EKST: Efficient Keyword Searching Technique for Encrypted Data in CipherCloud  

Abstract

cloud, coming days is accustomed, more and more receptive data are being centralized into the cloud. In cloud, we make perceptive information habitually have to be ciphertext before outsourcing because of protecting of data privacy; it makes efficient information exploitation a very tough assignment. While traditional searchable ciphertext schemes permit a consumer to securely seek over ciphertext information through keywords and selectively reclaim records of attention, these techniques bear only precise keyword search. That is, here is lenience of trivial typos and configure inconsistencies which, on another hand, are distinctive consumer penetrating activities and happen very recurrently. This momentous negative aspect makes existing techniques incongruous in cloud computing as it significantly affects system usability, interpretation user penetrating experiences very testing and system efficacy very low. In this paper, we proposing EKST an efficient keyword searching technique as a solution and solve the crisis of searching the fuzzy keyword over encrypted cipharcloud data while maintaining keyword confidentiality. The proposed searching technique deeply enhances system usability by presentencing the matching files when user’s searching inputs exactly match the predefined keywords or the closest possible matching files based on keyword comparison semantics, when exact match fails. Our EKST greatly reduces the storage and depiction overheads, we develop revise space to enumerate fuzzified keywords similarity and implement a method on constructing fuzzified keyword sets, Through accurate security study, we show that our proposal is secure and privacy-preserving.  

Authors and Affiliations

V. Sravan Kumar Reddy , Professor C. Rajendra

Keywords

Related Articles

Determination of Nontechnical Losses via Matlab Environment 

-Total energy supplied by the distribution utility does not reach to the consumer end. An extensive amount of energy is lost in the transmission and distribution system because of Technical and Non Technical loss...

 A Review on Energy Efficient Modulation and Coding Techniques for Clustered Wireless Sensor Networks

A standard wireless sensor network comprises of a huge number of sensor nodes with data processing and communication capabilities. The sensor nodes pass the gathered data using radio transmitter, to a sink either...

Review on Data Dissemination over Wireless Sensor Networks 

Wireless Sensor Networks (WSN) consists of large number sensor nodes. The sensor nodes are battery powered devices, they communicate over a wireless medium and consumes energy during data transmission. The main t...

Charismatic of Malware diffusion in distributed peer-to-peer networks 

in this paper, we articulate a reasoned sculpt to portray the diffusion of malware in distributed, Gnutella sort peer-to-peer networks and learning the charismatic allied with widen of malware. Using a segmented sculpts,...

BER AND SIMULATION OF OFDM MODULATOR AND DEMODULATOR FOR WIRELESS BROADBAND APPLICATIONS  

With the rapid growth of digital wireless communication in recent years, the need for high speed mobile data transmission has increased. New modulation techniques are being implemented to keep up with the desired more...

Download PDF file
  • EP ID EP98952
  • DOI -
  • Views 90
  • Downloads 0

How To Cite

V. Sravan Kumar Reddy, Professor C. Rajendra (2012). EKST: Efficient Keyword Searching Technique for Encrypted Data in CipherCloud  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(4), 552-556. https://europub.co.uk/articles/-A-98952