You are on page 1of 5

A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH OVER

ENCRYPTED CLOUD COMPUTING

ABSTRACT
The advent of cloud computing, data owners are motivated to outsource their complex
data management systems from local sites to commercial public cloud for great flexibility and
economic savings. But for protecting data privacy, sensitive data has to be encrypted before
outsourcing, which obsoletes traditional data utilization based on plaintext keyword search.
Thus, enabling an encrypted cloud data search service is of paramount importance. Considering
the large number of data users and documents in cloud, it is crucial for the search service to
allow multi-keyword query and provide result similarity ranking to meet the effective data
retrieval need. Related works on searchable encryption focus on single keyword search or
Boolean keyword search, and rarely differentiate the search results. We define and solve the
challenging problem of privacy-preserving multi-keyword ranked search over encrypted cloud
data (MRSE), and establish a set of strict privacy requirements for such a secure cloud data
utilization system to become a reality. Among various multi-keyword semantics, we choose the
efficient principle of “coordinate matching”, its many matches as possible, to capture the
similarity between search query and data documents, and further use “inner product similarity”
to quantitatively formalize such principle for similarity measurement. We first propose a basic
MRSE scheme using secure inner product computation, and then significantly improve it to meet
different privacy requirements in two levels of threat models. Thorough analysis investigating
privacy and efficiency guarantees of proposed schemes is given, and experiments on the real-
world dataset further show proposed schemes indeed introduce low overhead on computation
and communication.
Front End: VISUAL STUDIO 2008

Back end: SQL SERVER 2005


MAXIMIZE THE STORAGE SPACE IN CLOUD ENVIRONMENT USING
DEDUPLICATION

Abstract

Data deduplication is a technique for eliminating redundant copies of data, and has been
widely used in cloud storage to reduce storage space and upload bandwidth. However, there is
only one copy for each file stored in cloud even if such a file is owned by a huge number of
users. Furthermore, the challenge of privacy for sensitive data also arises when they are
outsourced by users to cloud. Aiming to address the above security challenges, this project
makes the first attempt to formalize the notion of distributed reliable deduplication system. It
proposed new distributed deduplication systems with higher reliability in which the data chunks
are distributed across multiple cloud servers. The security requirements of data confidentiality
and tag consistency are also achieved by introducing a deterministic secret sharing scheme in
distributed storage systems, instead of using convergent encryption as in previous deduplication
systems.

Front End: VISUAL STUDIO 2012

Back end: SQL SERVER 2005


DISCOVERY OF RANKING FRAUD FOR MOBILE APPS

Abstract:

Ranking fraud in the mobile App market refers to fraudulent or deceptive activities which
have a purpose of bumping up the Apps in the popularity list. Indeed, it becomes more and more
frequent for App developers to use shady means, such as inflating their Apps’ sales or posting
phony App ratings, to commit ranking fraud. While the importance of preventing ranking fraud
has been widely recognized, there is limited understanding and research in this area. To this end,
in this paper, we provide a holistic view of ranking fraud and propose a ranking fraud detection
system for mobile Apps. Specifically, we first propose to accurately locate the ranking fraud by
mining the active periods, namely leading sessions, of mobile Apps. Such leading sessions can
be leveraged for detecting the local anomaly instead of global anomaly of App rankings.
Furthermore, we investigate three types of evidences, i.e., ranking based evidences, rating based
evidences and review based evidences, by modelling Apps’ ranking, rating and review
behaviours through statistical hypotheses tests. In addition, we propose an optimization based
aggregation method to integrate all the evidences for fraud detection. Finally, we evaluate the
proposed system with real-world App data collected from the iOS App Store for a long time
period. In the experiments, we validate the effectiveness of the proposed system, and show the
scalability of the detection algorithm as well as some regularity of ranking fraud activities.

Front End: VISUAL STUDIO 2010

Back end: SQL SERVER 2005


ARUGUMENT REALITY FOR COMATOSE PATIENT REAL TIME WEARABLE
SENSOR WITH AN ONLINE ALERT THROUGH IOT NETWORK

ABSTRACT:

As we know coma is a state of unconsciousness in which patient cannot feel or respond to


the pain, light or sound, it does not initiate volunteering any actions. Patients in a coma state
need to have a continuous update of Blood pressure, temperature, humidity, and urine level.
Doing this manually can become almost impossible to keep updates of multiple patients at the
same time. In order to address this situation, our system comes to the rescue; this system will
collect the information of patients with the help of sensors. These sensors use WIFI to
communicate this information to the internet. This system is powered by the Raspberry Pi it
includes a blood pressure monitoring unit and an ultrasonic sensor to check temperature sensor,
motion sensor, and an LCD display.

When we turn the system on, it gets connected to the website using WIFI, System
monitor shows four signs namely heart rate, temperature, humidity, and urine output. While
testing heart rate function of the system, the heart rate and blood pressure value get updated over
IOT and LCD display. As we know the patient who is in comatose cannot urinate on their own
so a rubber tube is inserted into their bladder to remove urine. This system tests urine level and
also updates the value over IOT and LCD, when the patient urinates.

In case if the patient regains consciousness and attempts to move, the sensor will detect
the motion and update it over IOT and LCD. In this way, our system monitors the comatose
patients.
MODEL DIAGRAM

SOFTWARE REQUIREMENT

 Front End : VB 6.0


 IOT Cloud Connectivity

HARDWARE REQUIREMENT

 MICROCONTROLLER
 TEMPERATURE
 ECG
 MOTION DETECTOR
 RS232
 USB TO SERIAL CONNECTIVITY

You might also like