SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
ISSN: 2278 – 1323
                      International Journal of Advanced Research in Computer Engineering & Technology
                                                                          Volume 1, Issue 4, June 2012


        EKST: Efficient Keyword Searching
   Technique for Encrypted Data in CipherCloud
                 V. Sravan Kumar Reddy                                                     Professor C. Rajendra
              M. Tech (SE), CSE Department,                                               Head, CSE Department,
               ASCET, Andhrapradesh, India,                                             ASCET, Andhrapradesh, India,
              vsravankumarreddy@gmail.com

      Abstract— cloud, coming days is accustomed, more and               The different users in the cloud storage may interest to
more receptive data are being centralized into the cloud. In          recover the detailed information files they want in a
cloud, we make perceptive information habitually have to be           specified time. In cloud computing the trendy technique to
ciphertext before outsourcing because of protecting of data           reclaim the information is keyword searching, retrieving
privacy; it makes efficient information exploitation a very
tough assignment. While traditional searchable ciphertext
                                                                      encrypted information files back which is utterly unfeasible
schemes permit a consumer to securely seek over ciphertext            in cloud computing but the keyword based vanished this
information through keywords and selectively reclaim records          scenario. The users can recoup their information in the
of attention, these techniques bear only precise keyword              cloud by using he keyword searching techniques, these
search. That is, here is lenience of trivial typos and configure      techniques are mostly applied in plain text search scenarios,
inconsistencies which, on another hand, are distinctive               like Google [1].
consumer penetrating activities and happen very recurrently.             Unhappily, the plaintext keyword search techniques are
This momentous negative aspect makes existing techniques              not suitable for the cloud computing, because the encrypted
incongruous in cloud computing as it significantly affects
                                                                      data won’t allow performing the search. The keywords
system usability, interpretation user penetrating experiences
very testing and system efficacy very low.                            contain significant information related to the data, so the
      In this paper, we proposing EKST an efficient keyword           encryption needs to protect the keyword privacy so secure
searching technique as a solution and solve the crisis of searching   searching techniques are needed in cloud computing. In
the fuzzy keyword over encrypted cipharcloud data while               recent years few securely searchable encryption methods [2]
maintaining keyword confidentiality. The proposed searching           on encrypted data have been developed. The securely
technique deeply enhances system usability by presentencing           searchable encryption scenarios regularly follow by indexing
the matching files when user’s searching inputs exactly match
the predefined keywords or the closest possible matching files        the each keyword in encrypted data file and by associating
based on keyword comparison semantics, when exact match               the indexed file with the keyword.
fails. Our EKST greatly reduces the storage and depiction                The searchable encryption techniques proposed in
overheads, we develop revise space to enumerate fuzzified             previous are not suitable for cloud computing to perfume the
keywords similarity and implement a method on constructing            searches, because they support only the exact keyword
fuzzified keyword sets, Through accurate security study, we           search. That is, there is no lenience of slight typos and
show that our proposal is secure and privacy-preserving.
                                                                      plan inconsistencies. It is fairly frequent that users’ probing
Keywords: Keyword Searching, fuzzy keywords, cipharcloud
                                                                      keywords would not exactly match those fixed keywords
                                                                      due to the possible typos, such as Illiterate and Iliterate
                                                                      representation inconsistence, such as PO BOX and P . O .
                       I.    INTRODUCTION                             B o x . and/or her lack of exact knowledge about the data.
   The Cloud Computing is added common to centralize the              The adolescent mode to support fuzzy keyword search is
perceptive data in to the cloud, for example emails data,             by using simple spell check technique. But, this approach
important documents of government, health data records and            does not completely fulfill the requirement to solve the problem
etc. The information owners can calmed from encumber of               and sometimes can be unsuccessful due to, it requires added
information storage and maintenance by storing their data in          interface of user to resolve the right word from the
to the cloud storage so as to enjoy the on-demand high                candidates generated by the spell check algorithm, this
quality data storage service. The data stored in outsource            may gratuitously costs user’s extra computation effort; on
cloud may risk because actuality the data owners and cloud            the other hand, in case that user incorrectly types some
server are no in the same trusted province, this may causes           other keywords by mistake, the spell check algorithm
the data at risk. The cloud follows that responsive                   would not even work at all, as it c a n never discriminate
information usually should be encrypted prior to outsourcing          between two actual valid words. Thus, the drawbacks of
for information privacy and warfare unwanted accesses.                existing approach indicate the important need for new
But, encryption made helpful information exploitation a               techniques that support searching elasticity, tolerating both
very difficult task given that there could be a mammoth               minor typos and format inconsistencies.
amount of outsource information records. Furthermore, in                 As a solution, we are proposing EKST and efficient
Cloud Computing, information holders may share their                  keyword search technique yet privacy preserving in Cloud
outsourced information with a outsized number of users.               Computing. This keyword search technique really enhances
                                                                      the system usability by chronic the matching data files when




                                                                                                                                552
                                                   All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                         Volume 1, Issue 4, June 2012
user searching input keywords exactly match the redefined            incurs unexpectedly computation intricacy.
keywords or by using the keyword similarity semantics when
the match fails. Importantly we use distance editing to                                III.   PROBLEM FORMULATION
enumerate keywords similarities and impremted novel
                                                                     A. EKST Model
technique. i.e., a wild card based technique, for the construction
of fuzzy keyword sets. The wild card technique avoids the need          Our proposed cloud data system consisting of three
for specifying the one keyword after one keywords and                major roles cloud data owner, user and server. Given a
the size of the keyword sets is significantly reduced. Based         group of n encrypted data files DF = (F1 , F2 , . . . , FN )
on the constructed fuzzy keyword sets, we propose an                 stored in the cloud server, a predefined set of distinct
efficient fuzzy keyword search scheme. Through careful               keywords KW = {kw1 kw2 , ..., kwp}, the endorsed users
security scrutiny, we show that the proposed solution is             will get a search service from the cloud server to search
secure and privacy-preserving, while correctly realizing the         over the encrypted data DF. We assume the endorsement
                                                                     between the data owner and users is appropriately done.
goal of fuzzy keyword search.
                                                                     An endorsed user types in a request to selectively regain
                     II.   RELATED WORK                              data files of his/her interest. The data files and the search
                                                                     request association will be done by the server, in the
   Plaintext fuzzy keyword search, today the significance            association process every file is indexed by a file ID and
of fuzzy keyword search has established concentration in             associated to a set of keywords. The EKST fuzzy keyword
the circumstance of plain text searching in data repossession        search scheme returns the search results according to the
area [ 11]. They proposed a solution to this problem in the          following rules:
conventional retrieval model by allowing data holder to               i. The server returns the datafiles containing the
search without using try-and-get approach for verdict                     keywords; if the user’s input words perfectly matches the
pertinent data based on estimated keyword matching. At the                predefined set of keywords.
first glimpse, it seems probable for one to straightly apply         ii. Depends on predefined similarity semantics the server
these keyword matching algorithms to the milieu of                        will return the closet possible results; if there exist
searchable encryption by computing the trapdoors on a                     typos and/or format inconsistency in the searching
character base within an alphabet. However, this                          input.
unimportant creation suffers from the glossary and data              Structure of fuzzy keyword search is shown in the Fig. 1.
attacks and fails to achieve the search privacy.
   Searchable encryption, In [2][10] extensively
considered about the predictable searchable encryption in
the framework of cryptography. Most of them described on
effectiveness improvements and security description
formalizations. Song [3] projected the initial structure of
searchable encryption, in his proposal every word in the
document is treated as keyword and is encrypted separately
less a particular two layered structure. The Bloom filters to
build the indexes for the data in the documents are
proposed by Gosh in [4]. To achieve the more proficient
search system two authors Chang [7] and Curtmola [8]                               Figure 1. Structure of fuzzy keyword search
proposed an approach which single encrypted hash table
index is built for the entire document. The Boneh [5]                B. Hazard Model
proposed a public key based searchable encryption method                 We reflect on a semi-trusted server. While performing
as a complementary approach of Chang and Curtomola                   keyword based search over DF the cloud server could attempt to
with an analogous scenario to that of Song model. The                obtain other receptive data form the data user’s requests even if data
techniques described in this session or suitable for the             files are encrypted, thus the search should be conducted in a secure
plaintext encryption, but not for the Cloud Computing,               manner that allows data files to be strongly retrieved while
Because Cloud doest not support the plaintext searchable             illuminating as little data as potential to the cloud server. In our
encryption techniques. All these presented methods are for           model, when designing EKST, we will track the security description
the plain text by matching accurate keywords.                        presented in the traditional searchable encryption. The security of
   Private matching in [14] is another related notion, and           remotely stored data files and index and pattern of queries is more
the author has been considered typically in the                      important.
circumstance of secure shared computation to let multiple            C. Devise Goals
parties compute some task of             their   own    data            In EKST, we tackle the problem of underneath
collaboratively without revealing their data to the others.          competent yet privacy preserving fuzzy keyword search
These functions could be crossroads or estimated personal            services over encrypted data in the cloud. Specifically, we
matching of two sets, etc. The private information                   have the subsequent goals: i) to discover new method for
retrieval [15] is an regularly used method to regain the             constructing storage competent fuzzy keyword sets; ii) to
similar items secretly, which has been generally functional          design proficient and valuable fuzzy search method based on
in information retrieval from database and usually



                                                                                                                                     553
                                                  All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                         Volume 1, Issue 4, June 2012
the structured fuzzy keyword sets; iii) to validate the                   as Enc(sk, FIDkwikwi). The index table {({Tkwi }kwi∈ Skwi,d ,
security of the proposed scheme.                                          Enc(sk, FIDwikwi))}wi∈ W and encrypted data files are
D. Preliminaries                                                          outsourced to the cloud server for stroage;
                                                                      ii. To search with kw, the authorized user computes the
    Edit Distance There are so many methods to determine                  trapdoor Tkw of kw and sends it to the server;
the fuzzy keyword similarity. In this paper, we remedy to
                                                                     iii. Receiving the search request Tkw, the server compares it
the well studied edit distance [16] for our purpose. The edit
                                                                          with the index table and returns all the possible
distance d(kw1, kw2) between two words kw1,kw2 is the
                                                                          encrypted file identifiers {Enc(sk, FIDwikwi)} according
number of operations required to transform one of them into
the other. The three primitive operations are 1) Substitution:            to the fuzzy keyword definition. The user decrypts the
changing one character to another in a word; 2) Deletion:                 returned results and retrieves pertinent files of interest.
deleting one character from a word; 3) Insertion: inserting a          V.    CONSTRUCTIONS OF EFFECTIVE KEYWORD SEARCH IN
single character into a word. Given a keyword kw, we let                                           CLOUD
Sw,d denote the set of words kw′ satisfying ed(kw,kw′) ≤ d for
a certain integer d.                                                     The main proposal behind our EKST is two-fold:
    Fuzzy Keyword Search Using edit distance, the definition             i. building up fuzzy keyword sets that incorporate not
of fuzzy keyword search can be formulated as follows:                       only the exact keywords but also the ones differing
Given a collection of n encrypted data files DF = (F1, F2, . .              slightly due to minor typos, format inconsistencies,
. , FN) stored in the cloud server, a set of distinct keywords              etc.;
KW = {kw1,kw2, ...,kwp} with predefined edit distance d, and            ii. designing an efficient and secure searching approach
a searching input (kw, k) with edit distance k (k ≤ d), the                 for file retrieval based on the resulted fuzzy keyword
execution of fuzzy keyword search returns a set of file IDs                 sets.
whose corresponding data files possibly contain the word w,
                                                                     A. Advanced Technique for building Fuzzy Keyword Sets
denoted as FIDw: if kw = kwi ∈ KW, then return FIDwi ;
otherwise, if kw 6∈ KW, then return {FIDwi}, where                      The structure of fuzzy keyword sets aims to improve the
d(kw,kwi) ≤ k. Note that the above definition is based on the        straightforward method, for both the storage and efficiency
assumption that k ≤ d. In fact, d can be different for distinct      in the searching we now proposing an advanced technique
keywords and the system will return {FIDwi} satisfying               for the straightforward method improvement. To elaborate
d(w,wi) ≤ min{k, d} if exact match fails.                            the proposed advanced technique we focus on the case of
                                                                     edit distance d = 1 with out loss of simplification.
          IV.    THE STRAIGHTFORWARD APPROACH                           For better values of d, the analysis is similar. Note that the
     Prior to describing our structure of fuzzy keyword sets,        procedure is carefully designed in such a way that while
we first put forward a straightforward method that achieves          suppressing the fuzzy keyword set, it will not affect the
all the functions of fuzzy keyword search, which aims at             search accuracy.
giving an overview of how fuzzy search scheme works over                Wildcard-based Fuzzy Set Construction In the above
encrypted data.                                                      straightforward approach, all the variants of the keywords
    Assume ∏ = (Stup (1λ), Ec (sk, ·), Dc (sk, ·)) is a              have to be listed even if an operation is performed at the
symmetric encryption method, where sk is a secret key,               same position. Based on the above scrutiny, we proposed to
Setup (1λ) is the setup algorithm with security parameter λ,         use a wildcard to signify edit operations at the same
Enc(sk, ·) and Dc(sk, ·) are the encryption and decryption           position. The wildcard-based fuzzy set of wi with edit
algorithms, respectively. Let Tkwi denote a trapdoor of              distance d is denoted as Skwi,d={S′kwi,0, S′kwi,1, · · · , S′kwi,d},
keyword kwi. Trapdoors of the keywords can be realized by            where S′kwi,τ denotes the set of words kw′i with τ wildcards.
applying a one-way function f, which is similar as [2], [4],         Note each wildcard represents an edit operation on wi. For
[8]: Given a keyword kwi and a secret key sk, we can                 example, for the keyword CASTLE with the pre-set edit
compute the trapdoor of kwi as Twi = f(sk,kwi).                      distance 1, its wildcard-based fuzzy keyword set can be
The scheme of the fuzzy keyword search goes as follows:              constructed as SCASTLE,1 = {CASTLE, *CASTLE, *ASTLE,
     We begin by constructing the fuzzy keyword set Skwi,d           C*ASTLE, C*STLE, · · · , CASTL*E, CASTL*, CASTLE*}.
for each keyword kwi ∈ W (1 ≤ i ≤ p) with edit distance d.           The total number of variants on CASTLE constructed in this
The intuitive way to construct the fuzzy keyword set of kwi          way is only 13 + 1, instead of 13 × 26 + 1 as in the above
is to enumerate all possible words kw′i that satisfy the             exhaustive enumeration approach when the edit distance is
similarity criteria ed(kwi,kw′i) ≤ d, that is, all the input words   set to be 1. Generally, for a given keyword kwi with length ℓ,
with edit distance d from wi are listed. For example, the            the size of Skwi,1 will be only 2ℓ + 1 + 1, as compared to
following is the listing variants after a substitution operation     (2ℓ + 1) × 26 + 1 obtained in the straightforward approach.
on the first character of keyword CASTLE: {AASTLE,                   The larger the pre-set edit distance, the more storage
BASTLE, DASTLE, · · ·, YASTLE, ZASTLE}. Based on                     overhead can be reduced: with the same setting of the
the resulted fuzzy keyword sets, the fuzzy search over               example in the straightforward approach, the proposed
encrypted data is conducted as follows:                              technique can help reduce the storage of the index from
 i. To build an index for kwi, the data owner computes               30GB to approximately 40MB. In case the edit distance is
     trapdoors Tkwi = f(sk,kw′i) for each kw′i ∈ Skwi,d with a       set to be 2 and 3, the size of Skwi,2 and Skwi,3 will be C1 ℓ+1 +
     secret key sk shared between data owner and                     C1 ℓ · C1 ℓ +2C2 ℓ+2 and C1 ℓ + C3 ℓ + 2C2 ℓ + 2C2 ℓ · C1 ℓ . In
     authorized users. The data owner also encrypts FIDkwi




