fuzzy keyword search
Recently Published Documents


TOTAL DOCUMENTS

43
(FIVE YEARS 7)

H-INDEX

10
(FIVE YEARS 1)

Author(s):  
Hanya M. Abdallah ◽  
Ahmed Taha ◽  
Mazen M. Selim

With the rapid growth and adoption of cloud computing, more sensitive information is centralized onto the cloud every day. For protecting this sensitive information, it must be encrypted before being outsourced. Current search schemes allow the user to query encrypted data using keywords, but these schemes do not guarantee the privacy of queries (i.e., when the user hits query more than once with the same keywords, the server can capture information about the data). This paper focuses on the secure storage and retrieval of ciphered data with preserving query privacy. The proposed scheme deploys the sparse vector space model to represent each query, which focuses on reducing the storage and representation overheads. And the proposed scheme adds a random number to each query vector. Hence, the cloud server cannot distinguish between queries with the same keywords, which ensures the privacy of the query. Experimental results show that the proposed scheme outperforms other relevant state-of-the-art schemes.


2021 ◽  
pp. 1-13
Author(s):  
Dongping Hu ◽  
Aihua Yin

In cloud computing, enabling search directly over encrypted data is an important technique to effectively utilize encrypted data. Most of the existing techniques are focusing on fuzzy keyword search as it helps achieve more robust search performance by tolerating misspelling or typos of data users. Existing works always build index without classifying keywords in advance. They suffer from efficiency issue. Furthermore, Euclidean distance or Hamming distance is often chosen to evaluate strings’ similarity, ignoring prefixes matching and the influence of strings’ length on the accuracy. We propose an efficient fuzzy keyword search scheme with lower computation cost and higher accuracy to address the aforementioned problems. We employ the sub-dictionaries technique and the Bed-tree structure to build an index with three layers for achieving better search efficiency. With this index structure, the server could locate the keyword and could narrow the search scope quickly. The Jaro-Winkler distance is introduced to qualify the strings’ similarity by considering the prefixes matching and string length. The secure privacy mechanism is incorporated into the design of our work. Security analysis and performance evaluation demonstrate our scheme is more efficient compared to the existing one while guaranteeing security.


To enhance the potency of knowledge looking out, most knowledge house owners store their knowledge files in numerous cloud servers within the kind of ciphertext. Thus, economical search victimization fuzzy keywords become a vital issue in such a cloud computing atmosphere. Searchable cryptography will support knowledge user to select and retrieve the cipher documents over encrypted cloud knowledge by keyword-based search. Most of the prevailing searchable encryption schemes solely specialize in the precise keyword search. When knowledge user makes writing system errors, these schemes fail to come to the results of interest. In searchable encryption, the cloud server may come to the invalid result to knowledge user for saving the computation price or alternative reasons. Therefore, these precise keyword search schemes notice very little sensible significance in real-world applications. So as to deal with these problems, we tend to propose unique verifiable fuzzy keyword search theme over encrypted cloud knowledge. We tend to propose a verifiable precise keyword search theme which extend this theme to the fuzzy keyword search theme. Here we tend to thus propose a system for fuzzy keyword sets rather than precise word search. This will help us drastically to reduce the costs and it also allows to have multi-users using the system simultaneously.


2019 ◽  
Vol 12 (3) ◽  
pp. 133-153 ◽  
Author(s):  
Mamta ◽  
Brij B. Gupta ◽  
Syed Taqi Ali

Public-key encryption with keyword search (PEKS) is a well-known technique which allows searching on encrypted data using the public key system. However, this technique suffers from the keyword guessing attack (KGA). To address this problem, a modified version of PEKS called public key encryption with fuzzy keyword search (PEFKS) has been introduced where each keyword is associated with an exact search trapdoor (EST) and a fuzzy search trapdoor (FST) which is provided to the cloud server. PEFKS prevents KGA in such a way that two or maximum three keywords share the same FST. Hence, even if the cloud server knows the FST it cannot link it to the corresponding keyword. But, with a probability of 1/3 the malicious cloud server can still guess the keyword corresponding to FST. Therefore, in this article, the authors present an approach which can improve the security of the PEFKS technique by reducing the probability of guessing the keyword to 1/k where k is the number of keywords that share the same FST, thus enhancing the overall reliability. In addition, the authors have used an identity-based encryption (IBE) as an underlying technique to construct the searchable encryption scheme and proved its security in the standard model.


Author(s):  
S. Baskaran ◽  
R. Raja

As Cloud Processing becomes prevailing, extra and extra sensitive and painful information ar being centralized to the cloud. For the defense of data solitude, sensitive and painful data often need to be forced to be secured before outsourcing, which makes efficient data employment a very hard task. however old searchable development systems help a person to strongly research around secured data through keywords and by variety obtain documents of curiosity, these methods help only specific keyword search. That's, there is number patience of slight typos and structure inconsistencies that, on the contrary give, ar common consumer seeking conduct and occur very often. the internet machine traffic evaluation resources construct the employment of web Entry Records that ar created on the machine while an individual is opening the internet site. a web accessibility wood includes of diverse items just as the title of an individual, his IP handle, selection of bytes moved timestamp etc. The job of web traffic evaluation resources becomes harder when the internet traffic quantity is huge and maintains on growing. in this report, we are likely to propose a numerous design to get and analyze beneficial information from the available diary data and conjointly supplies a relative examine of type of Wood analyser resources occur that assists in studying the traffic on web server.


2019 ◽  
Vol 16 (5) ◽  
pp. 3914-3935 ◽  
Author(s):  
Nyamsuren Vaanchig ◽  
◽  
Zhiguang Qin

2018 ◽  
Vol 10 (5) ◽  
pp. 38
Author(s):  
Jingsha He ◽  
Jianan Wu ◽  
Nafei Zhu ◽  
Muhammad Salman Pathan

Sign in / Sign up

Export Citation Format

Share Document