Effective Data Utilization in Public Cloud through Hash Table Assorted Trie Indexed Encrypted Fuzzy Search

Cloud computing offers seamless service in the recent past to provide cloud infrastructure as a service that facilitates number of third party data owners across the world. Owing to various advantages like low infrastructure cost, high flexibility and ease of managing data, public cloud service has been widely adopted by several data owners. Cloud computing supports third party owners to optimize their cost spent towards cloud resources and infrastructure for their own data. While data owners are convinced with the security of individual data, the key is to make effective data utilization. This paper presents a novel approach hash table assorted trie encrypted fuzzy search method that creates wild card-based fuzzy keyword set to provide effective data utilization. It also creates hash table assorted trie fuzzy searchable index for fuzzy keyword set that resolves typos and representation inconsistencies and reduces searching time. The objective of the proposed searching method is to utilize the data effectively in terms of searching time, total number of files accessed from the untrusted cloud storage server.

[1]  Cong Wang,et al.  Toward secure and effective data utilization in public cloud , 2012, IEEE Network.

[2]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[3]  Yiwei Thomas Hou,et al.  Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[4]  Min-Shiang Hwang,et al.  A Study of Public Key Encryption with Keyword Search , 2013, Int. J. Netw. Secur..

[5]  Libor Sarga,et al.  Cloud Computing: An Overview , 2012 .

[6]  A. A. Oliinyk,et al.  The decision tree construction based on a stochastic search for the neuro-fuzzy network synthesis , 2015, Optical Memory and Neural Networks.

[7]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[8]  Grace T. R. Lin,et al.  Fuzzy Modeling for Information Security Management Issues in Cloud Computing , 2014 .

[9]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[10]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.

[11]  Jie Wu,et al.  Secure and privacy preserving keyword searching for cloud storage services , 2012, J. Netw. Comput. Appl..

[12]  Qiang Tang,et al.  A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search , 2012, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[13]  Shouzhen Zeng,et al.  Fuzzy Generalized Ordered Weighted Averaging Distance Operator and Its Application to Decision Making , 2012 .

[14]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.

[15]  Joonsang Baek,et al.  Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.

[16]  Qiang Tang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[17]  Wei Wang,et al.  Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack , 2013, IEEE Transactions on Computers.

[18]  He Jing,et al.  K-Gram Based Fuzzy Keyword Search over Encrypted Cloud Computing , 2013 .

[19]  Sun-Yuan Hsieh,et al.  Multiprefix Trie: A New Data Structure for Designing Dynamic Router-Tables , 2011, IEEE Transactions on Computers.

[20]  Debajyoti Mukhopadhyay,et al.  Efficient Fuzzy Search Engine with B -Tree Search Mechanism , 2014, 2014 International Conference on Information Technology.

[21]  Sartaj Sahni,et al.  Efficient Construction of Pipelined Multibit-Trie Router-Tables , 2007, IEEE Transactions on Computers.