Your Personal Nutritionist Using FatSecret API

Mobile Computing, Web Application
Name Your Personal Nutritionist Using FatSecret API Technology Android Category Mobile Computing Description Personal Nutritionist as the name, the system can act as your personal nutritionist while this system can be used also by nutritionist gaining a lot of information and help in many ways. FatSecret API helps the System to get the information in many ways. The user can get details about a number of nutrients, vitamins etc of a fruit or vegetable. The user can add his recipes or get recopies using the API. The System basically helps the user in what to eat and which is good, what will help him and etc, the system will help him filter things easily. The System also allows the user to make a diet plan and remind him his food…
Read More

Voice Assistant For Visually Impaired

Mobile Computing, Web Application
Name Voice Assistant For Visually Impaired Technology Android Category Mobile Computing Description This is an innovative System for visually impaired people and acts as a voice assistant for them. This system is used to help the visually impaired to have access to the most important features of the phone enhancing the quality of the system making use of different custom layouts and using speech to text. The System has custom messaging feature with inbox and sent items, call log and dialer, notes and battery level checking and reminder. All actions performed by the user the system speaks out and helps the user to know his current position. The System helps the user to also read the contents of the message along with the sender and the date and time, in…
Read More

LED display generator project

Multimedia, Networking, Web Application
Name LED display generator project Technology DotNET,MS SQL Category Web Application Description The project consists of a software based LED display system made from C# control that displays texts as well as symbols i the same way as if it was to be displayed in a real LED matrix screen. The system can be used to provide a demo to clients before making a real LED panel according to client needs. The system allows various changes and desired modifications such as speed, pixel length, text and color combinations and provides real time view of it using image processing functions. The project features are as follows: User may set the text to display. Next user is allowed to select the text moving directions. After that the user may also select the…
Read More

Media player Project

Multimedia, Web Application
Name Media player Project Technology DotNET,MS SQL Category Web Application Description The music player allows a user to play various media file formats. It can be used to play audio as well as video files. The music player is a software project supporting all known media files and has the ability to play them with ease. The project features are as follows: User may attach Folder to Play add various media files within it. User may see track lists and play desired ones accordingly. Supports various music formats including .mp3, WMA, WAV etc. Interactive GUI Consists of Pause/Play/Stop Features Consists of a Volume controller The system also consists of a sound Equalizer It Displays the media playing time with Track Bar so that user may drag the media play as…
Read More

Farming Assistance Web Service

Data mining, Networking, Parallel And Distributed System, Web Application
Name Farming Assistance Web Service Technology DotNET,MS SQL Category Web Application Description A Web project to help farmers ensure greater profitability through direct farmer to supplier and farmer to farmer communication. This service boosts business communication and brings transparency in the system. This innovative site allows for good farmer, retailer and supplier communication. It allows farmers to login and communicate to respective dealers. When dealers publish an advertisement or offer, the respective farmers get notified via Sms message. The farmers may also submit their greviences and complaints to respective dealers or authorities using their farmer login on a separate complaints page and authorities will get acess to that page regularly using their login id and passwords. IEEE Paper Yes IEEE Paper Year 2015
Read More

Smart Health Consulting Project

Data mining, Networking, Web Application
Name Smart Health Consulting Project Technology DotNET,MS SQL Category Web Application Description This system aims at maintaining patient health records and even getting appointments from various doctors for related treatments. The system user must register as a member of this system and keep updating his medical history. Patients can then select from a list of specialized doctors for respective treatments such as (skin specialist, ENT specialist cardiologist etc) at particular locations. Patients may also select suitable appointment timings for their meeting. This Project contains 7 useful areas: i. General User area ii. Doctor’s area iii. Patient’s area iv. Transaction/Blling area v. Administrator area vi. Pharmacy area vii. Insurance area IEEE Paper Yes IEEE Paper Year 2015
Read More

Look Based Media Player

Image Processing, Multimedia, Parallel And Distributed System
Name Look Based Media Player Technology DotNET,MS SQL Category Web Application Description Name Automated Attendance System Technology DotNET,MS SQL Category Web Application Description Usually when you are watching a video and someone calls you, you have to look somewhere else or go away from pc for some time so you miss some part of the video. Later you need to drag back the video from where you saw it. Well here is a solution to this problem. A look based media player that pauses itself when user is not looking at it. The player starts running again as soon as the user looks at it again. This is done using the camera or webcam on top of the computer. As long as the camera detects the users face looking at…
Read More

Artificial Intelligence Dietician

Data mining, Parallel And Distributed System, Web Application
Name Artificial Intelligence Dietician Technology DotNET,MS SQL Category Web Application Description The online artificial dietician is a bot with artificial intelligence about human diets. It acts as a diet consultant similar to a real dietician. Dieticians are educated with nutrient value of foods. A dietician consults a person based on his schedule, body type, height and weight. The system too asks all this data from the user and processes it. It asks about how many hour the user works, his height, weight, age etc. The system stores and processes this data and then calculates the nutrient value needed to fill up users needs. The system then shows an appropriate diet to the users and asks if user is ok with it, else it shows other alternate diets to fill up…
Read More

Cursor Movement By Hand Gesture Project

Image Processing, Multimedia, Web Application
Name Cursor Movement By Hand Gesture Project Technology DotNET,MS SQL Category Web Application Description Name Automated Attendance System Technology DotNET,MS SQL Category Web Application Description We all wonder it would have been so comfortable if we could control cursor through the use of hand gestures. Well our proposed project puts forward a hand gesture based system that allows user to control the pc mouse movements through the use of hand movements. Our system uses pc webcam in order to detect hand gesture movements. The system continuously scans the camera input for five finger hand like patterns. Once a hand is detected, the system then locks it as an objects. A flag is set on the object in order to mark it as an object. After the object has been flagged…
Read More

Camera Motion Sensing Project

Image Processing, Multimedia, Parallel And Distributed System
Name Camera Motion Sensing Project Technology DotNET,MS SQL Category Web Application Description A motion sensor project that detects motion and sounds an alarm accordingly. This software system is designed in C# that constantly monitors an environment using a camera and sounds an alarm and even records images of the motion taking place as soon as it takes place IEEE Paper Yes IEEE Paper Year 2015
Read More

Web Server to Client communication for web usage data analysis

Multimedia, Networking, Parallel And Distributed System, Web Application
Name Web Server to Client communication for web usage data analysis Technology DotNET,MS SQL Category Web Application Description We usually come across fields where web data proves very important for business as well as security analysis. Ecommerce as well as website usage data is of prime importance these days. Our proposed project puts for ward a system that allows a web server to record web data analytics of web usage patterns of various web links. The system is configured to record web page clicks, seo score computed as per a search engine ranking algorithm as well as other parameters associated with the each web page. The server has an inbuilt configuration logic required to scan live web pages similar to crawlers and then record/store that data for later processing. Since…
Read More

Customer Behaviour Prediction Using Web Usage Mining

Cloud Computing, Data mining, Networking, Parallel And Distributed System, Web Application
Name Customer Behaviour Prediction Using Web Usage Mining Technology DotNET,MS SQL Category Web Application Description Web usage mining involves first recording behavior and flow of customers on a website and then mining through this data for behavioural patterns. It is an important part of ecommerce world that allows websites to go through previously recorded web traffic data. Ecommerce sites analyse this data in order to provide better performance and also suggest better products and services to customers by identifying them next time. The system is tuned to record web shopping/buying patterns and track various analytics data that tend to provide future prediction statistics. The system scans for user budget tracking, tallying to previous years, user bounce rates- number of users returning from payment page and other site usage factors. Factors…
Read More

Web Mining For Suspicious Keyword Prominence

Cloud Computing, Data mining, Web Application
Name Web Mining For Suspicious Keyword Prominence Technology DotNET,MS SQL Category Web Application Description Web mining can be termed as an information mining method to naturally search, collect and organize data from indexed online records which might be in various organized, unstructured or semi-organized structure. We usually use web mining techniques in order to assess the viability of a specific web page/entity in order to figure out various factors related to it. This project consolidates the best researched mechanisms from the semantic web and synaptic web at low entropy in order to build structural engineering of Semantic-Synaptic web mining. Our proposed project aims at web mining for finding out density of selected keywords in order to check its keyword prominence on those web pages. This is an important factor in…
Read More

