0% found this document useful (0 votes)
40 views8 pages

Secure Similarity Search in Encrypted Data

The document is a dissertation report submitted by Seema for the Master of Technology in Computer Science and Engineering at Visvesvaraya Technological University, focusing on 'Secure similarity search over Encrypted Non-Uniform Datasets.' It discusses the challenges of data privacy in cloud computing and proposes a solution using searchable symmetric encryption (S-SE) to enable effective similarity searches on encrypted datasets. The report includes acknowledgments, an abstract, and a detailed index of the content covered.

Uploaded by

B Bvish
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views8 pages

Secure Similarity Search in Encrypted Data

The document is a dissertation report submitted by Seema for the Master of Technology in Computer Science and Engineering at Visvesvaraya Technological University, focusing on 'Secure similarity search over Encrypted Non-Uniform Datasets.' It discusses the challenges of data privacy in cloud computing and proposes a solution using searchable symmetric encryption (S-SE) to enable effective similarity searches on encrypted datasets. The report includes acknowledgments, an abstract, and a detailed index of the content covered.

Uploaded by

B Bvish
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

Jnana Sangama, Belagavi-590018

2023-2024
A Dissertation Report on

“Secure similarity search over Encrypted Non-Uniform


Datasets”
Submitted in partial fulfillment of the requirements for the award of degree

MASTER OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING

Submitted By
Seema
(3RB20SCS10)

Under the guidance of


Prof. More Vishal Ramrao
Department of CSE

BHEEMANNA KHANDRE INSTITUTE OF TECHNOLOGY


DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
BHALKI-585 328
Shanti Vardhak Education Society’s
BHEEMANNA KHANDRE INSTITUTE OF TECHNOLOGY BHALKI-585 328
(Approved by AICTE and Govt. Karnataka Affilated to VTU Belagavi, Accredited by NBA New Delhi)
DEPARTMENT OF COMPUTER SCIENCE AND ENGNEERING

CERTIFICATE
This is to certify that the project work entitled “Secure similarity search over
Encrypted Non-Uniform Datasets” has been successfully carried out by Seema
(3RB20SCS10) in partial fulfillment of the requirements for the award of
degree of Master of Technology in Computer Science and Engineering of
Visvesvaraya Technological University, Belagavi, during the academic year 2023-
2024. It is certified that all corrections/suggestions indicated for Internal
Assessment have been incorporated in report deposited in departmental library. The
project has been approved as it satisfies the academic requirements in respect of
project work prescribed for the Master of Technology.
Shanti Vardhak Education Society’s
BHEEMANNA KHANDRE INSTITUTE OF TECHNOLOGY, BHALKI
DEPARTMENT OF COMPUTER SCIENCE AND ENGNEERING

DECLARATION
I, Seema (3RB20SCS10) student of [Link] 4th sem in the Department of Computer
Science and Engineering, Bheemanna Khandre Institute of Technology, Bhalki declare that
the Project works entitled “Secure similarity search over Encrypted Non-Uniform
Datasets” has been carried out by me and submitted in partial fulfillment of the course
requirements for the award of degree in Master of Technology in Computer Science and
Engineering of Visvesvaraya Technological University, Belgaum during the academic
year 2023-2024. The matter embodied in this report has not been submitted to any other
university or institution for the award of any other degree.

Place : Bhalki
Date :

Seema (3RB20SCS10)
Acknowledgement
First and foremost, I am grateful to my Project Guide Prof. More Vishal Ramrao

Computer Science & Engineering Department for his particularly important technical

reviews, valuable suggestions & positive criticism. We experienced an enthusiastic interest

from his side which fueled our enthusiasm to go even further and encouraged us

immensely. I learnt a lot under his guidance.

I take this opportunity to express my sincere thanks to our Head of the Department

(HOD) Dr. Sangamesh Kalyane and Principal, Dr. Udaykumar Kalyane for providing

such a congenial working environment & access to resources in the department.

All the Staff Members of Computer science and Engineering Dept. deserves thanks

for their positive & valuable feedback at all times.

Last but definitely not the least, I would like to thank all of my teachers, including

my parents, for all that they have ever taught me; and for working long hours to make this

project a success.

Seema (3RB20SCS10)
ABSTRACT

In current years, the business world has given cloud computing a high level of importance, and
as a effect, a selection of cloud computing platform-based services have been launched. Several
data-sets have been store on isolated cloud servers Both the owner of the data and the user of the
data can avoid the onerous administration of the data at the local level thanks to remote storage.
Furthermore, the remote storage's instant function provides a more user-friendly service. In the
case of this type of service, however, the cloud server has access not only to the data but also to
the queries that are sent. As a result, there are serious concerns about the data's privacy and
security. To avoid the problems described above, data owners frequently choose to encrypt their
datasets before storing them on cloud servers. However, similarity search strategies that worked
well on the plaintext dataset are useless when applied to the encrypted dataset. S-SE [1,] or
searchable symmetric encryption, is a suggested solution.

If required, the underlying AB-KS-SM structure may be employed to help with recognition, as
demonstrated. After a rigorous security evaluation, the AB-KS-SM frameworks were discovered
to give specific security and foil a detached keyword guess attack in the non-exclusive bilinear
assembly model. Furthermore, the usefulness of the ABKS-SM frameworks was shown by
analyzing their performance on a test-bed with 11 portable mortals and a superior workstation,
which comprised three real-world data sets.
INDEX
1. INTRODUCTION 01

1.1 Problem statement 01

1.2 Existing System 02

1.3 Proposed System 02

2. LITERATURE SURVEY 04

3. TECHNOLOGY 07

3.1 User 09

3.2 Functional Conditions 10

3.3 Requirements That Are Not Functional 10

4. SYSTEM DESIGN 11

5. SCREEN SHOTS 17

6. SOFTWARE TESTING 22

7. CONCLUSION 26

REFERENCES 27
REFERENCES
[1] Y. Tang, C. Zhang, R. Gu, P. Li, and B. Yang, “Vehicle detection and recognition for
intelligent traffic surveillance system,” Multimedia tools and applications, vol. 76, no. 4, pp.
5817–5832, 2017.
[2] G. Chen, T. X. Han, Z. He, R. Kays, and T. Forrester, “Deep convolutional neural network
based species recognition for wild animal monitoring,” in 2014 IEEE International
Conference on Image Processing (ICIP). IEEE, 2014, pp. 858–862.
[3] C. Zhang, H. Li, X. Wang, and X. Yang, “Cross-scene crowd counting via deep
convolutional neural networks,” in Proceedings of the IEEE conference on computer vision
and pattern recognition, 2015, pp. 833– 841.
[4] L. Xiao, Y. Li, X. Huang, and X. Du, “Cloud-based malware detection game for mobile
devices with offloading,” IEEE Transactions on Mobile Computing, vol. 16, no. 10, pp.
2742–2750, 2017.
[5] F. Mireshghallah, M. Taram, P. Ramrakhyani, A. Jalali, D. Tullsen, and H. Esmaeilzadeh,
“Shredder: Learning noise distributions to protect inference privacy,” in Proceedings of the
Twenty-Fifth International Conference on Architectural Support for Programming Languages
and Operating Systems, 2020, pp. 3–18.
[6] Z. He, T. Zhang, and R. Lee, “Sensitive-sample fingerprinting of deep neural networks,” in
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019, pp.
4729–4737.
[7] J. Hauswald, T. Manville, Q. Zheng, R. Dreslinski, C. Chakrabarti, and T. Mudge, “A hybrid
approach to offloading mobile image classification,” in 2014 IEEE International Conference
on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2014, pp. 8375–8379.
[8] Y. Kang, J. Hauswald, C. Gao, A. Rovinski, T. Mudge, J. Mars, and L. Tang, “Neurosurgeon:
Collaborative intelligence between the cloud and mobile edge,” Acm Sigplan Notices, vol.
52, no. 4, pp. 615–629, 2017.
[9] S. Teerapittayanon, B. McDanel, and H. Kung, “Distributed deep neural networks over the
cloud, the edge and end devices,” in IEEE International Conference on Distributed
Computing Systems, 2017.
[10] J. H. Ko, T. Na, M. F. Amir, and S. Mukhopadhyay, “Edge-host partitioning of deep neural
networks with feature space encoding for resource-constrained internet-of-things platforms,”
in IEEE International Conference on Advanced Video and Signal Based Surveillance, 2018.
[11] A. E. Eshratifar, M. S. Abrishami, and M. Pedram, “Jointdnn: an efficient training and
inference engine for intelligent mobile cloud computing services,” arXiv preprint
arXiv:1801.08618, 2018.
[12] F. Mireshghallah, M. Taram, A. Jalali, A. T. Elthakeb, D. Tullsen, and H. Esmaeilzadeh, “A
principled approach to learning stochastic representations for privacy in deep neural
inference,” arXiv preprint arXiv:2003.12154, 2020.

