N-Gram Fuzzy Keyword Search On Encrypted User Data in Cloud

Saumya Sharma, Amrita Bhagtani, Parth Agarwal, Ankit Mohite

Abstract


In this paper,  the different techniques that previously have been used for data storage like one storage server for storing both key and encrypted data, different fuzzy keyword search technique like wildcard based and N (2) gram based technique are discussed how the proposed model with 2 server (security and storage server) and how N (2) gram fuzzy keyword search is better than N(3) gram is explained. We demonstrate encrypting and uploading of user files, downloading decrypted files, performing fuzzy search and ensuring data security per user.

Full Text:

PDF

References


L. Liu, C. Zhang, S. Yao, S. Wang, and W. Zhou, "Fuzzy Keyword search with safe index over Encrypted cloud computing," TELKOMNIKA Indonesian Journal of Electrical Engineering, vol. 11, no. 10, Oct. 2013.

N. Smetanin and V. my complete profile, "Fuzzy string search," 2011. [Online]. Available: http://ntz-develop.blogspot.in/2011/03/fuzzy-string-search.html. Accessed: Nov. 15, 2016.

A. Meharwade and G. A. Patil, "Efficient Keyword search over Encrypted cloud data," Procedia Computer Science, vol. 78, pp. 139–145, 2016.

H. Bast and M. Celikik, "Efficient fuzzy search in large text collections," ACM Transactions on Information Systems, vol. 31, no. 2, pp. 1–59, May 2013.

J. Wang et al., "Efficient verifiable fuzzy keyword search over encrypted data in cloud computing," Computer Science and Information Systems, vol. 10, no. 2, pp. 667–684, 2013.

"Multi-keyword ranked search over Encrypted cloud data supporting synonym query," International Journal of Science and Research (IJSR), vol. 5, no. 6, pp. 2044–2048, Jun. 2016.

W. Zhou, L. Liu, H. Jing, C. Zhang, S. Yao, and S. Wang, "K-gram based fuzzy Keyword search over Encrypted cloud computing," Journal of Software Engineering and Applications, vol. 06, no. 01, pp. 29–32, 2013.

N. Shekokar, K. Sampat, C. Chandawalla, and J. Shah, "Implementation of fuzzy Keyword search over Encrypted data in cloud computing," Procedia Computer Science, vol. 45, pp. 499–505, 2015.

P. null, "Enhanced privacy-preserving Multi-Keyword ranked search over Encrypted cloud data," American Journal of Networks and Communications, vol. 4, no. 3, p. 25, 2015.


Refbacks

  • There are currently no refbacks.


Abava  Кибербезопасность IT Congress 2024

ISSN: 2307-8162