SlideShare a Scribd company logo
1 of 3
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com 
Analysis of Field Data on Web Security Vulnerabilities Private 
Searching on Streaming Data Based on Keyword Frequency 
ABSTRACT: 
Private searching on streaming data is a process to dispatch to a public server a program, which 
searches streaming sources of data without revealing searching criteria and then sends back a 
buffer containing the findings. From an Abelian group homomorphic encryption, the searching 
criteria can be constructed by only simple combinations of keywords, for example, disjunction of 
keywords. The recent breakthrough in fully homomorphic encryption has allowed us to construct 
arbitrary searching criteria theoretically. In this paper, we consider a new private query, which 
searches for documents from streaming data on the basis of keyword frequency, such that the 
frequency of a keyword is required to be higher or lower than a given threshold. This form of 
query can help us in finding more relevant documents. Based on the state of the art fully 
homomorphic encryption techniques, we give disjunctive, conjunctive, and complement 
constructions for private threshold queries based on keyword frequency. Combining the basic 
constructions, we further present a generic construction for arbitrary private threshold queries 
based on keyword frequency. Our protocols are semantically secure as long as the underlying 
fully homomorphic encryption scheme is semantically secure. 
EXISTING SYSTEM: 
Ostrovsky and Skeith gave two solutions for private searching on streaming data. One is based 
on the Paillier cryptosystem and allows to search for documents satisfying a disjunctive 
condition i.e., containing one or more classified keywords. Another is based on the Boneh 
cryptosystem and can search for documents satisfying an AND of two sets of keywords. 
Bethencourt also gave a solution to search for documents satisfying a condition. Like the idea of, 
an encrypted dictionary is used. However, rather than using one large buffer and attempting to 
avoid collisions like, Bethencourt stored the matching documents in three buffers and retrieved 
them by solving linear systems. Yi proposed a solution to search for documents containing more
than t out of n keywords, so-called (t; n) threshold searching, without increasing the dictionary 
size. The solution is built on the state of the art fully homomorphic encryption (FHE) technique 
and the buffer keeps at most m matching documents without collisions. Searching for documents 
containing one or more classified keywords like can be achieved by (1; n) threshold searching. 
DISADVANTAGES OF EXISTING SYSTEM: 
 It have not considered keyword frequency, the number of times that keyword is used in a 
document 
PROPOSED SYSTEM: 
In this paper, we consider a new private query, which searches for documents from streaming 
data based on keyword frequency, such that a number of times that a keyword appears matching 
document is required to be higher or lower than a given threshold. For example, find documents 
containing keywords k1; k2; . . . ; kn such that the frequency of the keyword kiði ¼ 1; 2; . . . ; nÞ 
in the document is higher (or lower) than ti. We take the lower case into account because terms 
that appear too frequently are often not very useful as they may not allow one to retrieve a small 
subset of documents from the streaming data. 
ADVANTAGES OF PROPOSED SYSTEM: 
 It encrypts the frequency threshold for each keyword because different keywords may 
have different frequency thresholds. 
 A new type of private threshold query based on keyword frequency, which can help us in 
finding more relevant documents from streaming data. 
SYSTEM CONFIGURATION:- 
HARDWARE REQUIREMENTS:- 
Processor – Pentium –IV 
Speed – 1.1 Ghz 
RAM – 512 MB(min) 
Hard Disk – 40 GB 
Key Board – Standard Windows Keyboard 
Mouse – Two or Three Button Mouse 
Monitor – LCD/LED 
SOFTWARE REQUIREMENTS:
Operating system : Windows XP. 
Coding Language : JAVA 
Data Base : MySQL 
Tool : Netbeans.

More Related Content

More from IEEEFINALYEARSTUDENTPROJECTS

IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS A novel time obfuscated algorithm ...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS  A novel time obfuscated algorithm ...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS  A novel time obfuscated algorithm ...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS A novel time obfuscated algorithm ...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easyIEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easyIEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA DATA MINING PROJECTS Web image re ranking using query-specific...
IEEE 2014 JAVA DATA MINING PROJECTS Web image re ranking using query-specific...IEEE 2014 JAVA DATA MINING PROJECTS Web image re ranking using query-specific...
IEEE 2014 JAVA DATA MINING PROJECTS Web image re ranking using query-specific...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA DATA MINING PROJECTS Towards multi tenant performance sl os
IEEE 2014 JAVA DATA MINING PROJECTS Towards multi tenant performance sl osIEEE 2014 JAVA DATA MINING PROJECTS Towards multi tenant performance sl os
IEEE 2014 JAVA DATA MINING PROJECTS Towards multi tenant performance sl osIEEEFINALYEARSTUDENTPROJECTS
 

More from IEEEFINALYEARSTUDENTPROJECTS (20)

IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS A novel time obfuscated algorithm ...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS  A novel time obfuscated algorithm ...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS  A novel time obfuscated algorithm ...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS A novel time obfuscated algorithm ...
 
