Abstract
Due to widespread use of cloud computing, there is more and more data is being stored over cloud by the users every day in such case finding a solution for easy, secure and safe way to handle the data is necessary. So I have given the solution for such problem using some algorithms like AES encryption and similarity calculating algorithms. So, instead of searching directly using keyword here in this paper the approach is different. Here, I am using searching over the encrypted data which is much secure than the normal searching. In this project, I will be using AES encryption algorithm for encryption and Jaccard coefficient to find the similarity between the keywords. So after giving keyword, the encrypted keywords can be searched and user will be able to find the file over cloud. In this project, I have implemented and tested the solution to the problem of secure cloud computing. By using the fuzzy keyword searching over encrypted cloud computing and taking care of safety and secrecy of data files. This fuzzy keyword searching significantly increases the efficiency and safety over cloud. This is user friendly and easy to manage and require less resource. And the results are accurate enough to get exact files searched by the user. The efficiency is increased by approximated computing and it works great. In this solution, Jaccard coefficient is being used to calcite similarity and used two advanced techniques to make fuzzy keyword set, which achieves the great results. Where n-gram algorithm is used to generate the set of different length n-grams of any keyword which is going to be encrypted and is being stored over cloud. I have done security analysis and found out that this system is secure and reliable for modern cloud computing operations and file storage. This system achieves its proposed goal efficiently and results are shown for same.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li, J., Wang, Q., Wang, C., Cao, N., Ren, K. Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. Department of ECE, Illinois Institute of Technology, Worcester Polytechnic Institute. Email: {jinli, qian, cong, kren}@ece.iit.edu, {ncao, wjlou}@ece.wpi.edu
Wasnakar, A.: Implementation of Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Song, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE (2000)
Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchabl symmetric encryption: improved definitions and efficient constructions. In: Proceedings of ACM CCS ’06 (2006)
Li, C., Lu, J., Lu, Y.: Efficient merging and filtering algorithms for approximate string searches. In: Proceedings of ICDE ’08 (2008)
Google: Britney spears spelling correction. http://www.google.com/jobs/britney.html (2009)
Bellare, M., Boldyreva, A., O’Neill, A.: Deterministic and efficiently searchable encryption. In: Proceedings of Crypto 2007, vol. 4622 of LNCS. Springer (2007)
Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Proceedings of EUROCRYP ’04 (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Lavanya, V., Ramasubbareddy, S., Govinda, K. (2020). Fuzzy Keyword Matching Using N-Gram and Cryptographic Approach Over Encrypted Data in Cloud. In: Bhateja, V., Satapathy, S., Satori, H. (eds) Embedded Systems and Artificial Intelligence. Advances in Intelligent Systems and Computing, vol 1076. Springer, Singapore. https://doi.org/10.1007/978-981-15-0947-6_52
Download citation
DOI: https://doi.org/10.1007/978-981-15-0947-6_52
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0946-9
Online ISBN: 978-981-15-0947-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)