Credit Card Fraud Detection

Cloud Computing, Security & Encryption, Web Application
Name Credit Card Fraud Detection Technology DotNET,MS SQL Category Web Application Description The credit card fraud detection features uses user behavior and location scanning to check for unusual patterns. These patterns include user characteristics such as user spending patterns as well as usual user geographic locations to verify his identity. If any unusual pattern is detected, the system requires revivification. The system analyses user credit card data for various characteristics. These characteristics include user country, usual spending procedures. Based upon previous data of that user the system recognizes unusual patterns in the payment procedure. So now the system may require the user to login again or even block the user for more than 3 invalid attempts. IEEE Paper Yes IEEE Paper Year 2015
Read More

Active Chat Monitoring and Suspicious Chat Detection over Internet

Data mining, Security & Encryption, Web Application
Name Active Chat Monitoring and Suspicious Chat Detection over Internet Technology DotNET,MS SQL Category Web Application Description A lot of terrorist activities and groups communicate over apps and chat programs over the internet. They also use these chat application over the internet for getting their message to young generation and making new terrorists. Well we here propose a internet chat application that actively monitors various chats going on and also alerts the admin about any suspicious chat process taking place. The system is built to process all chats taking place over and saving them with history. The chat process is handled by server. As data passes through server it continuously scans it for any suspicious keywords. The admin may however keep a watch at any chat he desires. A special…
Read More

Remote Java 2 Dotnet Communication Application

Networking, Web Application
Name Remote Java 2 Dotnet Communication Application Technology DotNET,MS SQL Category Web Application Description Java and dot net are two different but very useful technology when it comes to information technology. Both of them have different development platforms. Well for a study and integration of two major technologies together we propose a client server based communication application made by integrating JAVA with dotnet technology. Here we propose a dedicated client server based architecture that allows for chat as well as authoritative commands by the server over client application. We integrate the two technology and have a working communication between these two technologies. We here propose to build the server application using JAVA and the client side application using Dotnet(C#) technology. Our system consists of the server as an authorities admin…
Read More

Opinion Mining For Social Networking Site

Data mining, Parallel And Distributed System, Web Application
Name Opinion Mining For Social Networking Site Technology DotNET,MS SQL Category Web Application Description This system uses opinion mining methodology in order to achieve desired functionality. Opinion Mining for Social Networking Site is a web application. Here the user will post his views related to some subject other users will view this post and will comment on this post. The System takes comments of various users, based on the opinion, system will specify whether the posted topic is good, bad, or worst. User can change his own profile picture and can update his status. These changes can be viewed by various users. We use a database of sentiment based keywords along with positivity or negativity weight in database and then based on these sentiment keywords mined in user comment is…
Read More

Web Data Mining To Detect Online Spread Of Terrorism

Cloud Computing, Data mining, Networking, Parallel And Distributed System, Web Application
Name Web Data Mining To Detect Online Spread Of Terrorism Technology DotNET,MS SQL Category Web Application Description Terrorism has grown its roots quite deep in certain parts of the world. With increasing terrorist activities it has become important to curb terrorism and stop its spread before a certain time. So as identified internet is a major source of spreading terrorism through speeches and videos. Terrorist organizations use internet to brain wash individuals and also promote terrorist activities through provocative web pages that inspire helpless people to join terrorist organizations. So here we propose an efficient web data mining system to detect such web properties and flag them automatically for human review. Data mining is a technique used to mine out patterns of useful data from large data sets and make…
Read More

