PRIVACY
PRIVACY
PRIVACY
OBJECTIVE:
The main aim of this project is to provide privacy or security for supporting multi-keyword
search under the multi-user setting, hiding search pattern and access pattern, and resisting
keyword guessing attacks (KGA) are the most challenging tasks. In this application, we
present a new searchable encryption scheme that addresses the above problems
ABSTRACT:
As cloud storage has been widely adopted in various applications, how to protect data privacy
while allowing efficient data search and retrieval in a distributed environment remains a
challenging research problem. Existing searchable encryption schemes are still inadequate on
keyword search under the multi-user setting, hiding search pattern and access pattern, and
resisting keyword guessing attacks (KGA) are the most challenging tasks. In this application,
we present a new searchable encryption scheme that addresses the above problems
enables multi-keyword search over encrypted data under a multi-writer/multi reader setting
but also guarantees the data and search pattern privacy. We provide a subset decision
mechanism is also designed as the core technique underlying our scheme and can be further
used in applications other than keyword search. Finally, we prove the security and evaluate
practicality
BLOCK DIAGRAM:
Technology: Java
EXISTING SYSTEM:
The existing works, our multi-user access refers to accommodating both multiple writers (or
data owners) and multiple readers (or data users) simultaneously, which is important for
searching/testing operation, search queries are handled with the assistance from multiple
parallel servers to accelerate the response and balance the workload, at the same time
Keyword Guessing Attack from the cloud storage server is effectively resisted. Moreover, the
trapdoor and the searchable ciphertext are delicately designed to achieve constant size.
DISADVANTAGES:
Searching the stored documents takes time linear in the size of the database
Less security.
Technology: Java
PROPOSED SYSTEM:
The proposed mechanism provides the basis for enabling multi-keyword search in a twosever
architecture. It may also be applied to other applications that require private subset testing.
epresent an SE-EPOM scheme based on the above subset decision mechanism. The proposed
scheme has the merits of supporting multi-user access, supporting multi-keyword search and
ADVANTAGES:
SYSTEM REQUIREMENTS
Scripts : JavaScript.
LEARNING OUTCOMES:
Technology: Java
Working Procedure
Testing Techniques
How to test the project based on user inputs and observe the output
Practical exposure to software tools and solution providing for real time
problems working with team/ individual work on Creative ideas.
Practical exposure on
o Software tools.
In this project, you are developing a searchable encryption system designed for use in
cloud storage. The key challenge is to protect the privacy of both the stored data and the
search queries, especially when multiple people are using the system (both writers who
upload data and readers who search for it).
1. Multi-Keyword Search: Users can search using multiple keywords, making the
search more flexible and effective.
2. Multi-User Support: Multiple people can add (writers) and search (readers) data at
the same time.
3. Privacy Protection: The system hides the search and access patterns (i.e., which
documents are searched and accessed), making it harder for attackers to infer what
users are looking for.
4. Keyword Guessing Attack (KGA) Resistance: Prevents attackers from guessing
keywords based on the search queries.
5. Efficient and Secure: The system balances security and speed, allowing faster
searches without compromising privacy.
How It Works:
Encrypted Data Storage: Data is stored in encrypted form so no one can read it
directly from the cloud.
Trapdoor Mechanism: When a user performs a search, they create a special
"trapdoor" (encrypted search query) that allows the system to search the data without
revealing the keywords.
Subset Decision Mechanism: A technique is used to check which documents match
the search query, without revealing which documents were searched or how they were
accessed.
Existing Systems (Problems):
Your system uses simple arithmetic operations, making it faster and easier to
handle.
It provides stronger security by protecting both data and search queries, and it can
handle more storage.
Real-Time Cloud Application: You learn how cloud storage and encryption can
work together to protect data.
Technologies: Explore Java, MySQL, Tomcat server, HTML, JSP for web
interfaces, and how to connect databases using JDBC.
Internet and Web Technologies: Understand how browsers and search engines
work, and how web servers like Tomcat handle web applications.
Teamwork and Creativity: Practical experience with team collaboration and solving
real-world problems.
This project offers insights into secure cloud storage, encryption techniques, and the
development of distributed systems using Java.