A Verifable Semantic Searching Scheme by Optimal

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Domain: Cloud computing

Technology: Java

A Verifiable Semantic Searching Scheme by Optimal Matching


Over Encrypted Data in Public Cloud

OBJECTIVE

The main objective of this project is “To provide retrieval service to arbitrary words so that
queries and search results are flexible. So, it provides verifiability and confidentiality towards
security analysis.”

ABSTRACT

The aim of this project is provide semantic searching over encrypted data is a crucial task for
secure information retrieval in public cloud. We propose a secure verifiable semantic
searching scheme for semantic optimal matching on ciphertext, we formulate Word
Transportation (WT) problem to calculate the Minimum Word Transportation Cost (MWTC)
as the similarity between queries and documents, So we propose a secure transformation to
transform WT problems into random Linear Programming (LP) problems to obtain the
encrypted MWTC for verifiability, we explore the duality theorem of LP to design a
verification mechanism using the intermediate data produced in matching process to verify
the correctness of search results. Security analysis demonstrates that our scheme can provide
the verifiability and confidentiality to provide high accuracy than other schemes.

Keywords

Secure semantic searching, verifiable searching, word transportation, public cloud.


Domain: Cloud computing
Technology: Java

EXISTING METHOD

A general limitation of traditional searchable encryption schemes is that they fail to utilize
semantic information among words to evaluate the relevance between queries and documents
to implement Secure Semantic Searching. Another is, Ranked Search over Encrypted Data,
Ranked search means the cloud server can calculate the relevance scores between the query
and each document, and then ranks the documents without leaking sensitive information. The
notion of single keyword ranked search was proposed in that used a modified one-to-many
Order-Preserving Encryption (OPE) to encrypt relevance scores and rank the encrypted
documents.

DisAdvantages

 No privacy.
 Search results are not flexible.
 Less confidentiality.

PROPOSED METHOD

The proposed scheme formulate the Word Transportation (WT) problem and propose a
secure transformation technique to transform WT problems into random Linear Programming
(LP) problems for obtaining the encrypted minimum word transportation cost as
measurements between queries and documents. For supporting verifiable searching, we
explore the duality theorem of LP and present a novel insight that using the intermediate data
produced in the matching process as proof to verify the correctness of search results.

BLOCK DIAGRAM
Domain: Cloud computing
Technology: Java

Advantages

 Plaintext retrieval.
 High secure.
 Verify the correctness of search results.

APPLICATIONS

 Word Transportation is useful in military applications.


 Semantic searching improves search accuracy by understanding the searcher's intent.

SYSTEM SPECIFICATION
Domain: Cloud computing
Technology: Java

Hardware System Configuration:-


 Processor - I3/Intel Processor
 RAM - 4GB (min)
 Hard Disk - 160GB

Software System Configuration:-


 Operating System : Windows 7/8/10
 Application Server : Tomcat 9.0
 Front End : HTML, JSP
 Scripts : JavaScript.

 Server side Script : Java Server Pages.

 Database : My SQL 6.0

 Database Connectivity : JDBC.

LEARNING OUTCOMES

 How optimal matching can be done?


 How to calculate the minimum word transportation cost?
 What is searchable encryption?
 How to use linear programming?
 Data base connections.
 Working Procedure.
 Use of HTML and CSS on UI Designs.
 Data Parsing Front-End to Back-End.
 Scope of Real Time Application Scenarios.
 What is a search engine and how browser can work?
 What is Tomcat server and how they can work?
 What type of technology versions is used?
 Need of Eclipse-IDE to develop a web application.
 Testing Techniques.
 Error Correction mechanisms.
Domain: Cloud computing
Technology: Java

 How to run and deploy the applications?


 Introduction to basic technologies used for.
 Input and Output modules.
 How test the project based on user inputs and observe the output?
 Project Development Skills:

o Problem analyzing skills.


o Problem solving skills.
o Creativity and imaginary skills.
o Programming skills.
o Deployment.
o Testing skills.
o Debugging skills.
o Project presentation skills.
o Thesis writing skills.

You might also like