                                                                                                                                   554
                                                  All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                         Volume 1, Issue 4, June 2012
other words, the number is only O(ℓd) for the keyword with           ed(kwi,kw) ≤ 1 because they will be the same after at most
length ℓ and edit distance d.                                        one substitution from kwi. The other cases can be analyzed
                                                                     in a similar way and are omitted. Now, assuming that it
B. The Efficient Keyword Search Technique
                                                                     holds when n∗ = γ, we need to prove it also holds when n∗ =
    Based on the storage-efficient fuzzy keyword sets, we            γ + 1. If ˆkw∗ = e∗1 e∗2 · · · e∗ n ∈ Skwi,d ∩ Skw,k, where e∗i = ej
show how to construct an efficient and effective fuzzy               or e∗i = e∗.
keyword search scheme. The scheme of the fuzzy keyword                   For a wildcard at position t, cancel the primary
search goes as follows:                                              operations and relapse it to the unique typeset in kwi and kw
 i. To build an index for wi with edit distance d, the data          at this position. Assume two rudiments kw∗ i and kw∗ are
     owner first constructs a fuzzy keyword set Skwi,d using         resultant from them correspondingly. Then perform one
     the wildcard based technique. Then he computes                  operation at position t of tw∗ i to make the character of twi at
     trapdoor set {Tkw′ I } for each kw′i ∈ Skwi,d with a secret     this position be the same with kw, which is denoted by kw′i.
     key sk shared between data owner and authorized users.          After this operation, kw∗i will be changed to kw∗, which has
     The data owner encrypts FIDkwi as Enc(sk, FIDkwikwi).           only k wildcards. Therefore, we have ed(kw′i ,kw) ≤ γ from
     The index table {({Tkw′ I }k i∈ Skwi,d , Enc(sk,                the assumption.We know that ed(kw′i,kw) ≤ γ and ed(kw′i
     FIDkwikwi))}kwi∈ kW and encrypted data files are                ,kwi) = 1, based on which we know that ed(kwi,kw) ≤ γ + 1.
     outsourced to the cloud server for storage;                     Thus, we can get ed(kw,kwi) ≤ n∗. It renders the
ii. To search with (kw, k), the authorized user computes             contradiction ed(kw,kwi) ≤ k because n∗ ≤ k. Therefore, Skwi,d
     the trapdoor set {Tkw′}kw′∈ Skw,k , where Sw,k is also          ∩ Skw,k is empty if ed(kw,kwi) > k.
     derived from the wildcard-based fuzzy set construction.
     He then sends {Tkw′}kw′∈Skw,k to the server;                    Theorem 2: The EKST is secure concerning the search
                                                                     privacy.
                   VI.   SECURITY ANALYSIS
   This section analyzes the accuracy and security of the            Evidence: we need index privacy by using the reduction
proposed EKST. At first, we show the correctness of the              because in the wildcard based method the estimation of
schemes in terms entirety and reliability.                           index and request of the same keyword is alike. We build an
                                                                     algorithm A′ that utilizes A to determine whether some
Theorem 1: The wildcard based technique satisfies both               function pf′(·) is a pseudo-random function such that pf′(·) is
entirety and reliability. Specifically, upon receiving the           equal to pf(sk, ·) or a random function. A′ has an access to an
request of kw, all of the keywords {kwi} will be returned if         oracle Opf′(·) that takes as input secret value x and returns
and only if ed(kw,kwi) ≤ k. The evidence of this theorem can         pf′(x). Which can be relaxed by adding some redundant
be reduced to the following Lemma:                                   trapdoors? A′ picks one random rb ∈ {0, 1} and sends kw∗b
                                                                     to the challenger. Then, A′ is given a challenge value y,
Lemma 1: The intersection of the fuzzy sets Skwi,d and Skw,k         which is either computed from a pseudo-random function
for kwi and kw is not empty if and only if ed(kw,kwi) ≤ k.           pf(sk, ·) or a random function. A′ sends y back to A, who
                                                                     answers with rb′ ∈ {0, 1}. Suppose A guesses rb correctly
Evidence: First, we show that Skwi,d∩Skw,k is not empty when         with nonnegligible probability, which indicates that the
ed(kw,kwi) ≤ k. To prove this, it is enough to find an element       value is not randomly computed. Then, A′ makes a decision
in Skwi,d ∩Skw,k. Let kw = e1e2 · · · es and kwi = c1c2 · · · ct,    that pf′(·) is a pseudo-random function. As a result, based on
where all these ei and cj are single characters. After               the assumption of the indistinguishability of the pseudo-
ed(kw,kwi) edit operations, kw can be changed to kwi                 random function from some real random function, A at most
according to the definition of edit distance. Let kw∗ = e∗1 e∗2      guesses b correctly with approximate probability 1/2. Thus,
· · · e∗ m, where e∗i = ej or e∗i = e∗ if any operation is           the search privacy is obtained.
performed at this position. Since the edit operation is                                     VII. CONCLUSION
inverted, from kwi, the same positions containing wildcard at
kw∗ will be performed. Because ed(kw,kwi) ≤ k, kw∗ is                   In this paper, we proposed EKST an efficient keyword
included in both Skwi,d and Skw,k, we get the result that Skwi,d ∩   searching technique for searching the fuzzy keyword over
Skw,k is not empty.                                                  encrypted cipharcloud data while maintaining keyword
    Next, we prove that Skwi,d∩Skw,k is empty if ed(kw,kwi) >        confidentiality. The proposed searching technique deeply
k. The proof is given by reduction. Assume there exists an           enhances system usability by presentencing the matching
kw∗ belonging to Skwi,d ∩ Skw,k. We will show that ed(kw,kwi)        files when user’s searching inputs exactly match the
≤ k, which reaches a contradiction. First, from the                  predefined keywords or the closest possible matching files
assumption that kw∗ ∈ Skwi,d ∩ Skw,k, we can get the number          based on keyword comparison semantics, when exact match
of wildcard in w∗, which is denoted by n∗, is not greater than       fails. Our EKST greatly reduces the storage and depiction
k. Next, we prove that ed(kw,kwi) ≤ n∗. We will prove the            overheads, we develop revise space to enumerate fuzzified
inequality with induction method. First, we prove it holds           keywords similarity and implement a method on
when n∗ = 1. There are nine cases be considered: If kw∗ is           constructing fuzzified keyword sets, through accurate
derived from the deletion of both kwi and kw, then,                  security study, we shown that our proposal is secure and
ed(kwi,kw) ≤ 1 because the other characters are the same             privacy-preserving.
except the character at the same position. If the operation is
deletion from kwi and substitution from kw, we have                                            REFERENCES




                                                                                                                                   555
                                                  All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                         International Journal of Advanced Research in Computer Engineering & Technology
                                                                             Volume 1, Issue 4, June 2012

[1] Google, “Britney spears spelling correction,” Referenced online at
    http: //www.google.com/jobs/britney.html, June 2009.
[2] M. Bellare, A. Boldyreva, and A. O’Neill, “Deterministic and efficiently
    searchable encryption,” in Proceedings of Crypto 2007, volume 4622 of
   LNCS. Springer-Verlag, 2007.
[3] D. Song, D. Wagner, and A. Perrig, “Practical techniques for searches
    on encrypted data,” in Proc. of IEEE Symposium on Security and
      Privacy’00, 2000.
[4] E.-J. Goh, “Secure indexes,” Cryptology ePrint Archive, Report
      2003/216 2003, http://eprint.iacr.org/.
[5] D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, “Public key
      encryption with keyword search,” in Proc. of EUROCRYP’04, 2004.
[6] B. Waters, D. Balfanz, G. Durfee, and D. Smetters, “Building an
      encrypted and searchable audit log,” in Proc. of 11th Annual Network
      and Distributed System, 2004.
[7] Y.-C. Chang and M. Mitzenmacher, “Privacy preserving keyword
      searches on remote encrypted data,” in Proc. of ACNS’05, 2005. [8]
      R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, “Searchable
      symmetric encryption: improved definitions and efficient
      constructions,” in Proc. of ACM CCS’06, 2006.
[9] D. Boneh and B. Waters, “Conjunctive, subset, and range queries on
      encrypted data,” in Proc. of TCC’07, 2007, pp. 535–554.
[10] F. Bao, R. Deng, X. Ding, and Y. Yang, “Private query on encrypted
      data in multi-user settings,” in Proc. of ISPEC’08, 2008.
[11] C. Li, J. Lu, and Y. Lu, “Efficient merging and filtering algorithms for
      approximate string searches,” in Proc. of ICDE’08, 2008.
[12] A. Behm, S. Ji, C. Li, , and J. Lu, “Space-constrained gram-based
      indexing for efficient approximate string search,” in Proc. of
      ICDE’09.
[13] S. Ji, G. Li, C. Li, and J. Feng, “Efficient interactive fuzzy keyword
      search,” in Proc. of WWW’09, 2009.
[14] J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. Strauss, and R. N.
      Wright, “Secure multiparty computation of approximations,” in Proc.
      Of ICALP’01.
[15] R. Ostrovsky, “Software protection and simulations on oblivious
      rams,” Ph.D dissertation, Massachusetts Institute of Technology,
      1992.
[16] V. Levenshtein, “Binary codes capable of correcting spurious
      insertions
     and deletions of ones,” Problems of Information Transmission, vol. 1,
     no. 1, pp. 8–17, 1965.




                                                                                                     556
                                                           All Rights Reserved © 2012 IJARCET

Contenu connexe

Tendances

Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...sharathdj
 
Multi-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud StorageMulti-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud StorageIRJET Journal
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...redpel dot com
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...LeMeniz Infotech
 
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In CloudTwo Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloudtheijes
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
 
Audit free cloud storage via deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryptionAudit free cloud storage via deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryptionKamal Spring
 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsIRJET Journal
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data SharingIJERA Editor
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED
 
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked SearchAccurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked SearchDakshineshwar Swain
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...IRJET Journal
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionPvrtechnologies Nellore
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...1crore projects
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
SPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher TextSPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher TextIJMTST Journal
 

Tendances (20)

Final 1st
Final 1stFinal 1st
Final 1st
 
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
 
Multi-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud StorageMulti-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud Storage
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In CloudTwo Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloud
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
Audit free cloud storage via deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryptionAudit free cloud storage via deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryption
 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
 
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked SearchAccurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
 
J018145862
J018145862J018145862
J018145862
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
SPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher TextSPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher Text
 

Similaire à Efficient Fuzzy Keyword Search Technique for Encrypted Data in Cloud Computing

Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingFuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingIJERA Editor
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search overIEEEFINALSEMSTUDENTPROJECTS
 
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...iosrjce
 
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic SchemeIRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic SchemeIRJET Journal
 
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...IRJET Journal
 
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Ba...
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Ba...Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Ba...
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Ba...JAYAPRAKASH JPINFOTECH
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET Journal
 
Secure Phrase Search for Intelligent Processing ofEncrypted Data in Cloud-Bas...
Secure Phrase Search for Intelligent Processing ofEncrypted Data in Cloud-Bas...Secure Phrase Search for Intelligent Processing ofEncrypted Data in Cloud-Bas...
Secure Phrase Search for Intelligent Processing ofEncrypted Data in Cloud-Bas...JAYAPRAKASH JPINFOTECH
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...IJCI JOURNAL
 
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataIRJET Journal
 
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPAM Publications
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...Iaetsd Iaetsd
 
Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataEfficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataIRJET Journal
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Pvrtechnologies Nellore
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataPrivacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataCloudTechnologies
 
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions  ieee java project - privacy-preserving multi-keywor...Ieeepro techno solutions  ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...hemanthbbc
 

Similaire à Efficient Fuzzy Keyword Search Technique for Encrypted Data in Cloud Computing (20)

Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingFuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
 
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
 
O01761103112
O01761103112O01761103112
O01761103112
 
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic SchemeIRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
 
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
 
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Ba...
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Ba...Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Ba...
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Ba...
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
 
J017547478
J017547478J017547478
J017547478
 
Secure Phrase Search for Intelligent Processing ofEncrypted Data in Cloud-Bas...
Secure Phrase Search for Intelligent Processing ofEncrypted Data in Cloud-Bas...Secure Phrase Search for Intelligent Processing ofEncrypted Data in Cloud-Bas...
Secure Phrase Search for Intelligent Processing ofEncrypted Data in Cloud-Bas...
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
 
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted Data
 
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
 
Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataEfficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted Data
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataPrivacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
 
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions  ieee java project - privacy-preserving multi-keywor...Ieeepro techno solutions  ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Dernier

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Efficient Fuzzy Keyword Search Technique for Encrypted Data in Cloud Computing

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 EKST: Efficient Keyword Searching Technique for Encrypted Data in CipherCloud V. Sravan Kumar Reddy Professor C. Rajendra M. Tech (SE), CSE Department, Head, CSE Department, ASCET, Andhrapradesh, India, ASCET, Andhrapradesh, India, vsravankumarreddy@gmail.com Abstract— cloud, coming days is accustomed, more and The different users in the cloud storage may interest to more receptive data are being centralized into the cloud. In recover the detailed information files they want in a cloud, we make perceptive information habitually have to be specified time. In cloud computing the trendy technique to ciphertext before outsourcing because of protecting of data reclaim the information is keyword searching, retrieving privacy; it makes efficient information exploitation a very tough assignment. While traditional searchable ciphertext encrypted information files back which is utterly unfeasible schemes permit a consumer to securely seek over ciphertext in cloud computing but the keyword based vanished this information through keywords and selectively reclaim records scenario. The users can recoup their information in the of attention, these techniques bear only precise keyword cloud by using he keyword searching techniques, these search. That is, here is lenience of trivial typos and configure techniques are mostly applied in plain text search scenarios, inconsistencies which, on another hand, are distinctive like Google [1]. consumer penetrating activities and happen very recurrently. Unhappily, the plaintext keyword search techniques are This momentous negative aspect makes existing techniques not suitable for the cloud computing, because the encrypted incongruous in cloud computing as it significantly affects data won’t allow performing the search. The keywords system usability, interpretation user penetrating experiences very testing and system efficacy very low. contain significant information related to the data, so the In this paper, we proposing EKST an efficient keyword encryption needs to protect the keyword privacy so secure searching technique as a solution and solve the crisis of searching searching techniques are needed in cloud computing. In the fuzzy keyword over encrypted cipharcloud data while recent years few securely searchable encryption methods [2] maintaining keyword confidentiality. The proposed searching on encrypted data have been developed. The securely technique deeply enhances system usability by presentencing searchable encryption scenarios regularly follow by indexing the matching files when user’s searching inputs exactly match the predefined keywords or the closest possible matching files the each keyword in encrypted data file and by associating based on keyword comparison semantics, when exact match the indexed file with the keyword. fails. Our EKST greatly reduces the storage and depiction The searchable encryption techniques proposed in overheads, we develop revise space to enumerate fuzzified previous are not suitable for cloud computing to perfume the keywords similarity and implement a method on constructing searches, because they support only the exact keyword fuzzified keyword sets, Through accurate security study, we search. That is, there is no lenience of slight typos and show that our proposal is secure and privacy-preserving. plan inconsistencies. It is fairly frequent that users’ probing Keywords: Keyword Searching, fuzzy keywords, cipharcloud keywords would not exactly match those fixed keywords due to the possible typos, such as Illiterate and Iliterate representation inconsistence, such as PO BOX and P . O . I. INTRODUCTION B o x . and/or her lack of exact knowledge about the data. The Cloud Computing is added common to centralize the The adolescent mode to support fuzzy keyword search is perceptive data in to the cloud, for example emails data, by using simple spell check technique. But, this approach important documents of government, health data records and does not completely fulfill the requirement to solve the problem etc. The information owners can calmed from encumber of and sometimes can be unsuccessful due to, it requires added information storage and maintenance by storing their data in interface of user to resolve the right word from the to the cloud storage so as to enjoy the on-demand high candidates generated by the spell check algorithm, this quality data storage service. The data stored in outsource may gratuitously costs user’s extra computation effort; on cloud may risk because actuality the data owners and cloud the other hand, in case that user incorrectly types some server are no in the same trusted province, this may causes other keywords by mistake, the spell check algorithm the data at risk. The cloud follows that responsive would not even work at all, as it c a n never discriminate information usually should be encrypted prior to outsourcing between two actual valid words. Thus, the drawbacks of for information privacy and warfare unwanted accesses. existing approach indicate the important need for new But, encryption made helpful information exploitation a techniques that support searching elasticity, tolerating both very difficult task given that there could be a mammoth minor typos and format inconsistencies. amount of outsource information records. Furthermore, in As a solution, we are proposing EKST and efficient Cloud Computing, information holders may share their keyword search technique yet privacy preserving in Cloud outsourced information with a outsized number of users. Computing. This keyword search technique really enhances the system usability by chronic the matching data files when 552 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 user searching input keywords exactly match the redefined incurs unexpectedly computation intricacy. keywords or by using the keyword similarity semantics when the match fails. Importantly we use distance editing to III. PROBLEM FORMULATION enumerate keywords similarities and impremted novel A. EKST Model technique. i.e., a wild card based technique, for the construction of fuzzy keyword sets. The wild card technique avoids the need Our proposed cloud data system consisting of three for specifying the one keyword after one keywords and major roles cloud data owner, user and server. Given a the size of the keyword sets is significantly reduced. Based group of n encrypted data files DF = (F1 , F2 , . . . , FN ) on the constructed fuzzy keyword sets, we propose an stored in the cloud server, a predefined set of distinct efficient fuzzy keyword search scheme. Through careful keywords KW = {kw1 kw2 , ..., kwp}, the endorsed users security scrutiny, we show that the proposed solution is will get a search service from the cloud server to search secure and privacy-preserving, while correctly realizing the over the encrypted data DF. We assume the endorsement between the data owner and users is appropriately done. goal of fuzzy keyword search. An endorsed user types in a request to selectively regain II. RELATED WORK data files of his/her interest. The data files and the search request association will be done by the server, in the Plaintext fuzzy keyword search, today the significance association process every file is indexed by a file ID and of fuzzy keyword search has established concentration in associated to a set of keywords. The EKST fuzzy keyword the circumstance of plain text searching in data repossession search scheme returns the search results according to the area [ 11]. They proposed a solution to this problem in the following rules: conventional retrieval model by allowing data holder to i. The server returns the datafiles containing the search without using try-and-get approach for verdict keywords; if the user’s input words perfectly matches the pertinent data based on estimated keyword matching. At the predefined set of keywords. first glimpse, it seems probable for one to straightly apply ii. Depends on predefined similarity semantics the server these keyword matching algorithms to the milieu of will return the closet possible results; if there exist searchable encryption by computing the trapdoors on a typos and/or format inconsistency in the searching character base within an alphabet. However, this input. unimportant creation suffers from the glossary and data Structure of fuzzy keyword search is shown in the Fig. 1. attacks and fails to achieve the search privacy. Searchable encryption, In [2][10] extensively considered about the predictable searchable encryption in the framework of cryptography. Most of them described on effectiveness improvements and security description formalizations. Song [3] projected the initial structure of searchable encryption, in his proposal every word in the document is treated as keyword and is encrypted separately less a particular two layered structure. The Bloom filters to build the indexes for the data in the documents are proposed by Gosh in [4]. To achieve the more proficient search system two authors Chang [7] and Curtmola [8] Figure 1. Structure of fuzzy keyword search proposed an approach which single encrypted hash table index is built for the entire document. The Boneh [5] B. Hazard Model proposed a public key based searchable encryption method We reflect on a semi-trusted server. While performing as a complementary approach of Chang and Curtomola keyword based search over DF the cloud server could attempt to with an analogous scenario to that of Song model. The obtain other receptive data form the data user’s requests even if data techniques described in this session or suitable for the files are encrypted, thus the search should be conducted in a secure plaintext encryption, but not for the Cloud Computing, manner that allows data files to be strongly retrieved while Because Cloud doest not support the plaintext searchable illuminating as little data as potential to the cloud server. In our encryption techniques. All these presented methods are for model, when designing EKST, we will track the security description the plain text by matching accurate keywords. presented in the traditional searchable encryption. The security of Private matching in [14] is another related notion, and remotely stored data files and index and pattern of queries is more the author has been considered typically in the important. circumstance of secure shared computation to let multiple C. Devise Goals parties compute some task of their own data In EKST, we tackle the problem of underneath collaboratively without revealing their data to the others. competent yet privacy preserving fuzzy keyword search These functions could be crossroads or estimated personal services over encrypted data in the cloud. Specifically, we matching of two sets, etc. The private information have the subsequent goals: i) to discover new method for retrieval [15] is an regularly used method to regain the constructing storage competent fuzzy keyword sets; ii) to similar items secretly, which has been generally functional design proficient and valuable fuzzy search method based on in information retrieval from database and usually 553 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 the structured fuzzy keyword sets; iii) to validate the as Enc(sk, FIDkwikwi). The index table {({Tkwi }kwi∈ Skwi,d , security of the proposed scheme. Enc(sk, FIDwikwi))}wi∈ W and encrypted data files are D. Preliminaries outsourced to the cloud server for stroage; ii. To search with kw, the authorized user computes the Edit Distance There are so many methods to determine trapdoor Tkw of kw and sends it to the server; the fuzzy keyword similarity. In this paper, we remedy to iii. Receiving the search request Tkw, the server compares it the well studied edit distance [16] for our purpose. The edit with the index table and returns all the possible distance d(kw1, kw2) between two words kw1,kw2 is the encrypted file identifiers {Enc(sk, FIDwikwi)} according number of operations required to transform one of them into the other. The three primitive operations are 1) Substitution: to the fuzzy keyword definition. The user decrypts the changing one character to another in a word; 2) Deletion: returned results and retrieves pertinent files of interest. deleting one character from a word; 3) Insertion: inserting a V. CONSTRUCTIONS OF EFFECTIVE KEYWORD SEARCH IN single character into a word. Given a keyword kw, we let CLOUD Sw,d denote the set of words kw′ satisfying ed(kw,kw′) ≤ d for a certain integer d. The main proposal behind our EKST is two-fold: Fuzzy Keyword Search Using edit distance, the definition i. building up fuzzy keyword sets that incorporate not of fuzzy keyword search can be formulated as follows: only the exact keywords but also the ones differing Given a collection of n encrypted data files DF = (F1, F2, . . slightly due to minor typos, format inconsistencies, . , FN) stored in the cloud server, a set of distinct keywords etc.; KW = {kw1,kw2, ...,kwp} with predefined edit distance d, and ii. designing an efficient and secure searching approach a searching input (kw, k) with edit distance k (k ≤ d), the for file retrieval based on the resulted fuzzy keyword execution of fuzzy keyword search returns a set of file IDs sets. whose corresponding data files possibly contain the word w, A. Advanced Technique for building Fuzzy Keyword Sets denoted as FIDw: if kw = kwi ∈ KW, then return FIDwi ; otherwise, if kw 6∈ KW, then return {FIDwi}, where The structure of fuzzy keyword sets aims to improve the d(kw,kwi) ≤ k. Note that the above definition is based on the straightforward method, for both the storage and efficiency assumption that k ≤ d. In fact, d can be different for distinct in the searching we now proposing an advanced technique keywords and the system will return {FIDwi} satisfying for the straightforward method improvement. To elaborate d(w,wi) ≤ min{k, d} if exact match fails. the proposed advanced technique we focus on the case of edit distance d = 1 with out loss of simplification. IV. THE STRAIGHTFORWARD APPROACH For better values of d, the analysis is similar. Note that the Prior to describing our structure of fuzzy keyword sets, procedure is carefully designed in such a way that while we first put forward a straightforward method that achieves suppressing the fuzzy keyword set, it will not affect the all the functions of fuzzy keyword search, which aims at search accuracy. giving an overview of how fuzzy search scheme works over Wildcard-based Fuzzy Set Construction In the above encrypted data. straightforward approach, all the variants of the keywords Assume ∏ = (Stup (1λ), Ec (sk, ·), Dc (sk, ·)) is a have to be listed even if an operation is performed at the symmetric encryption method, where sk is a secret key, same position. Based on the above scrutiny, we proposed to Setup (1λ) is the setup algorithm with security parameter λ, use a wildcard to signify edit operations at the same Enc(sk, ·) and Dc(sk, ·) are the encryption and decryption position. The wildcard-based fuzzy set of wi with edit algorithms, respectively. Let Tkwi denote a trapdoor of distance d is denoted as Skwi,d={S′kwi,0, S′kwi,1, · · · , S′kwi,d}, keyword kwi. Trapdoors of the keywords can be realized by where S′kwi,τ denotes the set of words kw′i with τ wildcards. applying a one-way function f, which is similar as [2], [4], Note each wildcard represents an edit operation on wi. For [8]: Given a keyword kwi and a secret key sk, we can example, for the keyword CASTLE with the pre-set edit compute the trapdoor of kwi as Twi = f(sk,kwi). distance 1, its wildcard-based fuzzy keyword set can be The scheme of the fuzzy keyword search goes as follows: constructed as SCASTLE,1 = {CASTLE, *CASTLE, *ASTLE, We begin by constructing the fuzzy keyword set Skwi,d C*ASTLE, C*STLE, · · · , CASTL*E, CASTL*, CASTLE*}. for each keyword kwi ∈ W (1 ≤ i ≤ p) with edit distance d. The total number of variants on CASTLE constructed in this The intuitive way to construct the fuzzy keyword set of kwi way is only 13 + 1, instead of 13 × 26 + 1 as in the above is to enumerate all possible words kw′i that satisfy the exhaustive enumeration approach when the edit distance is similarity criteria ed(kwi,kw′i) ≤ d, that is, all the input words set to be 1. Generally, for a given keyword kwi with length ℓ, with edit distance d from wi are listed. For example, the the size of Skwi,1 will be only 2ℓ + 1 + 1, as compared to following is the listing variants after a substitution operation (2ℓ + 1) × 26 + 1 obtained in the straightforward approach. on the first character of keyword CASTLE: {AASTLE, The larger the pre-set edit distance, the more storage BASTLE, DASTLE, · · ·, YASTLE, ZASTLE}. Based on overhead can be reduced: with the same setting of the the resulted fuzzy keyword sets, the fuzzy search over example in the straightforward approach, the proposed encrypted data is conducted as follows: technique can help reduce the storage of the index from i. To build an index for kwi, the data owner computes 30GB to approximately 40MB. In case