Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Batch No:15MP19
External Guide: S Santhosh S Keerthi
Internal Guide: G Divya 15321A0532
T Manisha
15321A0542
Contents
A . Introduction
Project Scope
Existing System & Disadvantages
Proposed System & Advantages
B . Requirement Analysis
Functional Requirements
Non Functional Requirements
Computational Resources
C. Life Cycle Model
D. Architecture
Software Architecture
Technical Architecture
E. Design
Objective
Design Diagrams
DB Specifications
F. References
INTRODUCTION
Project Scope:
Aim:
The aim of the project is to design a secure, easily integrated, and fine-grained query
results verification mechanism, by which, given an encrypted query results set, the
query user not only can verify the correctness of each data file but also can verify
which qualified data files are not returned.
EXISTING SYSTEM AND DISADVANTAGES
EXISTING SYSTEM:
• Existing system makes use of a practical technique that allows users to search
over encrypted data through encrypted query keywords.
.
DISADVANTAGES:
• Data User will not know what all data files are returned.
PROPOSED SYSTEM AND ADVANTAGES
PROPOSED SYSTEM:
• The proposed system describes the verifiable secure search system model ,threat
model and design a fine grained query results verification scheme for secure
keyword search over encrypted cloud data.
• It makes use of symmetric key and public-key setting to strengthen security and
improve query efficiency
ADVANTAGES:
• Economic Feasibility: The developed system is within the budget and this was
achieved because most of the technologies used are freely available.
• Efficiency: This application is efficient to handle many users at the same time.
• JDK 1.2
• Mysql
• Mysql Connector
Hardware Requirements:
• Hard Disk : 1 TB
• RAM : 4 GB
LIFE CYCLE MODEL
ARCHITECTURE
SYSTEM ARCHITECTURE
TECHNICAL ARCHITECTURE
DESIGN
Objective:
Design Diagrams
Class Diagram:
Sequence Diagram
Use Case Diagram:
Data Owner Activity Diagram:
login
no
if valid,yes
login
no
if valid, yes
view Files request Access to file to data owner recieve trapdoor key and verification object decrypt and download file
Cloud Admin Activity Diagram:
login
no
if valid, yes
• W. Zhang, S.Xiao, Y. Lin, J. Wu, and S. Zhou, “Privacy preserving ranked multi-
keyword search for multiple data owners in cloud
computing,” IEEE Transactions on Computers, vol. 65, no. 5, pp. 1566–1577, May
2016.
• L. Fan, P. Cao, J. Almeida, and A. Z. Broder, “Summary cache: A scalable wide area
web cache sharing protocal,” in ACM SIGCOMM, 1998, pp. 254–265.