Professional Documents
Culture Documents
Searching through the keywords in an image database require a lot of Meta data (information
about the image) to be stored for each image in a separate database. This does not lead to an
effective search mechanism. Also the currently available search query results do not involve the
resultant images that are content related i.e. images whose contents are similar. The similarity in
the context of the content is measured by as many features like Color, Texture, Shape, Dominant
Color, Correlation Matching heuristic, Many new features are being proposed day by day, many
of which like entropy, smoothness, skewness, etc.
In this research I am proposing an approach to model content based meta-search engine which
search all the content related images present in the dataset. The result based on the above features
from the images is filtered using the correlation matching heuristic. The overall matching scores
will decide on the basis of the sum of all of these individual feature scores. The proposed scheme
will be used to retrieve all the images having related contents to the query image. On the basis of
the scores ranking of the match will be provided. The simulation results of combined approach
suggest the effectiveness of the approach. This proposed model will increase the accuracy of
search results.
This research model is quite interactive and familiar like the other meta-data models present on
web for searching the images from huge database and data sources. In advance this model also
contains many good features to improve the accuracy and efficiency. Although this model has
some small riddles those have to solve afterwards.
Chapter-1
INTRODUCTION
1.1 Information:
There are two Web Services protocols standards, SOAP WS and RESTful WS.
a) Equalizing or just comparing to many of its predecessors, which only provide the
binary (two way) results or binary outcome about the storage state across the distributed
servers, the challenge-response protocol or the rules in our work in future provides the
localization of data error.
b) Unlike most prior works or the previous work for ensuring and to make it confirm
about the remote data integrity, the new scheme, new study and new work supports
secure, clear and efficient dynamic operations on data blocks, including: update, delete
and append.
c) Extensive security, enlarged performance and performance analysis shows that the
proposed scheme is highly efficient and resilient against Byzantine failure, malicious data
modification attack, and even server colluding attacks.
1.4 Correctness:
Our scheme outperforms those by integrating the correctness verification and error
localization in our challenge-response protocol: the response values from servers for each
challenge not only determine the correctness of the distributed storage, but also contain
information to locate potential data error.
Cloud Computing has been envisioned as the next generation architecture of IT
Enterprise. In contrast to traditional solutions, where the IT services are under proper
physical, logical and personnel controls, Cloud Computing moves the application
software and databases to the large data centers, where the management of the data and
services may not be fully trustworthy. This unique attribute, however, poses many new
security challenges which have not been well understood. In this article, we focus on
cloud data storage security, which has always been an important aspect of quality of
service. To ensure the correctness of users data in the cloud, we propose an effective and
flexible distributed scheme with two salient features, opposing to its predecessors. By
utilizing the homomorphic token with distributed verification of erasure-coded data, our
scheme achieves the integration of storage correctness insurance and data error
4
localization, i.e., the identification of misbehaving server(s). Unlike most prior works, the
new scheme further supports secure and efficient dynamic operations on data blocks,
including: data update, delete and append. Extensive security and performance analysis
shows that the proposed scheme is highly efficient and resilient against Byzantine failure,
malicious data modification attack, and even server colluding attacks.
4. The middleware stores a copy of result with the service ID in the database and
returns the optimized result to the mobile client
The middleware is also a Personal Service Mashup Platform (PSMP) that is based on a
novel data structure which represents WS as objects. The next section talks about the
middleware design and how these functions are achieved. Section 3 describes the design
of PSMP. The rest of the sections present implementations of mobile client and Cloud
middleware.
Literature Review
2.1 SECURITY:
Data confidentiality is a desired property when users outsource their data storage to
public cloud service providers. To protect users data, encryption is used to secure the
data in the cloud. Recently, Cipher text Policy Attribute- Based Encryption (CP-ABE)
schemes were proposed to facilitate key management and cryptographic access control in
an expressive and efficient way. Under the construction of CP-ABE, an attribute is a
descriptive string assigned to (or associated with) a user and each user may be tagged
with multiple attributes. Multiple users may share common attributes, which allow
message encryptors to specify a data access policy by composing multiple attributes
through logical operators such as AND, OR, etc. To decrypt the message, the
decryptors attributes need to satisfy the access policy. These unique features of CP-ABE
solutions make them appealing in the cloud data storage system that requires an efficient
data access control for a large number of users
belonging to different organizations.
With the fast development of wireless technology, mobile cloud has become an emerging
cloud service model, in which mobile devices and sensors are used as the information
collecting and processing nodes for the cloud infrastructure. This new trend demands
researchers and practitioners to construct a trustworthy architecture for mobile cloud
computing, which includes a large numbers.
8
With the CP-ABE enabled cloud storage service, a new challenge is how to incorporate
wireless mobile devices, especially lightweight devices such as cell phones and sensors
into the cloud system. This new challenge is originated from the fact that CP-ABE
schemes always require intensive computing resources to run the encryption and
decryption algorithms. To address this issue, an effective solution is to outsource the
heavy encryption and decryption computation without exposing the sensitive data
contents or keys to the cloud service providers. Our research described in this paper
proposes such a solution for CP-ABE. Another research challenge is how to share
encrypted data with a large number of users, in which the data sharing group can be
changed frequently. For example, when a user is revoked from accessing a file, he/she is
not authorized to access any future updates of the file, i.e., the local copy (if exists) will
get outdated. To this end, the updated data need to be encrypted by a new encryption key.
Furthermore, the third research challenge is how to upload/ download and update
encrypted data stored in the cloud system. For example, when changing certain data
fields of an encrypted database, the encrypted data needs to be downloaded from cloud
and then be decrypted. Upon finishing the updates, the files need to be re-encrypted and
uploaded to the cloud system. Frequent upload/download operations will cause
tremendous overhead for resource constrained wireless devices. Thus, it is desirable to
design a secure and efficient cloud data management scheme to balance the
communication and storage operational overhead incurred by managing the encrypted
data.
To address the above described research challenges, in this paper, we present a holistic
secure mobile cloud data management framework that includes two major components:
1) A Privacy Preserving CP-ABE (PP-CP-ABE) scheme;
2) An Attribute-Based Data Storage (ABDS) scheme that achieves information
theoretical optimality.
Using PP-CP-ABE, users can securely outsource computation
Intensive CP-ABE encryption and decryption operations to the cloud without revealing
data content and secret keys. In this way, lightweight and resource constrained devices
can access and manage data stored in the cloud data store. The ABDS system achieves
scalable and fine-grained data access control, using public cloud services. Based on
ABDS, users attributes are organized in a carefully constructed hierarchy so that the cost
of membership revocation can be minimized. Moreover, ABDS is suitable for mobile
computing to balance communication and storage overhead, and thus reduces the cost of
data management operations (such as upload, updates, etc.) for both the mobile cloud
nodes and storage service providers.
A. Notations:
The notation used in this paper is listed in Table II-A:
TABLE I
NOTATIONS USED IN THIS PAPER.
Acronym Descriptions
DO Data Owner
ESP Encryption Service Provider
DSP Decryption Service Provider
SSP Storage Service Provider
TA Trust Authority
T Access Policy Tree
10
11