Common questions

Powered by AI

Remote storage on cloud servers, as opposed to local storage, offers benefits such as offloading data management tasks to the cloud provider and providing instant access to stored data which enhances the user-friendliness of services. However, a significant drawback is that cloud servers gain access to both data and queries, raising serious privacy and security concerns . To mitigate these issues, data is often encrypted before being stored on the cloud, although this complicates similarity searches that work well on plaintext datasets .

Implementing DDNNs involves challenges such as latency in data transfer, synchronization of model updates, and the complexity of managing communication between distributed nodes . These challenges can be addressed by optimizing the partitioning of network tasks between the cloud, edge, and end devices to minimize latency and ensuring model consistency through efficient data exchange protocols. Additionally, leveraging edge computing to pre-process data before cloud analysis can reduce bottlenecks .

Cloud computing services, while convenient, involve storing data on remote servers where the data owner has less control over who accesses the data and queries. This creates increased opportunities for potential breaches of privacy and necessitates advanced privacy mechanisms such as encryption and Searchable Symmetric Encryption (S-SE) to ensure the confidentiality and integrity of user data . The potential exposure of sensitive information justifies the implementation of frameworks like AB-KS-SM, which aim to address these security concerns .

The hybrid approach to data processing, which utilizes both cloud and mobile platforms, offers advantages such as improved computational efficiency by leveraging the cloud's resources while minimizing latency through data processing on mobile devices . However, trade-offs include the increased complexity of managing data flows between devices and the cloud, as well as potential security vulnerabilities resulting from data being transmitted across networks .

The AB-KS-SM framework offers enhanced security by preventing disconnected keyword guess attacks compared to traditional plaintext search methods . While traditional methods might offer faster search capabilities due to lack of encryption, the AB-KS-SM framework maintains data confidentiality by allowing searches over encrypted datasets, thereby protecting against unauthorized access . However, this added security may come at the cost of computational complexity and slower search performance compared to plaintext datasets .

Frameworks like JointDNN optimize the training and inference processes for mobile cloud computing services by allowing for efficient workload distribution and reduced latency in executing deep learning models . They take advantage of mobile-cloud architectures to provide scalable processing solutions. However, limitations include potential reliance on specialized hardware and the need to handle communication overhead between devices and the cloud, which could hinder real-time application performance .

Shredder maintains inference privacy in deep neural networks by learning noise distributions that can be applied to data outputs to obscure sensitive information from inference processes . This approach ensures that while the utility of the original data is retained for analytic purposes, direct extraction of sensitive data is ineffective, thus enhancing data privacy. This technique is crucial for privacy-preserving machine learning as it allows models to train on sensitive data without exposing sensitive features, thus encouraging the adoption of machine learning solutions in privacy-sensitive domains .

Searchable Symmetric Encryption (S-SE) allows users to perform similarity searches over encrypted datasets without decrypting them, therefore maintaining data privacy . However, the efficiency of these searches might not be equal to those performed on plaintext data, and certain implementations may be susceptible to security concerns such as keyword guessing attacks, which frameworks like AB-KS-SM aim to mitigate .

The cloud-based malware detection game for mobile devices uses computational offloading by transferring malware detection tasks from the device to the cloud, allowing for more intensive processing of data without straining device resources . This approach enhances security by enabling more effective detection of sophisticated malware patterns that mobile devices alone may not process efficiently, providing tiered security benefits from the cloud's computational power .

Feature space encoding in edge-host partitioning involves preprocessing input data to a more compact form before transferring it to the host for further processing, reducing communication bandwidth requirements . This strategy helps in optimizing resource use in Internet of Things (IoT) applications by decreasing the amount of data that needs to be transmitted between edge devices and cloud, facilitating quicker processing and improving overall system responsiveness .

You might also like