EKST: Efficient Keyword Searching Technique for Encrypted Data in CipherCloud  

Abstract

cloud, coming days is accustomed, more and more receptive data are being centralized into the cloud. In cloud, we make perceptive information habitually have to be ciphertext before outsourcing because of protecting of data privacy; it makes efficient information exploitation a very tough assignment. While traditional searchable ciphertext schemes permit a consumer to securely seek over ciphertext information through keywords and selectively reclaim records of attention, these techniques bear only precise keyword search. That is, here is lenience of trivial typos and configure inconsistencies which, on another hand, are distinctive consumer penetrating activities and happen very recurrently. This momentous negative aspect makes existing techniques incongruous in cloud computing as it significantly affects system usability, interpretation user penetrating experiences very testing and system efficacy very low. In this paper, we proposing EKST an efficient keyword searching technique as a solution and solve the crisis of searching the fuzzy keyword over encrypted cipharcloud data while maintaining keyword confidentiality. The proposed searching technique deeply enhances system usability by presentencing the matching files when user’s searching inputs exactly match the predefined keywords or the closest possible matching files based on keyword comparison semantics, when exact match fails. Our EKST greatly reduces the storage and depiction overheads, we develop revise space to enumerate fuzzified keywords similarity and implement a method on constructing fuzzified keyword sets, Through accurate security study, we show that our proposal is secure and privacy-preserving.  

Authors and Affiliations

V. Sravan Kumar Reddy , Professor C. Rajendra

Keywords

Related Articles

Routing Issues for Trust Based Framework in Mobile Ad Hoc Networks 

The execution and survival of ad hoc networks depends on cooperative and trusting nature of the distributed nodes. There is a common assumption in the routing protocols that all nodes are trustworthy and cooperative....

Comparison of Optimization Techniques for Mutual Information based Real Time Image Registration  

Image registration is the process of aligning two or more images of the same scene. A direct image registration approach uses Mutual Information (MI) as an image alignment. Mutual Information is a measure of the si...

Analyzing Knowledge Based Feature Selection to Detect Remote to Local Attacks

Intrusion Detection (ID) is the most significant component in Network Security System as it is responsible to detect several types of attacks. The IDS commonly deals with a large amount of data traffic, which involves ir...

Green Computing – Need and Implementation 

Green computing is an effective approach to protect our environment from the hazardous material and its effects that comes from the computers and its related devices. It is an effective study of environmental scien...

AN OVERVIEW & ANALYSIS SAFETY PROPOSAL AND POLICIES OF INTERNET NETWORK SAFETY

Now days of network safety are very crucial and protected opinion, to determine virus. The review of the process of network safety policies to the private network connected to the internet & information networks. The...

Download PDF file
  • EP ID EP98952
  • DOI -
  • Views 99
  • Downloads 0

How To Cite

V. Sravan Kumar Reddy, Professor C. Rajendra (2012). EKST: Efficient Keyword Searching Technique for Encrypted Data in CipherCloud  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(4), 552-556. https://europub.co.uk/articles/-A-98952