2
Table of Contents
Table of Contents ............................................................................................................................... 2
1. Introduction ................................................................................................................................... 3
1.1 Purpose ............................................................................................................................................. 3
1.2 Document Conventions .................................................................................................................... 3
1.3 Intended Audience and Reading Suggestions .................................................................................. 3
1.4 Product Scope................................................................................................................................... 3
1.5 References ........................................................................................................................................ 3
2. Overall Description ....................................................................................................................... 4
2.1 Product Perspective .......................................................................................................................... 4
2.2 Product Functions ............................................................................................................................. 4
3. External Interface Requirements ................................................................................................ 5
3.1 Hardware Interfaces ......................................................................................................................... 5
3.2 Software Interfaces........................................................................................................................... 5
4. System Features ............................................................................................................................. 7
4.1 Functional Requirements..................................................................................................... 7
5. Other Nonfunctional Requirements ............................................................................................ 8
5.1 Performance Requirements .............................................................................................................. 8
5.2 Security Requirements ..................................................................................................................... 8
5.3 Software Quality Attributes………………………………………………………………………….9
SOFTWARE REQUIREMENT SPECIFICATION
3
1. Introduction
1.1 Purpose
The rapid development of information technology and Internet of Things (IoT), enterprises
generate more and more big data, which needs to be stored and processed efficiently and
securely. Cloud computing is a developed storage platform and has many advantages including
low cost and scalability.
We design a searchable encryption scheme that supports both the accurate multi-keyword
ranked search and flexible dynamic operation on document collection
1.2 Document Conventions
This paper proposes a secure tree-based search scheme over the encrypted cloud data, which
supports multi-keyword ranked search and dynamic operation on the document collection.
1.3 Intended Audience and Reading Suggestions
Users
Cloud server maintainer
1.4 Product Scope
The secure kNN algorithm is utilized to encrypt the index and query vectors, and
meanwhile ensure accurate relevance score calculation between encrypted index and
query vectors.
To resist different attacks in different threat models, we construct two secure search
schemes: the basic dynamic multi-keyword ranked search (BDMRS) scheme in the
known ciphertext model, and the enhanced dynamic multi-keyword ranked search
(EDMRS) scheme in the known background model.
1.5 References
W3schools
Godaddy
Mysql installer
SOFTWARE REQUIREMENT SPECIFICATION
4
2 Overall Description
2.4 Product Perspective
The main purpose of this project is to encrypt the data.
The sensitive data will be encrypted before outsourcing for privacy requirements,
which obsoletes data utilization like keyword-based document retrieval.
A secure multi keyword rank searched scheme over encrypted cloud data.
2.5 Product Functions
It helps the owner to upload his file with encryption using RSA algorithm.
It is used to help the server to encrypt the document using RSA Algorithm and to convert
the encrypted document to the Zip file with activation code and then activation code send
to the user for download.
It ensure the user to search the files that are searched frequently using rank search. This
module allows the user to download the file using his secret key to decrypt the
downloaded data.
SOFTWARE REQUIREMENT SPECIFICATION