Efficient Interactive Fuzzy Keyword Search Over Encrypted Data in Cloud Computing

Cloud computing is an online computing within which info is keep and accessed employing a remote third party server known as cloud, comparatively than being keep regionally on our mechanism and also the resources, software's, and knowledge are provided to users on demand. In cloud computing background knowledge protection is on-going difficult task, and then the sensitive knowledge has got to be encrypted previous to outsourcing. Though typical searchable coding schemes permit a user to firmly search quite encrypted knowledge from facet to facet keywords and by selection retrieve files of interest, these techniques support solely actual keyword search. In this paper for the primary time we have a tendency to formalize and solve the problem of realistic fuzzy keyword search over encrypted cloud knowledge where as maintaining keyword privacy. Fuzzy keyword search greatly enhances system usability by returning the matching files once users' looking inputs precisely match the predefined keywords or the nearest doable matching files supported keyword similarity linguistics, once actual match fails. In our resolution, we have a tendency to exploit edit distance to quantify keywords similarity and extremely developed techniques on constructing fuzzy keyword sets, which understand optimized storage and demonstration overheads. We have a propensity to boot propose a novel symbol-based trie-traverse looking scheme, where a multi- way tree structure is constructed positive persecution symbols remodeled from the resulted fuzzy keyword sets. Through exact security analysis, we have a leaning to show that our designed resolution is secure and privacy- preserving, where as properly realizing the goal of fuzzy keyword search. Exhaustive experimental outcome expose the energy of the planned resolution.

[1]  Marianne Winslett,et al.  Zerber: r-confidential indexing for distributed documents , 2008, EDBT '08.

[2]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[3]  Joan Feigenbaum,et al.  Secure multiparty computation of approximations , 2001, TALG.

[4]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.

[5]  Beng Chin Ooi,et al.  Bed-tree: an all-purpose index structure for string similarity search based on edit distance , 2010, SIGMOD Conference.

[6]  Wolf-Tilo Balke,et al.  The Semantic GrowBag Algorithm: Automatically Deriving Categorization Systems , 2007, ECDL.

[7]  Guoliang Li,et al.  Efficient interactive fuzzy keyword search , 2009, WWW '09.

[8]  Robert H. Deng,et al.  Private Query on Encrypted Data in Multi-user Settings , 2008, ISPEC.

[9]  Cong Wang,et al.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .

[10]  Brent Waters,et al.  Building an Encrypted and Searchable Audit Log , 2004, NDSS.

[11]  Jiaheng Lu,et al.  Efficient Merging and Filtering Algorithms for Approximate String Searches , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[12]  Brian Hayes,et al.  What Is Cloud Computing? , 2019, Cloud Technologies.

[13]  Michael Mitzenmacher,et al.  Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.

[14]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[15]  Yan Liu,et al.  Topic-link LDA: joint models of topic and author community , 2009, ICML '09.

[16]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[17]  Elaine Shi,et al.  Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[18]  Jiaheng Lu,et al.  Space-Constrained Gram-Based Indexing for Efficient Approximate String Search , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[19]  Brent Waters,et al.  Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.