EKST: Efficient Keyword Searching Technique for Encrypted Data in CipherCloud
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
cloud, coming days is accustomed, more and more receptive data are being centralized into the cloud. In cloud, we make perceptive information habitually have to be ciphertext before outsourcing because of protecting of data privacy; it makes efficient information exploitation a very tough assignment. While traditional searchable ciphertext schemes permit a consumer to securely seek over ciphertext information through keywords and selectively reclaim records of attention, these techniques bear only precise keyword search. That is, here is lenience of trivial typos and configure inconsistencies which, on another hand, are distinctive consumer penetrating activities and happen very recurrently. This momentous negative aspect makes existing techniques incongruous in cloud computing as it significantly affects system usability, interpretation user penetrating experiences very testing and system efficacy very low. In this paper, we proposing EKST an efficient keyword searching technique as a solution and solve the crisis of searching the fuzzy keyword over encrypted cipharcloud data while maintaining keyword confidentiality. The proposed searching technique deeply enhances system usability by presentencing the matching files when user’s searching inputs exactly match the predefined keywords or the closest possible matching files based on keyword comparison semantics, when exact match fails. Our EKST greatly reduces the storage and depiction overheads, we develop revise space to enumerate fuzzified keywords similarity and implement a method on constructing fuzzified keyword sets, Through accurate security study, we show that our proposal is secure and privacy-preserving.
Authors and Affiliations
V. Sravan Kumar Reddy , Professor C. Rajendra
Routing Issues for Trust Based Framework in Mobile Ad Hoc Networks
The execution and survival of ad hoc networks depends on cooperative and trusting nature of the distributed nodes. There is a common assumption in the routing protocols that all nodes are trustworthy and cooperative....
Comparison of Optimization Techniques for Mutual Information based Real Time Image Registration
Image registration is the process of aligning two or more images of the same scene. A direct image registration approach uses Mutual Information (MI) as an image alignment. Mutual Information is a measure of the si...
Analyzing Knowledge Based Feature Selection to Detect Remote to Local Attacks
Intrusion Detection (ID) is the most significant component in Network Security System as it is responsible to detect several types of attacks. The IDS commonly deals with a large amount of data traffic, which involves ir...
Green Computing – Need and Implementation
Green computing is an effective approach to protect our environment from the hazardous material and its effects that comes from the computers and its related devices. It is an effective study of environmental scien...
AN OVERVIEW & ANALYSIS SAFETY PROPOSAL AND POLICIES OF INTERNET NETWORK SAFETY
Now days of network safety are very crucial and protected opinion, to determine virus. The review of the process of network safety policies to the private network connected to the internet & information networks. The...