PRIVACY

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

PRIVACY-PRESERVING MULTI-KEYWORD SEARCHABLE

ENCRYPTION FOR DISTRIBUTED SYSTEMS

OBJECTIVE:

The main aim of this project is to provide privacy or security for supporting multi-keyword

search under the multi-user setting, hiding search pattern and access pattern, and resisting

keyword guessing attacks (KGA) are the most challenging tasks. In this application, we

present a new searchable encryption scheme that addresses the above problems

simultaneously, which makes it practical to be adopted in distributed systems.

ABSTRACT:

As cloud storage has been widely adopted in various applications, how to protect data privacy

while allowing efficient data search and retrieval in a distributed environment remains a

challenging research problem. Existing searchable encryption schemes are still inadequate on

desired functionality and security/privacy perspectives. Specifically, supporting multi-

keyword search under the multi-user setting, hiding search pattern and access pattern, and

resisting keyword guessing attacks (KGA) are the most challenging tasks. In this application,

we present a new searchable encryption scheme that addresses the above problems

simultaneously, which makes it practical to be adopted in distributed systems. It not only

enables multi-keyword search over encrypted data under a multi-writer/multi reader setting

but also guarantees the data and search pattern privacy. We provide a subset decision

mechanism is also designed as the core technique underlying our scheme and can be further

used in applications other than keyword search. Finally, we prove the security and evaluate

the computational and communication efficiency of our scheme to demonstrate its

practicality

BLOCK DIAGRAM:

Domain: Cloud computing

Technology: Java

EXISTING SYSTEM:

The existing works, our multi-user access refers to accommodating both multiple writers (or
data owners) and multiple readers (or data users) simultaneously, which is important for

adoption in a distributed system. Also, by applying the multi-server architecture in the

searching/testing operation, search queries are handled with the assistance from multiple

parallel servers to accelerate the response and balance the workload, at the same time

Keyword Guessing Attack from the cloud storage server is effectively resisted. Moreover, the

trapdoor and the searchable ciphertext are delicately designed to achieve constant size.

DISADVANTAGES:

 Searching the stored documents takes time linear in the size of the database

 It uses heavy arithmetic operations

 Less security.

Domain: Cloud computing

Technology: Java

PROPOSED SYSTEM:

The proposed mechanism provides the basis for enabling multi-keyword search in a twosever

architecture. It may also be applied to other applications that require private subset testing.

epresent an SE-EPOM scheme based on the above subset decision mechanism. The proposed

scheme has the merits of supporting multi-user access, supporting multi-keyword search and

achieving data and search query privacy.

ADVANTAGES:

 Provides more security.

 It uses simple arithmetic operations.

 Storage capacity is high.

SYSTEM REQUIREMENTS

H/W System Configuration:-

 Processor - I3/Intel Processor

 RAM - 4GB (min)

 Hard Disk - 160GB

S/W System Configuration:-

 Operating System : Windows 7/8/10


 Application Server : Tomcat 9.0

 Front End : HTML, JSP

 Scripts : JavaScript.

 Server side Script : Java Server Pages.

 Database : My SQL 6.0

 Database Connectivity : JDBC

LEARNING OUTCOMES:

 Scope of Real Time Application Scenarios

Domain: Cloud computing

Technology: Java

 How Internet Works

 What is a search engine and how browser can work?

 What is Tomcat server and how they can work?

 What type of technology versions is used?

 Use of HTML and CSS on UI Designs

 Data Base Connections

 Data Parsing Front-End to Back-End

 Need of Eclipse-IDE to develop a web application

 Working Procedure

 Testing Techniques

 Error Correction mechanisms

 How to run and Deploy the applications

 Introduction to basic technologies used for

 How project works

 Input and Output modules

 How to test the project based on user inputs and observe the output

 MySQL insertion and MySQL database creation

 Practical exposure to software tools and solution providing for real time
problems working with team/ individual work on Creative ideas.

 How cloud computing works?

 Learn about types of algorithms and how to use?

 What is Public-key encryption?

 Practical exposure on

o Software tools.

o Solution providing for real time problems

o Working with team/ individual

o Creative and Imagination Skills

o Work on Creative ideas

Project Concept (Simplified):

In this project, you are developing a searchable encryption system designed for use in
cloud storage. The key challenge is to protect the privacy of both the stored data and the
search queries, especially when multiple people are using the system (both writers who
upload data and readers who search for it).

Key Problems Solved:

1. Multi-Keyword Search: Users can search using multiple keywords, making the
search more flexible and effective.
2. Multi-User Support: Multiple people can add (writers) and search (readers) data at
the same time.
3. Privacy Protection: The system hides the search and access patterns (i.e., which
documents are searched and accessed), making it harder for attackers to infer what
users are looking for.
4. Keyword Guessing Attack (KGA) Resistance: Prevents attackers from guessing
keywords based on the search queries.
5. Efficient and Secure: The system balances security and speed, allowing faster
searches without compromising privacy.

How It Works:

 Encrypted Data Storage: Data is stored in encrypted form so no one can read it
directly from the cloud.
 Trapdoor Mechanism: When a user performs a search, they create a special
"trapdoor" (encrypted search query) that allows the system to search the data without
revealing the keywords.
 Subset Decision Mechanism: A technique is used to check which documents match
the search query, without revealing which documents were searched or how they were
accessed.
Existing Systems (Problems):

 Existing systems handle searches slowly (time-consuming) and require complex


mathematical operations.
 These systems are vulnerable to attacks like keyword guessing and offer weaker
privacy protection.

Proposed System (Solutions):

 Your system uses simple arithmetic operations, making it faster and easier to
handle.
 It provides stronger security by protecting both data and search queries, and it can
handle more storage.

Key Learning Outcomes:

 Real-Time Cloud Application: You learn how cloud storage and encryption can
work together to protect data.
 Technologies: Explore Java, MySQL, Tomcat server, HTML, JSP for web
interfaces, and how to connect databases using JDBC.
 Internet and Web Technologies: Understand how browsers and search engines
work, and how web servers like Tomcat handle web applications.
 Teamwork and Creativity: Practical experience with team collaboration and solving
real-world problems.

This project offers insights into secure cloud storage, encryption techniques, and the
development of distributed systems using Java.

You might also like