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
 
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easyIEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
 
IEEE 2014 JAVA DATA MINING PROJECTS Web image re ranking using query-specific...
IEEE 2014 JAVA DATA MINING PROJECTS Web image re ranking using query-specific...IEEE 2014 JAVA DATA MINING PROJECTS Web image re ranking using query-specific...
IEEE 2014 JAVA DATA MINING PROJECTS Web image re ranking using query-specific...
 
IEEE 2014 JAVA DATA MINING PROJECTS Towards multi tenant performance sl os
IEEE 2014 JAVA DATA MINING PROJECTS Towards multi tenant performance sl osIEEE 2014 JAVA DATA MINING PROJECTS Towards multi tenant performance sl os
IEEE 2014 JAVA DATA MINING PROJECTS Towards multi tenant performance sl os
 

Recently uploaded

Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 

Recently uploaded (20)

Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 

IEEE 2014 JAVA NETWORK SECURITY PROJECTS Analysis of field data on web security vulnerabilities private searching on streaming data based on keyword frequency

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com Analysis of Field Data on Web Security Vulnerabilities Private Searching on Streaming Data Based on Keyword Frequency ABSTRACT: Private searching on streaming data is a process to dispatch to a public server a program, which searches streaming sources of data without revealing searching criteria and then sends back a buffer containing the findings. From an Abelian group homomorphic encryption, the searching criteria can be constructed by only simple combinations of keywords, for example, disjunction of keywords. The recent breakthrough in fully homomorphic encryption has allowed us to construct arbitrary searching criteria theoretically. In this paper, we consider a new private query, which searches for documents from streaming data on the basis of keyword frequency, such that the frequency of a keyword is required to be higher or lower than a given threshold. This form of query can help us in finding more relevant documents. Based on the state of the art fully homomorphic encryption techniques, we give disjunctive, conjunctive, and complement constructions for private threshold queries based on keyword frequency. Combining the basic constructions, we further present a generic construction for arbitrary private threshold queries based on keyword frequency. Our protocols are semantically secure as long as the underlying fully homomorphic encryption scheme is semantically secure. EXISTING SYSTEM: Ostrovsky and Skeith gave two solutions for private searching on streaming data. One is based on the Paillier cryptosystem and allows to search for documents satisfying a disjunctive condition i.e., containing one or more classified keywords. Another is based on the Boneh cryptosystem and can search for documents satisfying an AND of two sets of keywords. Bethencourt also gave a solution to search for documents satisfying a condition. Like the idea of, an encrypted dictionary is used. However, rather than using one large buffer and attempting to avoid collisions like, Bethencourt stored the matching documents in three buffers and retrieved them by solving linear systems. Yi proposed a solution to search for documents containing more
  • 2. than t out of n keywords, so-called (t; n) threshold searching, without increasing the dictionary size. The solution is built on the state of the art fully homomorphic encryption (FHE) technique and the buffer keeps at most m matching documents without collisions. Searching for documents containing one or more classified keywords like can be achieved by (1; n) threshold searching. DISADVANTAGES OF EXISTING SYSTEM:  It have not considered keyword frequency, the number of times that keyword is used in a document PROPOSED SYSTEM: In this paper, we consider a new private query, which searches for documents from streaming data based on keyword frequency, such that a number of times that a keyword appears matching document is required to be higher or lower than a given threshold. For example, find documents containing keywords k1; k2; . . . ; kn such that the frequency of the keyword kiði ¼ 1; 2; . . . ; nÞ in the document is higher (or lower) than ti. We take the lower case into account because terms that appear too frequently are often not very useful as they may not allow one to retrieve a small subset of documents from the streaming data. ADVANTAGES OF PROPOSED SYSTEM:  It encrypts the frequency threshold for each keyword because different keywords may have different frequency thresholds.  A new type of private threshold query based on keyword frequency, which can help us in finding more relevant documents from streaming data. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:- Processor – Pentium –IV Speed – 1.1 Ghz RAM – 512 MB(min) Hard Disk – 40 GB Key Board – Standard Windows Keyboard Mouse – Two or Three Button Mouse Monitor – LCD/LED SOFTWARE REQUIREMENTS:
  • 3. Operating system : Windows XP. Coding Language : JAVA Data Base : MySQL Tool : Netbeans.