Fuzzy Keyword Matching Using N-Gram and Cryptographic Approach Over Encrypted Data in Cloud

  • V. Lavanya
  • Somula RamasubbareddyEmail author
  • K. Govinda
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1076)


Due to widespread use of cloud computing, there is more and more data is being stored over cloud by the users every day in such case finding a solution for easy, secure and safe way to handle the data is necessary. So I have given the solution for such problem using some algorithms like AES encryption and similarity calculating algorithms. So, instead of searching directly using keyword here in this paper the approach is different. Here, I am using searching over the encrypted data which is much secure than the normal searching. In this project, I will be using AES encryption algorithm for encryption and Jaccard coefficient to find the similarity between the keywords. So after giving keyword, the encrypted keywords can be searched and user will be able to find the file over cloud. In this project, I have implemented and tested the solution to the problem of secure cloud computing. By using the fuzzy keyword searching over encrypted cloud computing and taking care of safety and secrecy of data files. This fuzzy keyword searching significantly increases the efficiency and safety over cloud. This is user friendly and easy to manage and require less resource. And the results are accurate enough to get exact files searched by the user. The efficiency is increased by approximated computing and it works great. In this solution, Jaccard coefficient is being used to calcite similarity and used two advanced techniques to make fuzzy keyword set, which achieves the great results. Where n-gram algorithm is used to generate the set of different length n-grams of any keyword which is going to be encrypted and is being stored over cloud. I have done security analysis and found out that this system is secure and reliable for modern cloud computing operations and file storage. This system achieves its proposed goal efficiently and results are shown for same.


Fuzzy Encryption Cloud N-gram Security 


  1. 1.
    Li, J., Wang, Q., Wang, C., Cao, N., Ren, K. Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. Department of ECE, Illinois Institute of Technology, Worcester Polytechnic Institute. Email: {jinli, qian, cong, kren}, {ncao, wjlou}@ece.wpi.eduGoogle Scholar
  2. 2.
    Wasnakar, A.: Implementation of Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingGoogle Scholar
  3. 3.
    Song, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE (2000)Google Scholar
  4. 4.
    Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchabl symmetric encryption: improved definitions and efficient constructions. In: Proceedings of ACM CCS ’06 (2006)Google Scholar
  5. 5.
    Li, C., Lu, J., Lu, Y.: Efficient merging and filtering algorithms for approximate string searches. In: Proceedings of ICDE ’08 (2008)Google Scholar
  6. 6.
    Google: Britney spears spelling correction. (2009)
  7. 7.
    Bellare, M., Boldyreva, A., O’Neill, A.: Deterministic and efficiently searchable encryption. In: Proceedings of Crypto 2007, vol. 4622 of LNCS. Springer (2007)Google Scholar
  8. 8.
    Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Proceedings of EUROCRYP ’04 (2004)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.ITVNRVJIETHyderabadIndia
  2. 2.ScopeVIT UniversityVelloreIndia

Personalised recommendations