Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 13

MULTIPLE KEYWORD SEARCH

IN CLOUD DATA
Agenda
 Abstract
 Problem Statement
 Introduction
 Motivation
 Objective
 Literature survey
 Overview Diagram
 Hardware and Software
 References

2
ABSTRACT
 Due to usage of cloud the size of the data is
tremendous
Searching the required data in the huge repository
based on single query word is not enough to provide
efficient results
Using of multi-keyword search enables the search
results in the cloud
Deploying the multi-keyword search in cloud real
time cloud by using the AWS RDS and bucket
enriching the process of results

3
PROBLEM STATEMENT
To enhance the process of multi key word search
the proposed model uses the AWS bucket and
AWS RDS to search the query using k-top result
functionality efficiently

4
INTRODUCTION
 Cloud Computing Storage
 AWS RDS
 AWS S3 Bucket
 Problems in Single keyword search
 Multi-keyword search

5
MOTIVATION
 Cloud Computing Storage enables us to retrieves
huge results for a query
 Single keyword search does not provide efficient
results
 Deploying of multi-keyword search enhances the
search results
 Deploying multi-keyword search pattern in real
time is a challenging task

6
OBJECTIVES
 To efficiently store the data in real time S3
Bucket through the application
 To efficiently perform the multi keyword
search
 To efficiently mange the search results in a
list for k-top labels
 To efficiently process the search results for
proper filtering

7
LITERATURE SURVEY
Paper Author Methodology
Efficient Ranked Multi-Keyword Jianfei Sun , In this paper a novel efficient ranked multi-keyword
Retrieval With Privacy Protection Shengnan Hu, Xuyun retrieval scheme with keyword privacy for multiple data
for Multiple Data Owners in owners, which empowers the cloud server to perform
Nie , and Joojo
Cloud Computing multi keyword search over the cloud data and then, return
Walker the top-k ranked search results to data users without
leaking any keyword and trapdoor information.
Additionally, we show through rigorous security analysis
that our scheme is secure against the attacks launched by
inside attackers and outside attackers. Finally, the
performance evaluation indicates that our scheme has
more satisfactory features than the existing ranked multi-
keyword search schemes

8
LITERATURE SURVEY
Paper Author Methodology
Threshold Multi-keyword Yinbin Miao, Robert H. A simple TMS approach for cloud-based
Search for Cloud-Based Deng, Fellow Kim- group data sharing using Shamir's secret
Group Data Sharing Kwang Raymond Choo, sharing strategy for threshold multi-
Ximeng Liu, Hongwei Li keyword search, decryption, and short
record ciphertext size is shown in this
study. The core TMS is improved for
threshold result verification and
traceability. The TMS now offers dynamic
operations and public result verification
utilizing the public verifier and improved
hash tables.Our formal security research
indicates that basic and upgraded TMS are
semi-adaptive and CKA-resistant.
Theories and experiments demonstrate
both methods have potential.

9
LITERATURE SURVEY
Paper Author Methodology
Multifeature Fusion Keyword WENMING GUO In this paper the BSKT method optimizes
Extraction Algorithm Based on ZIHAO WANG Text Rank word graph iteration by calculating
TextRank AND FANG HAN semantic difference using BERT pertaining
model word vectors. K-Truss graph and word
truss level are obtained by decomposing the
Text Rank word graph with the BSKT
method. IDF and truss level data are used by
the BSKT algorithm to extract keywords.
Recent trials show that BSKT extracts 1-10
keywords better than SCTR. Using BSKT to
extract three keywords from the Sensor
dataset increased F1 by 11.2%.

10
OVERVIEW DIAGRAM

11
HARDWARE AND
SOFTWARE
Minimum Hardware Specification :
( 1 Machine is Required of the Following Configurations)
CPU : Core i5
RAM : 8 GB
HDD : 500 GB

Software Specification:
Coding Language : Java
Development Kit : JDK 8.2
Front End : Swing Framework
Development IDE : NetBeans 8.2
Cloud Database : AWS RDS
Cloud Storage : AWS S3

12
REFERENCES
 Jianfei Sun , Shengnan Hu, Xuyun Nie , and Joojo Walker, “Efficient Ranked Multi-Keyword
Retrieval With Privacy Protection for Multiple Data Owners in Cloud Computing” This article
has been accepted for inclusion in a future issue of this journal. Content is final as presented,
with the exception of pagination.
 Yinbin Miao, Robert H. Deng, Kim-Kwang Raymond Choo, Senior Member,Ximeng Liu, and
Hongwei Li, “Threshold Multi-keyword Search for Cloud-Based Group Data Sharing” This
article has been accepted for publication in a future issue of this journal, but has not been fully
edited. Content may change prior to final publication. Citation information: DOI
10.1109/TCC.2020.2999775, IEEE Transactions on Cloud Computing
 Lei Shang and Fucheng you, “Research On Tag Recommendation Based On Multiple
Keywords”School of information engineering,Beijing Institute Of Graphic
Communication ,Beijing 100029,china corresponding email:820596518@qq.com

13

You might also like