Skip to main content

Fuzzy Keyword Matching Using N-Gram and Cryptographic Approach Over Encrypted Data in Cloud

  • Conference paper
  • First Online:
Embedded Systems and Artificial Intelligence

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1076))

Abstract

Due to widespread use of cloud computing, there is more and more data is being stored over cloud by the users every day in such case finding a solution for easy, secure and safe way to handle the data is necessary. So I have given the solution for such problem using some algorithms like AES encryption and similarity calculating algorithms. So, instead of searching directly using keyword here in this paper the approach is different. Here, I am using searching over the encrypted data which is much secure than the normal searching. In this project, I will be using AES encryption algorithm for encryption and Jaccard coefficient to find the similarity between the keywords. So after giving keyword, the encrypted keywords can be searched and user will be able to find the file over cloud. In this project, I have implemented and tested the solution to the problem of secure cloud computing. By using the fuzzy keyword searching over encrypted cloud computing and taking care of safety and secrecy of data files. This fuzzy keyword searching significantly increases the efficiency and safety over cloud. This is user friendly and easy to manage and require less resource. And the results are accurate enough to get exact files searched by the user. The efficiency is increased by approximated computing and it works great. In this solution, Jaccard coefficient is being used to calcite similarity and used two advanced techniques to make fuzzy keyword set, which achieves the great results. Where n-gram algorithm is used to generate the set of different length n-grams of any keyword which is going to be encrypted and is being stored over cloud. I have done security analysis and found out that this system is secure and reliable for modern cloud computing operations and file storage. This system achieves its proposed goal efficiently and results are shown for same.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li, J., Wang, Q., Wang, C., Cao, N., Ren, K. Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. Department of ECE, Illinois Institute of Technology, Worcester Polytechnic Institute. Email: {jinli, qian, cong, kren}@ece.iit.edu, {ncao, wjlou}@ece.wpi.edu

    Google Scholar 

  2. Wasnakar, A.: Implementation of Fuzzy Keyword Search Over Encrypted Data in Cloud Computing

    Google Scholar 

  3. Song, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE (2000)

    Google Scholar 

  4. Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchabl symmetric encryption: improved definitions and efficient constructions. In: Proceedings of ACM CCS ’06 (2006)

    Google Scholar 

  5. Li, C., Lu, J., Lu, Y.: Efficient merging and filtering algorithms for approximate string searches. In: Proceedings of ICDE ’08 (2008)

    Google Scholar 

  6. Google: Britney spears spelling correction. http://www.google.com/jobs/britney.html (2009)

  7. Bellare, M., Boldyreva, A., O’Neill, A.: Deterministic and efficiently searchable encryption. In: Proceedings of Crypto 2007, vol. 4622 of LNCS. Springer (2007)

    Google Scholar 

  8. Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Proceedings of EUROCRYP ’04 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Somula Ramasubbareddy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lavanya, V., Ramasubbareddy, S., Govinda, K. (2020). Fuzzy Keyword Matching Using N-Gram and Cryptographic Approach Over Encrypted Data in Cloud. In: Bhateja, V., Satapathy, S., Satori, H. (eds) Embedded Systems and Artificial Intelligence. Advances in Intelligent Systems and Computing, vol 1076. Springer, Singapore. https://doi.org/10.1007/978-981-15-0947-6_52

Download citation

Publish with us

Policies and ethics