Fuzzy Keyword Search Over Encrypted Data using Cloud Computing
Creators
- 1. UG Scholar, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Kattankulathur (Tamil Nadu), India.
Contributors
Contact person:
- 1. UG Scholar, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Kattankulathur (Tamil Nadu), India.
Description
Abstract: “Cloud” is a collective term for a large number of developments and possibilities. It is not an invention, but more of a “practical innovation”, combining several earlier inventions into something new and compelling. A cloud computing platform dynamically provisions, configures, reconfigures, and de provisions servers as needed [8]. Servers in the cloud can be physical machines or virtual machines. Security is a critical issue in cloud computing due to the variety of IT services that can be provided through a cloud environment. This paper focuses on the aspect of searching keywords over encrypted data while maintaining integrity of the data. Using a traditional algorithm like AES. Unlike traditional searching algorithms, here we try to implement a fuzzy logic which is based on a NLP technique called N gram. This fuzzy keyword searching significantly increases the efficiency and safety over cloud. This will keep the searching time efficient and acquire great results. The n-gram logic will be used to make sets of keywords which will used in the search implementation. To achieve more accurate results, Jaccard Coefficient will be used to find the similarity between the sets of keywords and rank them based on that. The purpose of this paper is to improve the traditional keyword search over encrypted data using cloud computing using advanced algorithms without compromising over security. Through rigorous security analysis, we show that our proposed solution is secure and maintains the privacy of the file server while efficiently using the fuzzy logic.
Notes
Files
A38421012122.pdf
Files
(682.1 kB)
Name | Size | Download all |
---|---|---|
md5:1bc2b0ebd1cf09c8bec1e81ef5f912db
|
682.1 kB | Preview Download |
Additional details
Related works
- Is cited by
- Journal article: 2249-8958 (ISSN)
References
- J. Li, Q. Wang, C. Wang, N. Cao, K. Ren and W. Lou, 2010, "Fuzzy Keyword Search over Encrypted Data in Cloud Computing," , Proceedings IEEE INFOCOM, San Diego, CA, USA, pp. 1-5, doi: 10.1109/INFCOM.2010.5462196.
- Shekokar, N., Sampat, K., Chandawalla, C. and Shah, J.,Shekokar, N. et al., 2015, "Implementation of Fuzzy Keyword Search over Encrypted Data in Cloud Computing", Procedia Computer Science, 45, pp. 499-505. doi: 10.1016/j.procs.2015.03.089.
- Songfeng Lu; Abdulruhman I Ahmed AbomakhelbSecure, 2017, Cloud Storage and Quick Keyword Based Retrieval System , 2017 International Conference on Computing Intelligence and Information System (CIIS): https://ieeexplore.ieee.org/document/8327736 .
- Yadav, Manish & Gugal, Drishti & Matkar, Shivani & Waghmare, Sanket., 2019, Encrypted Keyword Search in Cloud Computing using Fuzzy Logic, 2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT) 1-4. 10.1109/ICIICT1.2019.8741364.
- S.Amudha, M.Murali, 2020,'Deep Learing based energy efficient novel scheduling algorithms for body-fog-cloud in smart hospital', Journal of Ambient Intelligent Humanized Computing, https://doi.org/10.1007/s12652-020-02421-0
- Muhammad Aliyu, M.Murali, Abdul Salam Y.Gital, Souley Boukari, 2020,' Efficient Metahueristic Population Based and Deterministic Algorithm for Resource Provisioning using Ant Colony Optimization and Spanning Tree', International Journal of Cloud Applications and Computing, 10(2), 1-21.
- Muhammad Aliyu, M.Murali, Zuopeng Justin Zhang, Abdul Salam Y.Gital, Souley Boukari, Yongbin Huang, Ismail Zahraddeen Yakubu, 2021, 'Management of cloud resources and social change in a multi-tier environment: A novel finite automata using ant colony optimization with spanning tree', Technological Forecasting & Social Change, 166(2021) 120591
- M.Murali, 2015,' Principal Component Analysis based Feature Vector Extraction', Indian Journal of Science and Technology, 8(35), 1-4
- Ankita Sadh, M.Murali, 2016, 'Wireless Sensor Data Access Through Mobile Cloud Computing', International journal of Control Theory and Applications, 9(15), 7325-7331
- Ankita Sadh, M.Murali, 2016, 'Wireless Sensor Data Access Through Mobile Cloud Computing', International journal of Control Theory and Applications, 9(15), 7325-7331
- Shaik Saleem. M, Murali, 2018, 'Privacy preserving public auditing for data integrity in cloud', Journal of Physics: Conf. Series 1000, doi: 10. 1088/ 1742-6596/ 1000/ 1/012164
- M.Murali, R.Srinivasan, 2015,'Cached Data Access in MANET employing AODV protocol', IC4-2015(IEEE international conference), Indore, Madhya Pradesh.
- A.Venisha, M.Murali, 2019, 'Discovering the Trustworthy Cloud Service provider in Collaborative Cloud Environment', International Journal of Engineering and Advanced Technology,9(252), 360-367
- A.Venisha, M.Murali, 2019, 'A Conception for identifying trust service providers in collaboration cloud computing',International Journal of Recent Technology and Engineering, 8(254), 110-116
- Rentachintala Kasyap, M.Murali, 2020, 'Privacy, Data Management and Access Control in Smart Meters: A Survey', European Journal of Molecular & Clinical Medicine', 7(5), 1630-1645
- J.Shobana, M.Murali, 2021, Abstractive Review Summarization based on Improved Attention Mechanism with Pointer Generator Network Model, Webology, Volume 18, Number 1, DOI: 10.14704/WEB/V18I1/WEB18028
Subjects
- ISSN: 2249-8958 (Online)
- https://portal.issn.org/resource/ISSN/2249-8958#
- Retrieval Number: 100.1/ijeat.A38421012122
- https://www.ijeat.org/portfolio-item/a38421012122/
- Journal Website: www.ijeat.org
- https://www.ijeat.org
- Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
- https://www.blueeyesintelligence.org