the edit distance is trapdoors Tkwi = f(sk,kw′i) for each kw′i ∈ Skwi,d with a set to be 2 and 3, the size of Skwi,2 and Skwi,3 will be C1 ℓ+1 + secret key sk shared between data owner and C1 ℓ · C1 ℓ +2C2 ℓ+2 and C1 ℓ + C3 ℓ + 2C2 ℓ + 2C2 ℓ · C1 ℓ . In authorized users. The data owner also encrypts FIDkwi 554 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 other words, the number is only O(ℓd) for the keyword with ed(kwi,kw) ≤ 1 because they will be the same after at most length ℓ and edit distance d. one substitution from kwi. The other cases can be analyzed in a similar way and are omitted. Now, assuming that it B. The Efficient Keyword Search Technique holds when n∗ = γ, we need to prove it also holds when n∗ = Based on the storage-efficient fuzzy keyword sets, we γ + 1. If ˆkw∗ = e∗1 e∗2 · · · e∗ n ∈ Skwi,d ∩ Skw,k, where e∗i = ej show how to construct an efficient and effective fuzzy or e∗i = e∗. keyword search scheme. The scheme of the fuzzy keyword For a wildcard at position t, cancel the primary search goes as follows: operations and relapse it to the unique typeset in kwi and kw i. To build an index for wi with edit distance d, the data at this position. Assume two rudiments kw∗ i and kw∗ are owner first constructs a fuzzy keyword set Skwi,d using resultant from them correspondingly. Then perform one the wildcard based technique. Then he computes operation at position t of tw∗ i to make the character of twi at trapdoor set {Tkw′ I } for each kw′i ∈ Skwi,d with a secret this position be the same with kw, which is denoted by kw′i. key sk shared between data owner and authorized users. After this operation, kw∗i will be changed to kw∗, which has The data owner encrypts FIDkwi as Enc(sk, FIDkwikwi). only k wildcards. Therefore, we have ed(kw′i ,kw) ≤ γ from The index table {({Tkw′ I }k i∈ Skwi,d , Enc(sk, the assumption.We know that ed(kw′i,kw) ≤ γ and ed(kw′i FIDkwikwi))}kwi∈ kW and encrypted data files are ,kwi) = 1, based on which we know that ed(kwi,kw) ≤ γ + 1. outsourced to the cloud server for storage; Thus, we can get ed(kw,kwi) ≤ n∗. It renders the ii. To search with (kw, k), the authorized user computes contradiction ed(kw,kwi) ≤ k because n∗ ≤ k. Therefore, Skwi,d the trapdoor set {Tkw′}kw′∈ Skw,k , where Sw,k is also ∩ Skw,k is empty if ed(kw,kwi) > k. derived from the wildcard-based fuzzy set construction. He then sends {Tkw′}kw′∈Skw,k to the server; Theorem 2: The EKST is secure concerning the search privacy. VI. SECURITY ANALYSIS This section analyzes the accuracy and security of the Evidence: we need index privacy by using the reduction proposed EKST. At first, we show the correctness of the because in the wildcard based method the estimation of schemes in terms entirety and reliability. index and request of the same keyword is alike. We build an algorithm A′ that utilizes A to determine whether some Theorem 1: The wildcard based technique satisfies both function pf′(·) is a pseudo-random function such that pf′(·) is entirety and reliability. Specifically, upon receiving the equal to pf(sk, ·) or a random function. A′ has an access to an request of kw, all of the keywords {kwi} will be returned if oracle Opf′(·) that takes as input secret value x and returns and only if ed(kw,kwi) ≤ k. The evidence of this theorem can pf′(x). Which can be relaxed by adding some redundant be reduced to the following Lemma: trapdoors? A′ picks one random rb ∈ {0, 1} and sends kw∗b to the challenger. Then, A′ is given a challenge value y, Lemma 1: The intersection of the fuzzy sets Skwi,d and Skw,k which is either computed from a pseudo-random function for kwi and kw is not empty if and only if ed(kw,kwi) ≤ k. pf(sk, ·) or a random function. A′ sends y back to A, who answers with rb′ ∈ {0, 1}. Suppose A guesses rb correctly Evidence: First, we show that Skwi,d∩Skw,k is not empty when with nonnegligible probability, which indicates that the ed(kw,kwi) ≤ k. To prove this, it is enough to find an element value is not randomly computed. Then, A′ makes a decision in Skwi,d ∩Skw,k. Let kw = e1e2 · · · es and kwi = c1c2 · · · ct, that pf′(·) is a pseudo-random function. As a result, based on where all these ei and cj are single characters. After the assumption of the indistinguishability of the pseudo- ed(kw,kwi) edit operations, kw can be changed to kwi random function from some real random function, A at most according to the definition of edit distance. Let kw∗ = e∗1 e∗2 guesses b correctly with approximate probability 1/2. Thus, · · · e∗ m, where e∗i = ej or e∗i = e∗ if any operation is the search privacy is obtained. performed at this position. Since the edit operation is VII. CONCLUSION inverted, from kwi, the same positions containing wildcard at kw∗ will be performed. Because ed(kw,kwi) ≤ k, kw∗ is In this paper, we proposed EKST an efficient keyword included in both Skwi,d and Skw,k, we get the result that Skwi,d ∩ searching technique for searching the fuzzy keyword over Skw,k is not empty. encrypted cipharcloud data while maintaining keyword Next, we prove that Skwi,d∩Skw,k is empty if ed(kw,kwi) > confidentiality. The proposed searching technique deeply k. The proof is given by reduction. Assume there exists an enhances system usability by presentencing the matching kw∗ belonging to Skwi,d ∩ Skw,k. We will show that ed(kw,kwi) files when user’s searching inputs exactly match the ≤ k, which reaches a contradiction. First, from the predefined keywords or the closest possible matching files assumption that kw∗ ∈ Skwi,d ∩ Skw,k, we can get the number based on keyword comparison semantics, when exact match of wildcard in w∗, which is denoted by n∗, is not greater than fails. Our EKST greatly reduces the storage and depiction k. Next, we prove that ed(kw,kwi) ≤ n∗. We will prove the overheads, we develop revise space to enumerate fuzzified inequality with induction method. First, we prove it holds keywords similarity and implement a method on when n∗ = 1. There are nine cases be considered: If kw∗ is constructing fuzzified keyword sets, through accurate derived from the deletion of both kwi and kw, then, security study, we shown that our proposal is secure and ed(kwi,kw) ≤ 1 because the other characters are the same privacy-preserving. except the character at the same position. If the operation is deletion from kwi and substitution from kw, we have REFERENCES 555 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 [1] Google, “Britney spears spelling correction,” Referenced online at http: //www.google.com/jobs/britney.html, June 2009. [2] M. Bellare, A. Boldyreva, and A. O’Neill, “Deterministic and efficiently searchable encryption,” in Proceedings of Crypto 2007, volume 4622 of LNCS. Springer-Verlag, 2007. [3] D. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Proc. of IEEE Symposium on Security and Privacy’00, 2000. [4] E.-J. Goh, “Secure indexes,” Cryptology ePrint Archive, Report 2003/216 2003, http://eprint.iacr.org/. [5] D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Proc. of EUROCRYP’04, 2004. [6] B. Waters, D. Balfanz, G. Durfee, and D. Smetters, “Building an encrypted and searchable audit log,” in Proc. of 11th Annual Network and Distributed System, 2004. [7] Y.-C. Chang and M. Mitzenmacher, “Privacy preserving keyword searches on remote encrypted data,” in Proc. of ACNS’05, 2005. [8] R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,” in Proc. of ACM CCS’06, 2006. [9] D. Boneh and B. Waters, “Conjunctive, subset, and range queries on encrypted data,” in Proc. of TCC’07, 2007, pp. 535–554. [10] F. Bao, R. Deng, X. Ding, and Y. Yang, “Private query on encrypted data in multi-user settings,” in Proc. of ISPEC’08, 2008. [11] C. Li, J. Lu, and Y. Lu, “Efficient merging and filtering algorithms for approximate string searches,” in Proc. of ICDE’08, 2008. [12] A. Behm, S. Ji, C. Li, , and J. Lu, “Space-constrained gram-based indexing for efficient approximate string search,” in Proc. of ICDE’09. [13] S. Ji, G. Li, C. Li, and J. Feng, “Efficient interactive fuzzy keyword search,” in Proc. of WWW’09, 2009. [14] J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. Strauss, and R. N. Wright, “Secure multiparty computation of approximations,” in Proc. Of ICALP’01. [15] R. Ostrovsky, “Software protection and simulations on oblivious rams,” Ph.D dissertation, Massachusetts Institute of Technology, 1992. [16] V. Levenshtein, “Binary codes capable of correcting spurious insertions and deletions of ones,” Problems of Information Transmission, vol. 1, no. 1, pp. 8–17, 1965. 556 All Rights Reserved © 2012 IJARCET