Efficient Encrypted Data Search as
A Mobile Cloud Service
Abstract:




ALGORITHMS:
FAH ALGORITHM: FAST ACCUMULATED
HASHING
A new no trapdoor accumulator for
cumulative hashing is introduced. It can be efficiently realized in practise
using existing cryptographic hash algorithms and pseudorandom sequence
generators. The memory requirement is less than in comparable signature based
solutions.
RSS ALGORITHM: RANKED
SERIAL SEARCH.
Cryptography is a method of storing and transmitting data in
a particular form so that only those for
whom it is intended can read and process it.


ciphertext
is then back again (known as decryption). Individuals who
practice this field are known as cryptographers.
.RSBS ALGORITHM: RANKED
SERIAL BINARY SEARCH.


SYSTEM ANALYSIS
EXISTING SYSTEM:



PROPOSED SYSTEM:



Advantages:



FLOW
DIAGRAM:

Cloud Computing:
Cloud
computing is a
computing term or metaphor that evolved in the late 1900s, based on utility and consumption of computer resources.
Cloud computing involves deploying groups of remote servers and software networks that allow different
kinds of data sources be uploaded for real time processing to generate
computing results without the need to store processed data on the cloud. Clouds
can be classified as public, private or hybrid.
Encryption
and Decryption
Encryption
In an encryption scheme, the message or
information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an
unreadable cipher
text (ibid.). This is usually done with the
use of an encryption key, which specifies how the
message is to be encoded. Any adversary that can see the cipher text, should
not be able to determine anything about the original message.
Decryption
An
authorized party, however, is able to decode the ciphertext using a decryption algorithm, that usually
requires a secret decryption key, That adversaries do not
have access to. For technical reasons, an encryption scheme usually needs a
key-generation algorithm, to randomly produce keys
Hence, it is an
especially important thing to explore an effective multi-keyword ranked
searching service over encrypted outsourced data.
MODULE DESCRIPTION:




To evaluate the EnDAS
system, we implemented our system on the private cloud with Openstack Essex
[19] from our lab. We rented a virtual machine with 8G memory for the cloud. We
also implemented the RSBS algorithm, written as a python program, to search and
return the retrieved documents to the user. Here, the user utilized a mobile
device utilized an Android tablet with a Cortex- A9 Quad 1.4GHz CPU, and 2GB
memory. The tablet is connected to a mobile network with 72Mbps rate. The
trapdoor mapping table is pre-computed on a PC and uploaded to the mobile
device before experiments, which consumes 0.31MB of device storage.

To reduce the search time and improve the calculation
efficiency, we utilized the TMT module and the RSBS algorithm in the EnDAS
system. In this part, we first evaluate the overall search time and its
breakdown. Then we present the performance or the RSBS algorithm in terms of
the search time

EnDAS system, which benefits from the trapdoor compression
method and the TMT module, we reduced network traffic significantly. Next we
evaluate and analyze the overall system network traffic reduction and the
performance of the trapdoor compression method.
SYSTEM SPECIFICATION
Hardware Requirements:
v System : Pentium IV 2.4 GHz.
v Hard Disk
: 40 GB.
v Floppy Drive :
1.44 Mb.
v Monitor
: 14’ Colour Monitor.
v Mouse : Optical Mouse.
v Ram :
512 Mb.
Software Requirements:
v Operating system : Windows 7 Ultimate.
v Coding Language : ASP.Net with C#
v Front-End : Visual Studio 2010 Professional.
v Data Base : SQL Server 2008.
Comments
Post a Comment