Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
RAHUL . R
GUIDED BY:
Ms.T . BAVITHRADEVI
ABSTRACT
For ranked search in encrypted cloud data, order preserving encryption (OPE) is an
efficient tool to encrypt relevance scores of the inverted index. When using deterministic
OPE, the ciphertexts will reveal the distribution of relevance scores.
We proposed a probabilistic OPE, called One-to-Many OPE, for applications of searchable
ordered ciphertexts.
The experimental results show that the cloud server can get a good estimate of the
LITERATURE SURVEY
P. Mell and T. Grance, The NIST definition of cloud computing,
S. Subashini and V. Kavitha, A survey on security issues in service
EXISTING SYSTEM
Existing and new algorithms for assigning anonymous IDs are examined
DISADVANTAGES
The problem of sharing privately held data so that the individuals who are
PROPOSED SYSTEM
An algorithm for anonymous sharing of private data among parties is
ADVANTAGES
The anonymity of DB is not affected by inserting the records.
We provide security proofs and experimental results for both
protocols.
That task restricts the level to which can be practically raised.
We show in detail how to obtain the average number of
Login
Store
Login
Admin
DB
Add/Delete Product
Change Product
Details
Select Product
Customer
Store Payment
Details
View Products by
Search
Search Products
Security Transcation
Feed back
View
Add To Cart
Payment
View Payments
PROPOSED ALGORITHM
Early we use Textual passwords as a security but these
PROPOSED ALGORITHM
EXPLANATION
Thus we proposed a session password scheme in which the
passwords are used only once for each and when session is
terminated the password is no longer in use. The proposed of
session password scheme uses Text and colors for generating
session password. Two session password schemes are used
Hybrid Textual Authentication Scheme and Pair-based
Authentication scheme.
PROPOSED ALGORITHM
EXPLANATION
Authentication is provided by using two new techniques i.e.
pair based authentication scheme, hybrid textual authentication
scheme.
The user has to select the authentication scheme at a time of
login.
In a pair based scheme Textual passwords are provided and in
HARDWARE CONFIGURATION
Processor
Pentium IV
RAM
512MB
Monitor size
17SVGA
Hard Disk
80 GB
Extra Device
CD-ROM 52x
Keyboard
Mouse
Optical
SOFTWARE CONFIGURATION
Operating System :
Windows XP Professional/7
Environment
.Net Framework
Version 4.0
Language
C#
Web Technology
Web Server
Back End
MODULES
Online Shopping
Textual Authentication Scheme
Hybrid Textual Authentication
Textual Authentication
Scheme
Module
Within this online shopping application we are
Hybrid Textual
Authentication Scheme
Module