scholarly journals Fuzzy Keyword Search Method over Ciphertexts supporting Access Control

2013 ◽  
Vol 18 (9) ◽  
pp. 1795-1802 ◽  
Author(s):  
Fatos Xhafa ◽  
Jianfeng Wang ◽  
Xiaofeng Chen ◽  
Joseph K. Liu ◽  
Jin Li ◽  
...  

2013 ◽  
Vol 10 (2) ◽  
pp. 667-684 ◽  
Author(s):  
Jianfeng Wang ◽  
Hua Ma ◽  
Qiang Tang ◽  
Jin Li ◽  
Hui Zhu ◽  
...  

As cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud by users. To maintain the confidentiality of sensitive user data against untrusted servers, the data should be encrypted before they are uploaded. However, this raises a new challenge for performing search over the encrypted data efficiently. Although the existing searchable encryption schemes allow a user to search the encrypted data with confidentiality, these solutions cannot support the verifiability of searching result. We argue that a cloud server may be selfish in order to save its computation ability or bandwidth. For example, it may execute only a fraction of the search and returns part of the searching result. In this paper, we propose a new verifiable fuzzy keyword search scheme based on the symbol-tree which not only supports the fuzzy keyword search, but also enjoys the verifiability of the searching result. Through rigorous security and efficiency analysis, we show that our proposed scheme is secure under the proposed model, while correctly and efficiently realizing the verifiable fuzzy keyword search. The extensive experimental results demonstrate the efficiency of the proposed scheme.


2016 ◽  
Vol 27 (4) ◽  
pp. 951-963 ◽  
Author(s):  
Chi Chen ◽  
Xiaojie Zhu ◽  
Peisong Shen ◽  
Jiankun Hu ◽  
Song Guo ◽  
...  

Author(s):  
SYEDA FARHA SHAZMEEN ◽  
RANGARAJU DEEPIKA

Cloud Computing is a construct that allows you to access applications that actually reside at a location other than our computer or other internet-connected devices, Cloud computing uses internet and central remote servers to maintain data and applications, the data is stored in off-premises and accessing this data through keyword search. So there comes the importance of encrypted cloud data search Traditional keyword search was based on plaintext keyword search, but for protecting data privacy the sensitive data should be encrypted before outsourcing. Fuzzy keyword search greatly enhances system usability by returning the matching files; Fuzzy technique uses approximate full text search and retrieval. Three different Fuzzy Search Schemas, The wild card method, gram based method and tree traverse search scheme, are dicussed and also the efficiency of these algorithms is analyzed.


2016 ◽  
Vol 13 (1) ◽  
pp. 2368
Author(s):  
Huseyin Çakır ◽  
Mehmet Serkan Kılıç

In this study “keyword search method” used in the filed of digital forensics sciences is investigated. Similar to using search engines on internet investigations, using keyword search method of computer forensics investigations has too much benefits. In the study, keyword search method loop of preparing of electronic data, indexing, query with keywords, matching on database and showing results to the users are explained. Also information of keyword search method on different data type such as forensic image data, live forensics data, static data and cloud computing data are discussed.The importance of using keyword search method on computer forensics is examined in 5 different aspect as rapid and effective computer forensics investigations, contribution to privacy, relational analysis of human-event-computing device, creating dictionary for decrypt passwords and recover some deleted data and detect steganography data. In this context, all-round about using keyword searches’ contribution to computer forensics investigation are evaluated. Finally, some examples about computer forensics tools are handled. ÖzetBu çalışmada,  adli bilişim biliminde kullanılan “anahtar kelime araması metodu” incelenmiştir. İnternet araştırmalarında yaygın olarak kullanılan arama motorlarına benzer şekilde adli bilişim çalışmalarında da anahtar kelime araması metodu kullanılmasının çok faydası bulunmaktadır. Çalışmada; elektronik verilerin hazırlanması, verilerin indekslenmesi, anahtar kelimeler sorgusu, veri tabanı üzerinde eşleştirme yapılması ve kullanıcıya sonuçlarının gösterilmesi şeklinde oluşan anahtar kelime araması metodu açıklanmış ve adli kopya verileri, canlı sistem verileri, sabit veriler ve bulut bilişim verileri üzerinde anahtar kelime araması hakkında bilgi verilmiştir.Adli bilişim çalışmaları sürecinde anahtar kelime araması metodunun kullanımının önemi; hızlı ve etkili bir adli bilişim çalışması yapılması, özel hayatın gizliliğine katkı sağlaması, şahıs-olay-bilgisayar medyası arasında ilişki analizi kurulması, sözlük oluşturulması ve şifre tespiti ile silinmiş ve gizlenmiş verilerin tespiti olmak üzere 5 farklı açıdan irdelenmiştir. Bu bağlamda anahtar kelime araması metodunun elektronik delil elde etme çalışmalarına sağlayacağı katkı çok yönlü olarak ele alınmış ayrıca adli bilişim yazılımları özelinde örnekler verilmeye çalışılmıştır.


Sign in / Sign up

Export Citation Format

Share Document