Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      07 April 2023, Volume 38 Issue 2   
    Article

    A NOVEL APPROACH FOR FUZZY KEYWORD SEARCHABLE ENCRYPTION USING N-GRAM IN CRYPTOGRAPHIC CLOUD ENVIRONMENT
    1Panchal Mital Nikunj, 2Dr. Dushyantsinh B. Rathod
    Journal of Data Acquisition and Processing, 2023, 38 (2): 1664-1673 . 

    Abstract

    Cloud computing has been now a very familiar word among IT fraternities since almost two decades. The benefits of cloud services are limit less. Cloud computing provides several benefits for users, like the ability to access computing resources as needed, and the flexibility to pay for use. The convenience of having access to resources, data, and information on demand is a big plus for consumers. They only have to pay for what they use. Users and businesses should be able to verify the charges they're being billed for cloud computing and storage solutions. These services offer various capabilities to store and process data. But, on the other hand, consumers face serious difficulties in finding the most suitable cloud services. Storing data on data storage servers, such as mail servers and file servers, in encrypted form reduces security and privacy risks. Encryption is the process of encoding messages or information so that only authorized parties can read it. Multiple encryption techniques are developed to encrypt the data. Encryption of search results has become an important problem. There are major three reasons for it. (1) search engines usages to search data is the only way to find suitable material on internet (2) Data is stored over cloud. (3) there is a serious trust issues about data misuse. Many computer scientists are now interested in the problem of encrypted search, as it is an important part of major processes over internet. Some methods are more practical, secure, or flexible than others. These schemes do not support accurate search result when there is a spelling mistake. To address these challenges proposed schemes is developed works on fuzzy keyword search. The proposed scheme developed with n-gram technique for comparison of keywords on server with AES +ABE encryption algorithm for privacy preserving of the data.

    Keyword

    cryptography, encryption schemes, fuzzy keywords, trapdoor


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved