SlideShare a Scribd company logo
Privacy-Preserving Multi-keyword Top-k Similarity Search
Over Encrypted Data
ABSTRACT:
Cloud computing provides individuals and enterprises massive computing power
and scalable storage capacities to support a variety of big data applications in
domains like health care and scientific research, therefore more and more data
owners are involved to outsource their data on cloud servers for great convenience
in data management and mining. However, data sets like health records in
electronic documents usually contain sensitive information, which brings about
privacy concerns if the documents are released or shared to partially untrusted
third-parties in cloud. A practical and widely used technique for data privacy
preservation is to encrypt data before outsourcing to the cloud servers, which
however reduces the data utility and makes many traditional data analytic operators
like keyword-based top-k document retrieval obsolete. In this paper, we investigate
the multi-keyword top-k search problem for big data encryption against privacy
breaches, and attempt to identify an efficient and secure solution to this problem.
Specifically, for the privacy concern of query data, we construct a special tree-
based index structure and design a random traversal algorithm, which makes even
the same query to produce different visiting paths on the index, and can also
maintain the accuracy of queries unchanged under stronger privacy. For improving
the query efficiency, we propose a group multi-keyword top-k search scheme
based on the idea of partition, where a group of tree-based indexes are constructed
for all documents. Finally, we combine these methods together into an efficient
and secure approach to address our proposed top-k similarity search. Extensive
experimental results on real-life data sets demonstrate that our proposed approach
can significantly improve the capability of defending the privacy breaches, the
scalability and the time efficiency of query processing over the state-of-the-art
methods.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1GB.
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7.
 Coding Language : ASP.NET,C#.NET
 Tool : Visual Studio 2008
 Database : SQL SERVER 2005
REFERENCE:
Xiaofeng Ding, Member, IEEE, Peng Liu and Hai Jin, Senior Member, IEEE,
“Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted
Data”, IEEE Transactions onDependable and Secure Computing, 2019.

More Related Content

DOCX
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
JAYAPRAKASH JPINFOTECH
 
DOCX
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
CloudTechnologies
 
PPTX
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Dakshineshwar Swain
 
PDF
9 facts about statice's data anonymization solution
Statice
 
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Shakas Technologies
 
DOCX
A secure and dynamic multi keyword ranked
jpstudcorner
 
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
LeMeniz Infotech
 
DOCX
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
I3E Technologies
 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
JAYAPRAKASH JPINFOTECH
 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
CloudTechnologies
 
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Dakshineshwar Swain
 
9 facts about statice's data anonymization solution
Statice
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Shakas Technologies
 
A secure and dynamic multi keyword ranked
jpstudcorner
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
LeMeniz Infotech
 
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
I3E Technologies
 

What's hot (19)

PPTX
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
sharathdj
 
PPTX
Final 1st
gokulprema
 
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Pvrtechnologies Nellore
 
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
 
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
CloudTechnologies
 
PPT
Privacy preserving multi-keyword ranked search over encrypted cloud data
Papitha Velumani
 
DOCX
Privacy preserving multi-keyword ranked search over encrypted cloud data
Nexgen Technology
 
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Nexgen Technology
 
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
PPTX
Data Visibility and Protection at the Scale of Life Sciences
Adam Marko
 
DOCX
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Ba...
JAYAPRAKASH JPINFOTECH
 
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
 
DOCX
privacy preserving multi keyword ranked search over encrypted cloud data
swathi78
 
PDF
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET Journal
 
DOCX
Enabling secure and efficient ranked keyword
IMPULSE_TECHNOLOGY
 
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
Shakas Technologies
 
PDF
A secure and dynamic multi
Shakas Technologies
 
PDF
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Swathi Rampur
 
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
sharathdj
 
Final 1st
gokulprema
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Pvrtechnologies Nellore
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
CloudTechnologies
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Papitha Velumani
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Nexgen Technology
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Nexgen Technology
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
Data Visibility and Protection at the Scale of Life Sciences
Adam Marko
 
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Ba...
JAYAPRAKASH JPINFOTECH
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
 
privacy preserving multi keyword ranked search over encrypted cloud data
swathi78
 
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET Journal
 
Enabling secure and efficient ranked keyword
IMPULSE_TECHNOLOGY
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Shakas Technologies
 
A secure and dynamic multi
Shakas Technologies
 
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Swathi Rampur
 
Ad

Similar to Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data (20)

PDF
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal
 
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
nexgentechnology
 
DOCX
A secure and dynamic multi keyword ranked
nexgentech15
 
PDF
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET Journal
 
PDF
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
 
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
Papitha Velumani
 
DOCX
Towards secure multi keyword top-k retrieval over encrypted cloud data
JPINFOTECH JAYAPRAKASH
 
PDF
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
IJERA Editor
 
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
Papitha Velumani
 
PPTX
Tees an efficient search scheme over
Kumar Dlk
 
PDF
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTION...
Nexgen Technology
 
PDF
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
iosrjce
 
PDF
O01761103112
IOSR Journals
 
PDF
Retrieving Secure Data from Cloud Using OTP
AM Publications
 
PDF
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ASAITHAMBIRAJAA
 
PDF
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ASAITHAMBIRAJAA
 
PDF
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
hemanthbbc
 
PDF
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
IRJET Journal
 
PDF
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET Journal
 
PDF
Efficient Similarity Search Over Encrypted Data
IRJET Journal
 
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
nexgentechnology
 
A secure and dynamic multi keyword ranked
nexgentech15
 
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET Journal
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Papitha Velumani
 
Towards secure multi keyword top-k retrieval over encrypted cloud data
JPINFOTECH JAYAPRAKASH
 
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
IJERA Editor
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Papitha Velumani
 
Tees an efficient search scheme over
Kumar Dlk
 
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTION...
Nexgen Technology
 
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
iosrjce
 
O01761103112
IOSR Journals
 
Retrieving Secure Data from Cloud Using OTP
AM Publications
 
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ASAITHAMBIRAJAA
 
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ASAITHAMBIRAJAA
 
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
hemanthbbc
 
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
IRJET Journal
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET Journal
 
Efficient Similarity Search Over Encrypted Data
IRJET Journal
 
Ad

More from JAYAPRAKASH JPINFOTECH (20)

PDF
Java Web Application Project Titles 2023-2024.pdf
JAYAPRAKASH JPINFOTECH
 
PDF
Dot Net Final Year IEEE Project Titles.pdf
JAYAPRAKASH JPINFOTECH
 
PDF
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
JAYAPRAKASH JPINFOTECH
 
PDF
Python IEEE Project Titles 2023 - 2024.pdf
JAYAPRAKASH JPINFOTECH
 
PDF
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
JAYAPRAKASH JPINFOTECH
 
DOCX
Spammer detection and fake user Identification on Social Networks
JAYAPRAKASH JPINFOTECH
 
DOCX
Sentiment Classification using N-gram IDF and Automated Machine Learning
JAYAPRAKASH JPINFOTECH
 
DOCX
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
JAYAPRAKASH JPINFOTECH
 
DOCX
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
JAYAPRAKASH JPINFOTECH
 
DOCX
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
JAYAPRAKASH JPINFOTECH
 
DOCX
Crop Yield Prediction and Efficient use of Fertilizers
JAYAPRAKASH JPINFOTECH
 
DOCX
Collaborative Filtering-based Electricity Plan Recommender System
JAYAPRAKASH JPINFOTECH
 
DOCX
Achieving Data Truthfulness and Privacy Preservation in Data Markets
JAYAPRAKASH JPINFOTECH
 
DOCX
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
JAYAPRAKASH JPINFOTECH
 
DOCX
Towards Fast and Reliable Multi-hop Routing in VANETs
JAYAPRAKASH JPINFOTECH
 
DOCX
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
JAYAPRAKASH JPINFOTECH
 
DOCX
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
JAYAPRAKASH JPINFOTECH
 
DOCX
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
JAYAPRAKASH JPINFOTECH
 
DOCX
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
JAYAPRAKASH JPINFOTECH
 
DOCX
Node-Level Trust Evaluation in Wireless Sensor Networks
JAYAPRAKASH JPINFOTECH
 
Java Web Application Project Titles 2023-2024.pdf
JAYAPRAKASH JPINFOTECH
 
Dot Net Final Year IEEE Project Titles.pdf
JAYAPRAKASH JPINFOTECH
 
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
JAYAPRAKASH JPINFOTECH
 
Python IEEE Project Titles 2023 - 2024.pdf
JAYAPRAKASH JPINFOTECH
 
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
JAYAPRAKASH JPINFOTECH
 
Spammer detection and fake user Identification on Social Networks
JAYAPRAKASH JPINFOTECH
 
Sentiment Classification using N-gram IDF and Automated Machine Learning
JAYAPRAKASH JPINFOTECH
 
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
JAYAPRAKASH JPINFOTECH
 
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
JAYAPRAKASH JPINFOTECH
 
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
JAYAPRAKASH JPINFOTECH
 
Crop Yield Prediction and Efficient use of Fertilizers
JAYAPRAKASH JPINFOTECH
 
Collaborative Filtering-based Electricity Plan Recommender System
JAYAPRAKASH JPINFOTECH
 
Achieving Data Truthfulness and Privacy Preservation in Data Markets
JAYAPRAKASH JPINFOTECH
 
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
JAYAPRAKASH JPINFOTECH
 
Towards Fast and Reliable Multi-hop Routing in VANETs
JAYAPRAKASH JPINFOTECH
 
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
JAYAPRAKASH JPINFOTECH
 
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
JAYAPRAKASH JPINFOTECH
 
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
JAYAPRAKASH JPINFOTECH
 
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
JAYAPRAKASH JPINFOTECH
 
Node-Level Trust Evaluation in Wireless Sensor Networks
JAYAPRAKASH JPINFOTECH
 

Recently uploaded (20)

DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PPTX
Virus sequence retrieval from NCBI database
yamunaK13
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PPTX
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
PDF
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PDF
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
PDF
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
Virus sequence retrieval from NCBI database
yamunaK13
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
How to Apply for a Job From Odoo 18 Website
Celine George
 
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 

Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data

  • 1. Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data ABSTRACT: Cloud computing provides individuals and enterprises massive computing power and scalable storage capacities to support a variety of big data applications in domains like health care and scientific research, therefore more and more data owners are involved to outsource their data on cloud servers for great convenience in data management and mining. However, data sets like health records in electronic documents usually contain sensitive information, which brings about privacy concerns if the documents are released or shared to partially untrusted third-parties in cloud. A practical and widely used technique for data privacy preservation is to encrypt data before outsourcing to the cloud servers, which however reduces the data utility and makes many traditional data analytic operators like keyword-based top-k document retrieval obsolete. In this paper, we investigate the multi-keyword top-k search problem for big data encryption against privacy breaches, and attempt to identify an efficient and secure solution to this problem. Specifically, for the privacy concern of query data, we construct a special tree- based index structure and design a random traversal algorithm, which makes even the same query to produce different visiting paths on the index, and can also maintain the accuracy of queries unchanged under stronger privacy. For improving the query efficiency, we propose a group multi-keyword top-k search scheme based on the idea of partition, where a group of tree-based indexes are constructed for all documents. Finally, we combine these methods together into an efficient
  • 2. and secure approach to address our proposed top-k similarity search. Extensive experimental results on real-life data sets demonstrate that our proposed approach can significantly improve the capability of defending the privacy breaches, the scalability and the time efficiency of query processing over the state-of-the-art methods. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED  Input Devices : Keyboard, Mouse  Ram : 1GB. SOFTWARE REQUIREMENTS:  Operating system : Windows 7.  Coding Language : ASP.NET,C#.NET  Tool : Visual Studio 2008  Database : SQL SERVER 2005 REFERENCE:
  • 3. Xiaofeng Ding, Member, IEEE, Peng Liu and Hai Jin, Senior Member, IEEE, “Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data”, IEEE Transactions onDependable and Secure Computing, 2019.