Railway Tracking and Arrival Time Prediction

Mobile Computing, Multimedia, Networking, Security & Encryption, Web Application
Name Railway Tracking and Arrival Time Prediction Technology DotNET,MS SQL Category Web Application Description It has happened so many times that you have been waiting on railway station for someone to arrive and you don’t have any exact information about train timing and other stuff. So here we present to you a project on Railway Tracking and Arrival Time Prediction. Using this system user’s can get the information about train timing, and is it on time or not, and other information. In this, system will track the train timing at what time train departed from a particular station and pass these timing details to other station’s system where it will display the timing according to train departed from previous station. If system will find any delay in train due to…
Read More

Weather Forecasting Using Data Mining

Cloud Computing, Data mining, Multimedia, Networking, Web Application
Name Weather Forecasting Using Data Mining Technology DotNET,MS SQL Category Web Application Description Weather forecasting is the application of science and technology to predict the state of the atmosphere for a given location. Ancient weather forecasting methods usually relied on observed patterns of events, also termed pattern recognition. For example, it might be observed that if the sunset was particularly red, the following day often brought fair weather. However, not all of these predictions prove reliable. Here this system will predict weather based on parameters such as temperature, humidity and wind. This system is a web application with effective graphical user interface. User will login to the system using his user ID and password. User will enter current temperature; humidity and wind, System will take this parameter and will predict…
Read More

E Commerce Product Rating Based On Customer Review Mining

Data mining, Networking, Parallel And Distributed System, Web Application
Name E Commerce Product Rating Based On Customer Review Mining Technology DotNET,MS SQL Category Web Application Description There are many users who purchase products through E-commerce websites. Through online shopping many E-commerce enterprises were unable to know whether the customers are satisfied by the services provided by the firm. This boosts us to develop a system where various customers give reviews about the product and online shopping services, which in turn help the E-commerce enterprises and manufacturers to get customer opinion to improve service and merchandise through mining customer reviews. An algorithm could be used to track and manage customer reviews, through mining topics and sentiment orientation from online customer reviews. In this system user will view various products and can purchase products online. Customer gives review about the merchandise…
Read More

Fingerprint Based ATM System

Multimedia, Web Application
Name Fingerprint Based ATM System Technology DotNET,MS SQL Category Web Application Description Fingerprint Based ATM is a desktop application where fingerprint of the user is used as a authentication. The finger print minutiae features are different for each human being so the user can be identified uniquely. Instead of using ATM card Fingerprint based ATM is safer and secure. There is no worry of losing ATM card and no need to carry ATM card in your wallet. You just have to use your fingerprint in order to do any banking transaction. The user has to login using his fingerprint and he has to enter the pin code in order to do further transaction. The user can withdraw money from his account. User can transfer money to various accounts by mentioning…
Read More

Sentiment Analysis for Product Rating

Cloud Computing, Data mining, Networking, Parallel And Distributed System, Web Application
Name Sentiment Analysis for Product Rating Technology DotNET,MS SQL Category Web Application Description Here we propose an advanced Sentiment Analysis for Product Rating system that detects hidden sentiments in comments and rates the product accordingly. The system uses sentiment analysis methodology in order to achieve desired functionality. This project is an E-Commerce web application where the registered user will view the product and product features and will comment about the product. System will analyze the comments of various users and will rank product. We use a database of sentiment based keywords along with positivity or negativity weight in database and then based on these sentiment keywords mined in user comment is ranked. Comment will be analyzed by comparing the comment with the keywords stored in database. The System takes comments…
Read More

Detecting E Banking Phishing Websites Using Associative Classification

Data mining, Multimedia, Networking, Security & Encryption, Web Application
Name Detecting E Banking Phishing Websites Using Associative Classification Technology DotNET,MS SQL Category Web Application Description There are number of users who purchase products online and make payment through e- banking. There are e- banking websites who ask user to provide sensitive data such as username, password or credit card details etc often for malicious reasons. This type of e-banking websites is known as phishing website. In order to detect and predict e-banking phishing website. We proposed an intelligent, flexible and effective system that is based on using classification Data mining algorithm. We implemented classification algorithm and techniques to extract the phishing data sets criteria to classify their legitimacy. The e-banking phishing website can be detected based on some important characteristics like URL and Domain Identity, and security and encryption…
Read More

