To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Water Industry Process Automation & Control Monthly - April 2024
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Private searching on streaming data based on keyword frequency
1. GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
Private Searching on Streaming
Data Based on Keyword Frequency
ABSTRACT
Private searching on streaming data is a process to dispatch to a public server a program,
which searches streaming sources of data without revealing searching criteria and then sends
back a buffer containing the findings. From an Abelian group homomorphic encryption, the
searching criteria can be constructed by only simple combinations of keywords, for example,
disjunction of keywords. The recent breakthrough in fully homomorphic encryption has allowed
us to construct arbitrary searching criteria theoretically. In this paper, we consider a new private
query, which searches for documents from streaming data on the basis of keyword frequency,
such that the frequency of a keyword is required to be higher or lower than a given threshold.
This form of query can help us in finding more relevant documents. Based on the state of the art
fully homomorphic encryption techniques, we give disjunctive, conjunctive, and complement
constructions for private threshold queries based on keyword frequency. Combining the basic
constructions, we further present a generic construction for arbitrary private threshold queries
2. based on keyword frequency. Our protocols are semantically secure as long as the underlying
fully homomorphic encryption scheme is semantically secure.
Existing System:
Private searching on streaming data is a process to dispatch to a public
server a program, which searches streaming sources of data without revealing
searching criteria and then sends back a buffer containing the findings. From an
Abelian group homomorphic encryption, the searching criteria can be constructed
by only simple combinations of keywords, for example, disjunction of keywords.
The recent breakthrough in fully homomorphic encryption has allowed us to
construct arbitrary searching criteria theoretically.
Disadvantages
1. This problem has many applications for the purpose of intelligence
gathering.
2. It gathering the bundled of data.
Proposed System
In this project, we consider a new private query, which searches for documents from
streaming data on the basis of keyword frequency, such that the frequency of a keyword is
3. required to be higher or lower than a given threshold. This form of query can help us in finding
more relevant documents. Based on the state of the art fully homomorphic encryption
techniques, we give disjunctive, conjunctive, and complement constructions for private threshold
queries based on keyword frequency. Combining the basic constructions, we further present a
generic construction for arbitrary private threshold queries based on keyword frequency. Our
protocols are semantically secure as long as the underlying fully homomorphic encryption
scheme is semantically secure.
Advantages:
1. This helps to searching the private data effectiveness and accuracy.
2. Although a trade-off between utility and privacy is necessary, it is hard, if not impossible,
to find a proper balance overall. Besides, it is hard to prevent irrelated data from
proactively collecting intelligence on the search engine.
IMPLEMENTATION
Implementation is the stage of the project when the theoretical design is
turned out into a working system. Thus it can be considered to be the most
4. critical stage in achieving a successful new system and in giving the user,
confidence that the new system will work and be effective.
The implementation stage involves careful planning, investigation of the
existing system and it’s constraints on implementation, designing of methods to
achieve changeover and evaluation of changeover methods.
Main Modules:-
1. User Module :
In this module, Users are having authentication and security to access the detail which is
presented in the ontology system. Before accessing or searching the details user should have the
account in that otherwise they should register first.
2. Fully Homomorphic Encryption:
Previous homomorphic encryption schemes, such as, allow homomorphic computation of
only one operation (either addition or multiplication) on plaintexts.
Recently, FHE schemes, such as which can support evaluation of arbitrary depth circuits, were
successfully constructed. Among them, the somewhat fully homomorphic encryption scheme
proposed by 1. KeyGenenation 2. Encrypt To encrypt 3. Decrypt.
5. 3.Construction :
In our protocol for disjunctive threshold queries is composed of four algorithms KeyGen,
FilterGen, FilterExec, BufferDec. Our construction is based on a fully homomorphic encryption
scheme and can be formally presented as follows.Key Generation. KeyGenðkÞ. Run the key
generation algorithm for the underlying fully homomorphic encryption scheme to produce the
private key sk and the publickey pk.
4. Performance-Analysis:
We have presented two basic constructions for threshold query based on keyword
frequency. They are disjunctive and conjunctive. In our disjunctive construction, the client can
pregenerates the public/private key pair. In addition, the client needs to encrypt the frequency of
each classified keyword in the phase of the filter program generation and to decrypt the buffer IB
to retrieve the matching documents after the buffer returns. If we do not consider the key
generation, the total computation complexity of the client is encryptions to generate the program
F and decryptions to retrieve the matching documents from the buffer, where jDj is the number
of words in the dictionary D, 2d is the maximal number of words contained in each document,
‘is the number of bits of each document, and mis the maximal number of matching documents in
the buffer.
System Configuration:-
H/W System Configuration:-
Processor - Pentium –III
6. Speed - 1.1 Ghz
RAM - 256 MB(min)
Hard Disk - 20 GB
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
S/W System Configuration:-
Operating System :Windows95/98/2000/XP
Application Server : Tomcat5.0/6.X
Front End : HTML, Java, Jsp
Scripts : JavaScript.
Server side Script : Java Server Pages.
Database : Mysql 5.0
Database Connectivity : JDBC.