedure3) =avin! identi4ied an outline 3y3te7 the inve3ti!ation u3t !o
on to 3u!!e3t the type o4 e:uipent7 re:uired ethod developin! the 3y3te7 o4 runnin! the3y3te once it ha3 6een de3i!ned)
-
8/18/2019 Fuzzy Final
32/45
Technical i33ue3 rai3ed durin! the inve3ti!ation are
Doe3 the e5i3tin! technolo!y 3u44icient 4or the 3u!!e3ted oneCan the 3y3te e5pand i4 developed
The pro2ect 3hould 6e developed 3uch that the nece33ary 4unction3 and per4orance areachieved within the con3traint3) The pro2ect i3 developed within late3t technolo!y) Throu!h the
technolo!y ay 6ecoe o63olete a4ter 3oe period o4 tie7 due to the 4act that never ver3ion o4
3ae 3o4tware 3upport3 older ver3ion37 the 3y3te ay 3till 6e u3ed) So there are inialcon3traint3 involved with thi3 pro2ect) The 3y3te ha3 6een developed u3in! Java the pro2ect i3
technically 4ea3i6le 4or developent)
ECONOMIC FEASIBILITY
The developin! 3y3te u3t 6e 2u3ti4ied 6y co3t and 6ene4it) Criteria to en3ure that e44ort i3
concentrated on pro2ect7 which will !ive 6e3t7 return at the earlie3t) One o4 the 4actor37 which
a44ect the developent o4 a new 3y3te7 i3 the co3t it would re:uire)
The 4ollowin! are 3oe o4 the iportant 4inancial :ue3tion3 a38ed durin! preliinaryinve3ti!ation
• The co3t3 conduct a 4ull 3y3te inve3ti!ation)
• The co3t o4 the hardware and 3o4tware)
• The 6ene4it3 in the 4or o4 reduced co3t3 or 4ewer co3tly error3)
Since the 3y3te i3 developed a3 part o4 pro2ect wor87 there i3 no anual co3t to 3pend 4or the
propo3ed 3y3te) Al3o all the re3ource3 are already availa6le7 it !ive an indication o4 the 3y3te
i3 econoically po33i6le 4or developent)
BEHAVIORAL FEASIBILITY
Thi3 include3 the 4ollowin! :ue3tion3
%3 there 3u44icient 3upport 4or the u3er3
9ill the propo3ed 3y3te cau3e har
The pro2ect would 6e 6ene4icial 6ecau3e it 3ati34ie3 the o62ective3 when developed and
in3talled) All 6ehavioral a3pect3 are con3idered care4ully and conclude that the pro2ect i3
6ehaviorally 4ea3i6le)
-
8/18/2019 Fuzzy Final
33/45
D%&'( "D%&'( "
I*+,%*%--'/I*+,%*%--'/
-
8/18/2019 Fuzzy Final
34/45
Start
%nput lo!in credential3
%4 veri4ied
No
'e3
Select 4ile to upload
Encrypt data with 8ey
-
8/18/2019 Fuzzy Final
35/45
1 ())( D2D
"pload encrypted 4ile
-
8/18/2019 Fuzzy Final
36/45
$ le3el D2D
-
8/18/2019 Fuzzy Final
37/45
APPLICATIONAPPLICATION
-
8/18/2019 Fuzzy Final
38/45
.+ 3earch 3eantic3
,+ 3earch ran8in!
/+ File retrieval
-
8/18/2019 Fuzzy Final
39/45
C"'4(,$"'
-
8/18/2019 Fuzzy Final
40/45
C"'4(,$"'
-
8/18/2019 Fuzzy Final
41/45
%n thi3 paper7 4or the 4ir3t tie we 4oralize and 3olve the pro6le o4
3upportin! e44icient yet privacy;pre3ervin! 4uzzy 3earch 4or achievin!
e44ective utilization o4 reotely 3tored encrypted data in Cloud
Coputin!) 9e de3i!n an advanced techni:ue *i)e)7 wildcard;6a3ed
techni:ue+ to con3truct the 3tora!e;e44icient 4uzzy 8eyword 3et3 6y
e5ploitin! a 3i!ni4icant o63ervation on the 3iilarity etric o4 edit
di3tance) #a3ed on the con3tructed 4uzzy 8eyword 3et37 we 4urther
propo3e an e44icient 4uzzy 8eyword 3earch 3chee) Throu!h ri!orou3
3ecurity analy3i37 we 3how that our propo3ed 3olution i3 3ecure and
privacy;pre3ervin!7 while correctly realizin! the !oal o4 4uzzy 8eyword
3earch)
-
8/18/2019 Fuzzy Final
42/45
FUTURE MODIFICATION
-
8/18/2019 Fuzzy Final
43/45
FUTURE MODIFICATION
A3 our on!oin! wor87 we will continue to re3earch on 3ecurity
echani33 that 3upport.+ 3earch 3eantic3 that ta8e3 into con3ideration con2unction o4
8eyword37 3e:uence o4 8eyword37 and even the cople5 natural
lan!ua!e 3eantic3 to produce hi!hly relevant 3earch re3ult3 and
,+ 3earch ran8in! that 3ort3 the 3earchin! re3ult3 accordin! to the
relevance criteria)
BIBILIOGRAPHYBIBILIOGRAPHY
-
8/18/2019 Fuzzy Final
44/45
B$($":85.
.B
-
8/18/2019 Fuzzy Final
45/45
3earche3 on reote encrypted data7H in Proc. of C&'*047 ,--)
IB R) Curtola7 J) A)