Fingerprint Voting System Project

Multimedia, Parallel And Distributed System, Web Application
Name Fingerprint Voting System Project Technology DotNET,MS SQL Category Web Application Description Fingerprint Based Voting Project is a application where the user is recognized by his finger pattern. Since the finger pattern of each human being is different, the voter can be easily authenticated. The system allow the voter to vote through his fingerprint. Finger print is used to uniquely identify the user. The finger print minutiae features are different for each human being. Finger print is used as a authentication of the voters. Voter can vote the candidate only once, the system will not allow the candidate to vote for the second time. The system will allow admin to add the candidate name and candidate photo who are nominated for the election. Admin only has the right to add…
Read More

Graphical Password To Avoid Shoulder Surfing

Multimedia, Security & Encryption, Web Application
Name Graphical Password To Avoid Shoulder Surfing Technology DotNET,MS SQL Category Web Application Description Since conventional password schemes are vulnerable to shoulder surfing, many shoulder surfing resistant graphical password schemes have been proposed. However, as most users are more familiar with textual passwords than pure graphical passwords, text-based graphical password schemes have been proposed. Unfortunately, none of existing text-based shoulder surfing resistant graphical password schemes is both secure and efficient enough. In this paper, we propose an improved text-based shoulder surfing resistant graphical password scheme by using colours. In the proposed scheme, the user can easily and efficiently login system. Next, we analyze the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder surfing and accidental login. The shoulder surfing attack in…
Read More

E Authentication System Using QR Code & OTP

Cloud Computing, Data mining, Networking, Parallel And Distributed System, Security & Encryption, Web Application
Name E Authentication System Using QR Code & OTP Technology DotNET,MS SQL Category Web Application Description In the proposed scheme, the user can easily and efficiently login into the system. We analyze the security and usability of the proposed scheme, and show the resistance of the proposed scheme to hacking of login credentials, shoulder surfing and accidental login. The shoulder surfing attack can be performed by the adversary to obtain the user’s password by watching over the user’s shoulder as he enters his password. Since, we have come up with a secure system schemes with different degrees of resistance to shoulder surfing have been proposed. In order to use this authentication system, user need to first register himself into this system by filing up the basic registration details. After a…
Read More

Encryption & Decryption Using Deffie Hellman Algorithm

Multimedia, Security & Encryption, Web Application
Name Encryption & Decryption Using Deffie Hellman Algorithm Technology MsSql, Dot NET Category Web Application Description The spectacular growth of the Internet has spawned an increased awareness of and interest in security issues. Although security has been considered in the design of the basic Internet protocols, many applications have been and are being designed with minimal attention paid to issues of confidentiality, authentication, and privacy. As our daily activities become more and more reliant upon data networks, the importance of an understanding of such security issues will only increase. Many cryptographic algorithms (e.g., DES, AES) require the establishment of shared keying material in advance. Manual distribution of keying material is inefficient and complex. This is where the Diffie-Hellman Key Agreement algorithm is useful. The project is developed using Visual Studio…
Read More

Android Smart Ticketing Using Rfid

Mobile Computing
Name Android Smart Ticketing Using Rfid Technology Android, Dot net Category Mobile Computing Description This is an advanced Ticketing System making it easier for the commuter to travel in the bus and the driver to keep exact records of the passengers. This System is a web and Android Based System where the Android will have to apps one for the passenger and one for the bus which is connected to the RFID Reader while the web part is Purely Admin to set the fares and bus tops and to keep and monitor the current updates of a particular bus and passengers on it. This System has the potential of letting the admin know where the bus is exactly and how many passengers are travelling on the bus with their details.…
Read More

Restaurant Table Booking Android Application

Mobile Computing
Name Restaurant Table Booking Android Application Technology Android, Dot net Category Mobile Computing Description Table management systems and restaurant reservation systems are becoming increasingly sophisticated, if you’re considering installing a reservation system for your restaurant there are a number of factors to consider when selecting a system and provider. A restaurant reservation and table management system should provide you with the tools to plan and run your restaurant bookings effectively and manage tables, efficient table management means that a restaurant can maximize the potential of their dining room and this in turn should increase profits. Restaurant reservation systems with the option of combining a table management system are increasing in popularity with restaurant operators. With an increasing number of diners now using the web to find details of their favored…
Read More

Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search

Security & Encryption
Name Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search Technology Dot net, MS SQL Category Security Description Existing semantically secure public-key searchable encryption schemes take search time linear with the total number of the ciphertexts. This makes retrieval from large-scale databases prohibitive. To alleviate this problem, this paper proposes Searchable Public-Key Ciphertexts with Hidden Structures (SPCHS) for keyword search as fast as possible without sacrificing semantic security of the encrypted keywords. In SPCHS, all keyword-searchable ciphertexts are structured by hidden relations, and with the search trapdoor corresponding to a keyword, the minimum information of the relations is disclosed to a search algorithm as the guidance to find all matching ciphertexts efficiently. We construct a SPCHS scheme from scratch in which the ciphertexts have a hidden star-like structure.…
Read More

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Cloud Computing, Data mining, Parallel And Distributed System, Security & Encryption, Web Application
With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the large size of shared data in the cloud. In this paper, we propose…
Read More

Identity-Based Distributed Provable Data Possession in Multicloud Storage

Cloud Computing
Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether their outsourced data is kept intact without downloading the whole data. In some application scenarios, the clients have to store their data on multi-cloud servers. At the same time, the integrity checking protocol must be efficient in order to save the verifier’s cost. From the two points, we propose a novel remote data integrity checking model: ID-DPDP (identity-based distributed provable data possession) in multi-cloud storage. The formal system model and security model are given. Based on the bilinear pairings, a concrete ID-DPDP protocol is designed. The proposed ID-DPDP protocol is provably secure under the hardness assumption of the standard CDH (computational Diffie-Hellman) problem. In addition to the structural advantage of elimination of…
Read More

Query Aware Determinization of Uncertain Objects

Data mining
This paper considers the problem of determinizing probabilistic data to enable such data to be stored in legacy systems that accept only deterministic input. Probabilistic data may be generated by automated data analysis/enrichment techniques such as entity resolution, information extraction, and speech processing. The legacy system may correspond to pre-existing web applications such as Flickr, Picasa, etc. The goal is to generate a deterministic representation of probabilistic data that optimizes the quality of the end-application built on deterministic data. We explore such a determinization problem in the context of two different data processing tasks -- triggers and selection queries. We show that approaches such as thresholding or top-1 selection traditionally used for determinization lead to suboptimal performance for such applications. Instead, we develop a query-aware strategy and show its advantages…
Read More

Discovery of Ranking Fraud for Mobile Apps

Data mining
Ranking fraud in the mobile App market refers to fraudulent or deceptive activities which have a purpose of bumping up the Apps in the popularity list. Indeed, it becomes more and more frequent for App develops to use shady means, such as inflating their Apps’ sales or posting phony App ratings, to commit ranking fraud. While the importance of preventing ranking fraud has been widely recognized, there is limited understanding and research in this area. To this end, in this paper, we provide a holistic view of ranking fraud and propose a ranking fraud detection system for mobile Apps. Specifically, we investigate two types of evidences, ranking based evidences and rating based evidences, by modeling Apps’ ranking and rating behaviors through statistical hypotheses tests. In addition, we propose an optimization…
Read More

Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption

Cloud Computing
Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the Attribute-Based Encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this paper, we present a semi-anonymous privilege control scheme AnonyControl to address not only the data privacy but also the user identity privacy in existing access control schemes.AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi-anonymity. Besides, it also generalizes the file access control to the privilege control, by which…
Read More

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

Cloud Computing
The project defines and solve the problem of multi-keyword ranked search over encrypted cloud data (MRSE) while preserving strict system wise privacy in the cloud computing paradigm. Data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data have to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data search service is of paramount importance. Considering the large number of data users and documents in the cloud, it is necessary to allow multiple keywords in the search request and return documents in the order of their relevance to these keywords. Related works on searchable encryption focus on single…
Read More