Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
4 views3 pages

1

The document outlines a software requirement specification for a searchable encryption scheme designed for cloud data, focusing on secure multi-keyword ranked search and dynamic operations on document collections. It details the product's purpose, functions, and the use of a secure kNN algorithm for encrypting index and query vectors. Additionally, it describes the intended audience, external interface requirements, and nonfunctional requirements such as performance and security.

Uploaded by

companygims
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views3 pages

1

The document outlines a software requirement specification for a searchable encryption scheme designed for cloud data, focusing on secure multi-keyword ranked search and dynamic operations on document collections. It details the product's purpose, functions, and the use of a secure kNN algorithm for encrypting index and query vectors. Additionally, it describes the intended audience, external interface requirements, and nonfunctional requirements such as performance and security.

Uploaded by

companygims
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

2

Table of Contents
Table of Contents ............................................................................................................................... 2

1. Introduction ................................................................................................................................... 3

1.1 Purpose ............................................................................................................................................. 3

1.2 Document Conventions .................................................................................................................... 3

1.3 Intended Audience and Reading Suggestions .................................................................................. 3

1.4 Product Scope................................................................................................................................... 3

1.5 References ........................................................................................................................................ 3

2. Overall Description ....................................................................................................................... 4

2.1 Product Perspective .......................................................................................................................... 4

2.2 Product Functions ............................................................................................................................. 4

3. External Interface Requirements ................................................................................................ 5

3.1 Hardware Interfaces ......................................................................................................................... 5

3.2 Software Interfaces........................................................................................................................... 5

4. System Features ............................................................................................................................. 7

4.1 Functional Requirements..................................................................................................... 7

5. Other Nonfunctional Requirements ............................................................................................ 8

5.1 Performance Requirements .............................................................................................................. 8

5.2 Security Requirements ..................................................................................................................... 8


5.3 Software Quality Attributes………………………………………………………………………….9

SOFTWARE REQUIREMENT SPECIFICATION


3

1. Introduction
1.1 Purpose

The rapid development of information technology and Internet of Things (IoT), enterprises
generate more and more big data, which needs to be stored and processed efficiently and
securely. Cloud computing is a developed storage platform and has many advantages including
low cost and scalability.
We design a searchable encryption scheme that supports both the accurate multi-keyword
ranked search and flexible dynamic operation on document collection

1.2 Document Conventions


This paper proposes a secure tree-based search scheme over the encrypted cloud data, which
supports multi-keyword ranked search and dynamic operation on the document collection.

1.3 Intended Audience and Reading Suggestions


 Users
 Cloud server maintainer
1.4 Product Scope

 The secure kNN algorithm is utilized to encrypt the index and query vectors, and
meanwhile ensure accurate relevance score calculation between encrypted index and
query vectors.
 To resist different attacks in different threat models, we construct two secure search
schemes: the basic dynamic multi-keyword ranked search (BDMRS) scheme in the
known ciphertext model, and the enhanced dynamic multi-keyword ranked search
(EDMRS) scheme in the known background model.

1.5 References

W3schools
Godaddy
Mysql installer

SOFTWARE REQUIREMENT SPECIFICATION


4

2 Overall Description
2.4 Product Perspective

 The main purpose of this project is to encrypt the data.


 The sensitive data will be encrypted before outsourcing for privacy requirements,
which obsoletes data utilization like keyword-based document retrieval.
 A secure multi keyword rank searched scheme over encrypted cloud data.

2.5 Product Functions

 It helps the owner to upload his file with encryption using RSA algorithm.
 It is used to help the server to encrypt the document using RSA Algorithm and to convert
the encrypted document to the Zip file with activation code and then activation code send
to the user for download.
 It ensure the user to search the files that are searched frequently using rank search. This
module allows the user to download the file using his secret key to decrypt the
downloaded data.

SOFTWARE REQUIREMENT SPECIFICATION

You might also like