Fuzzy Keyword Search over Encrypted Data in Cloud Computing
#1

Fuzzy Keyword Search over Encrypted Data in Cloud Computing

[attachment=18361]

Abstract

As Cloud Computing becomes prevalent, more and
more sensitive information are being centralized into the cloud.
For the protection of data privacy, sensitive data usually have to
be encrypted before outsourcing, which makes effective data utilization
a very challenging task. Although traditional searchable
encryption schemes allow a user to securely search over encrypted
data through keywords and selectively retrieve files of interest,
these techniques support only exact keyword search. That is,
there is no tolerance of minor typos and format inconsistencies
which, on the other hand, are typical user searching behavior
and happen very frequently. This significant drawback makes
existing techniques unsuitable in Cloud Computing as it greatly
affects system usability, rendering user searching experiences
very frustrating and system efficacy very low.



I. INTRODUCTION
As Cloud Computing becomes prevalent, more and more
sensitive information are being centralized into the cloud, such
as emails, personal health records, government documents, etc.
By storing their data into the cloud, the data owners can be
relieved from the burden of data storage and maintenance so
as to enjoy the on-demand high quality data storage service.
However, the fact that data owners and cloud server are not in
the same trusted domain may put the oursourced data at risk,
as the cloud server may no longer be fully trusted. It follows
that sensitive data usually should be encrypted prior to outsourcing
for data privacy and combating unsolicited accesses.
However, data encryption makes effective data utilization a
very challenging task given that there could be a large amount
of outsourced data files. Moreover, in Cloud Computing, data
owners may share their outsourced data with a large number
of users. The individual users might want to only retrieve
certain specific data files they are interested in during a given
session.


PROBLEM FORMULATION
A. System Model
In this paper, we consider a cloud data system consisting
of data owner, data user and cloud server. Given a collection
of n encrypted data files C = (F1, F2, . . . , FN) stored
in the cloud server, a predefined set of distinct keywords
W = {w1,w2, ...,wp}, the cloud server provides the search
service for the authorized users over the encrypted data C. We
assume the authorization between the data owner and users
is appropriately done. An authorized user types in a request
to selectively retrieve data files of his/her interest. The cloud
server is responsible for mapping the searching request to a set
of data files, where each file is indexed by a file ID and linked
to a set of keywords. The fuzzy keyword search scheme returns
the search results according to the following rules: 1) if the
user’s searching input exactly matches the pre-set keyword, the
server is expected to return the files containing the keyword1;
2) if there exist typos and/or format inconsistencies in the
searching input, the server will return the closest possible
results based on pre-specified similarity semantics (to be
formally defined in section III-D).


CONCLUSION
In this paper, for the first time we formalize and solve the
problem of supporting efficient yet privacy-preserving fuzzy
search for achieving effective utilization of remotely stored
encrypted data in Cloud Computing. We design an advanced
technique (i.e., wildcard-based technique) to construct the
storage-efficient fuzzy keyword sets by exploiting a significant
observation on the similarity metric of edit distance. Based
on the constructed fuzzy keyword sets, we further propose
an efficient fuzzy keyword search scheme. Through rigorous
security analysis, we show that our proposed solution is secure
and privacy-preserving, while correctly realizing the goal of
fuzzy keyword search.


Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: search over encrypted data ppt, er diagram of fuzzy keyword search over encrypted data using cloud computing, fuzzy keyword search ieee paper, encrypted**ercom system, encrypted packet in ns2, uml diagrams for the efficient similarity search over encrypted data, algorithm for authorized private keyword search,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networksy seminar addict 1 1,510 25-08-2014, 05:40 PM
Last Post: Guest
  AUTOMATED CAR BRAKING SYSTEM USING FUZZY LOGIC CONTROLLER project uploader 3 3,808 15-05-2013, 09:52 AM
Last Post: computer topic
  virtual network computing seminar addict 1 1,367 12-12-2012, 02:07 PM
Last Post: seminar details
  SECURE DATA TRANSMISSION USING STEGANOGRAPHY seminar paper 1 1,905 24-11-2012, 01:35 PM
Last Post: seminar details
  Data Communication and Networking seminar paper 1 3,327 16-11-2012, 12:36 PM
Last Post: seminar details
  Economic dispatch using fuzzy logic seminar paper 1 1,372 16-11-2012, 12:25 PM
Last Post: seminar details
  Introduction to data structures seminar details 1 3,348 29-10-2012, 12:42 PM
Last Post: seminar details
  3D search engine seminar details 1 1,634 12-10-2012, 12:53 PM
Last Post: seminar details
  Power System Fault Analysis using Fault Reporting Data full report seminar details 1 846 05-10-2012, 04:02 PM
Last Post: seminar details
  Power System Fault Analysis using Fault Reporting Data seminar details 1 952 05-10-2012, 04:02 PM
Last Post: seminar details

Forum Jump: