|
|
Bimonthly Since 1986 |
ISSN 1004-9037
|
|
|
|
|
Publication Details |
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
|
|
|
|
|
|
|
|
|
|
Abstract
Cloud computing has been now a very familiar word among IT fraternities since almost two decades. The benefits of cloud services are limit less. Cloud computing provides several benefits for users, like the ability to access computing resources as needed, and the flexibility to pay for use. The convenience of having access to resources, data, and information on demand is a big plus for consumers. They only have to pay for what they use. Users and businesses should be able to verify the charges they're being billed for cloud computing and storage solutions. These services offer various capabilities to store and process data. But, on the other hand, consumers face serious difficulties in finding the most suitable cloud services. Storing data on data storage servers, such as mail servers and file servers, in encrypted form reduces security and privacy risks. Encryption is the process of encoding messages or information so that only authorized parties can read it. Multiple encryption techniques are developed to encrypt the data. Encryption of search results has become an important problem. There are major three reasons for it. (1) search engines usages to search data is the only way to find suitable material on internet (2) Data is stored over cloud. (3) there is a serious trust issues about data misuse. Many computer scientists are now interested in the problem of encrypted search, as it is an important part of major processes over internet. Some methods are more practical, secure, or flexible than others. These schemes do not support accurate search result when there is a spelling mistake. To address these challenges proposed schemes is developed works on fuzzy keyword search. The proposed scheme developed with n-gram technique for comparison of keywords on server with AES +ABE encryption algorithm for privacy preserving of the data.
Keyword
cryptography, encryption schemes, fuzzy keywords, trapdoor
PDF Download (click here)
|
|
|
|
|