International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 3 | Year 2013 | Article Id. IJCTT-V4I3P121 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I3P121

Unassailable Fuzzy Keyword Searching in Cloud Storages


Tritty Mamachan, Roshni. M. Thanka

Citation :

Tritty Mamachan, Roshni. M. Thanka, "Unassailable Fuzzy Keyword Searching in Cloud Storages," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 3, pp. 301-304, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I3P121

Abstract

Cloud Computing allows users to dispense as well as access data remotely. The ongoing environment in which the data is stored in cloud, has a security dent, which is still not yet resolved. A notable number of techniques have been developed to retrieve data using keyword searches through encrypted data. When the user enters a keyword incorrectly or half of the expected word, is the technique efficient enough to search through the data. Fuzzy keyword technique has been proposed to solve this problem, but is it unassailable? In this paper, fuzzy keyword technique has been merged with security measures to provide an efficient mechanism for keyword searching.

Keywords

Cloud Service Provider, Cloud Storage, Partial Decipherment, Security, Fuzzy Keyword.

References

[1] Dawei Sun, Guiran Chang, Lina Sun and Xingwei Wang. “Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments”, 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of [CEIS], Science Direct, pp. 2852 – 2856, 2011.
[2] Julien Bringer and Hervé Chabanne. “Embedding edit distance to allow private keyword search in cloud computing”. In Bringer and Chabanne Human-centric Computing and Information Sciences ,2012.
[3] Jan Li, Qian Wang, Cong Wang. Fuzzy Keyword search over encrypted data in cloud computing. In Proceedings of INFOCM, IEEE ,2010
[4] T. Balamuralikrishna, C. Anuradha. Fuzzy keyword search over encrypted data in cloud. In Asian Journal of Computer Science and Information Technology; vol.3;.p.86-88, 2011
[5] Qin Liu,Guojun Wang, Jie Wu. Secure and privacy preserving keyword searching for cloud storage services. In: Journal of Network and Computer Applications; vol.35,.p.927-933, 2012
[6] Wang Jianfeng, Ma Hua, Tang Quang. “A new efficient verifiable fuzzy keyword search scheme,” In Journal of wireless mobile networks, ubiquitous computing and dependable applications,” vol.3 No.4; p.61-71, 2011
[7] Jan Li, Qian Wang, Cong Wang. Fuzzy Keyword search over encrypted data in cloud computing. In Proceedings of INFOCM, IEEE ,2010
[8] T. Balamuralikrishna, C. Anuradha. Fuzzy keyword search over encrypted data in cloud. In Asian Journal of Computer Science and Information Technology; vol.3;.p.86-88, 2011
[9] Qin Liu,Guojun Wang, Jie Wu. Secure and privacy preserving keyword searching for cloud storage services. In: Journal of Network and Computer Applications; vol.35,.p.927-933, 2012 
[10] Wang Jianfeng, Ma Hua, Tang Quang. “A new efficient verifiable fuzzy keyword search scheme,” In Journal of wireless mobile networks, ubiquitous computing and dependable applications,” vol.3 No.4; p.61-71, 2011