Concepts Of Cloud Computing And Data Storage Computer Science Essay

Published:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Abstract:

More and more sensitive information are being centralized into the cloud because cloud computing becomes prevalent in the present scenario. However, traditional searchable encryption schemes facilitate a user to securely search over encrypted data through selectively recover files of interest and keywords. In this current project, the problem of effectual fuzzy keyword search over encrypted cloud data while upholding keyword privacy is solved. Unclear keyword search very much improves system usability by frequent identical files when user's searching efforts accurately match with the predefined keywords, when accurate match can be unsuccessful. In this developing project, developers are used correct distance to count keywords resemblance and developed two advanced methods on building unclear keywords groups that accomplish optimized storage and demonstration expenses. They additionally projected a brand new symbol which is based on tri-traverse searching scheme and where a multi way tree structure is created by using symbols transformed from the resulted unclear keywords groups. Through the exact security analysis, the proposed solution is secure and privacy protecting, whereas accurately understanding the aim of fuzzy keyword search. The wide experimental results reveal the effectiveness of the proposed solution.

Chapter 1

Introduction:

Background:

The cloud computing provides the dynamical and scalable resources as a service over the internet. Since this promises to reduce the capital and the operational expenditure, economic benefits are the main benefits for the cloud. The success of an organization depends on some of the vital factors like reducing costs, accelerating processes and simplifying management. In a wide variety of architectures, under different services and deployment methods, the cloud computing technologies can be implemented. The transfer of the existing server infrastructures into dynamic environments in an organization can be done through the cloud computing.

The fuzzy key word search extensively expanded the system usability by means of giving back the equivalent files when the user's penetrating contributions equals the predefined keywords accurately or the adjacent credible corresponding files are dependent on keyword similarity semantics when specific match becomes unsuccessful.

The significance of the fuzzy search has gained focus in the situations of the plain text investigation in information retrieval neighborhood. This problem has been recognized in the classical information access paradigms by means of facilitating the user to search without employing try and see technique for determining the relevant information depending on the estimated string matching.

In the initial construction, each declaration in the text is encrypted separately in a particular two layered encryption structure. After them, bloom filters came into existence in order to build the indexes for the data files. This technique consists of the trapdoors of overall words and is developed and accumulated on the server for every file. Every entry possesses the trapdoor of a keyword and an encrypted group of file identifiers whose equivalent data files contain the keyword in the index table. A Public -key based searchable encryption technique is also developed as a complementary approach for the first one. However, these are not taken into consideration due to the issues with the authorization of the users. In fact, they are relevant for cloud computing as these entire current techniques aid merely accurate keyword search.

Current situations:

In the present system, there are many drawbacks in privacy search of centrally stored data. The simple approach actually gives an unclear (fuzzy) keyword search in excess of the encrypted files whereas accomplishing search privacy by using the method of secure trapdoors. Though this approaches, effective disadvantages can be happened. The easy inventory technique in building unclear key word sets would bring in huge storage difficulties, which greatly have an effect on the usability. For example, the subsequent is the listing alternatives after a substitution process on the primary quality of keyword.

CASTLE: {AASTLE, BASTLE, DASTLE, YASTLE, ZASTLE}.

Solutions to the current system:

The proposed system is used for answering the current problems in the existing system. In this present development project two advanced techniques such as wildcard based and gram based techniques are used to overcome the problems. These techniques are helped in building the storage-efficient unclear key word sets by using the couple of important clarifications on the similarity metric of accurate distance.

Rational:

The significant point in developing this project is to find a solution for the issue of the searching of the effective fuzzy keywords in the encrypted data present in the cloud. This has to be carried out by simultaneously maintaining the privacy. This is the main reason behind developing this project. As the usage of the cloud and the implementation of the cloud computing techniques are increasing these days, the concern over the security on the cloud is also increasing. The existing applications over the encrypted files are providing the keyword search with its straight forward approach. There is a serious disadvantage of the privacy issues in searching the encrypted data over the cloud. This application which is going to be developed in this project is making use of some appropriate algorithms is likely to attain the effective search of the key word in encrypted data over the cloud with improved privacy.

Aim and objectives:

Aim:

The main aim of the project is to develop an application for the effective privacy search of centrally stored data, remotely in cloud computing.

As a result, the following objectives should be met in accomplishing the developing project aim successfully.

Objectives:

To study the various concepts related to cloud computing and data storage in cloud.

To take up the literature survey on security concerns those are affecting the privacy search in the cloud by comparing various authors views and opinions and drawing a conclusion from it.

To analyze the new application for effective utilization of remotely stored encrypted data in cloud.

To develop the application analyzed, for the effective privacy search.

To test the results for various bugs and report the results.

To document the report with the testing results finally.

Flow of dissertation:

Chapter -1: Introduction:

In developing a project, the first chapter is introduction. The brief introduction on each and every topic and the concept related to the subject that is the 'effective privacy search of the encrypted data in cloud computing' is given in this section. Various concepts like the cloud computing, storage of data in encrypted form, privacy search of the encrypted data and many others are described in a generalized context.

Chapter -2: Literature review:

The second chapter in the flow of the research is the literature review. The name itself describes that in this section, wide variety of literatures are revised. All the concepts and the topics on cloud and its security concerns are studied and presented in detailed manner. The required information for this section is collected from various external sources. These sources are the journals, articles, books, research papers and many others. These are considered as externally and mainly termed as secondary sources as these are written by many authors on many aspects.

Chapter-3: Development Methodology

The new application which is required is going to be developed by making use of some processes which on a whole is referred to as the development methodology. This development methodology is given in the third section. This explains the process in which this application is going to be developed by the programmer or the developer. There are different models in developing an application. Along with describing the various models present, this also explains the model that is going to be used in developing the current application.

Chapter-4: System Design

This is the section of the paper where the various modules, diagrams, and architecture present in developing a project application are described. There are different diagrams which can be used in designing a required application. So, in designing an application which can effectively conduct the privacy search on the encrypted data in the cloud, the diagrams are given with detailed descriptions.

Chapter-5: System Analysis:

The next chapter is the system analysis where the behaviors of the applications or the software's are discussed to get a good understanding. In this section, the current or the existing system would be explained in detail. The limitations and the drawbacks in the presently using application are evaluated which would give the reasons for developing the new application. Based on this the required and the new model is proposed.

This analysis also provides the information on various feasibilities in developing the application. The development process of the application would be initiated based on some of the feasibilities like economical technical, operational and others which are generally used.

Chapter-6: Implementation

After analysis, the next step is to start the implementation of the suitable modules and diagrams in developing the new application that would support the privacy search of encrypted data on the cloud. By making use of all these necessary models and methods, the development of the application is practically implemented in this phase.

Chapter-7: Testing:

After the required new application is successfully developed, the important and the compulsory step to be followed is the testing the application. Initially the various types of testing available to test an application would be explained in a generalized context. Then, the developed application is set to test under different criteria in different types of testing. The test results along with the test cases would also be given in this section.

Chapter-8: Project evaluation:

This chapter defines the project evaluation.

Chapter-9: Conclusions:

The final conclusion for this project in developing an application that can effectively allow the privacy search on encrypted data would be given in this section. Based on the detailed study and development of new required applications, the paper gives the finalized conclusions along with the achievements in developing the application.

Writing Services

Essay Writing
Service

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing
Service

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision
Service

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.