Fuzzy Search Engine for Cloud Encrypted Data
Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 5)Publication Date: 2017-05-05
Authors : Swara Saoji; Nitin Bhil;
Page : 2463-2466
Keywords : Cloud computing; Fuzzy search; data service outsourcing; IT Infrastructure;
Abstract
Now a day's cloud computing is one of the most effective data sharing scenario. It is a new model of enterprise IT infrastructure, which can organize huge resource of computing, storage and convenient and on-demand network access to a shared pool of configurable computing resources with great efficiency and minimum economic overhead. Many organizations and individuals are interested in storing their sensitive data egpersonal health record, financial record in cloud. Cloud computing enables the paradigm of data service outsourcing. To protect data privacy, sensitivity cloud data has to be encrypted before outsourced to the commercial public cloud, which makes effective data utilization service and increase accuracy. Fuzzy search technique is used for searching the documents stored on cloud. User will be able to search any documents with the help of s. The traditional searchable encryption schemes provide a number of approaches to search on encrypted data, but they all support only exact search. Exact search is unsuitable for cloud storage systems, because it doesn't allow users to make any spelling errors or format inconsistencies, and thereby reduces the system usability. The multi- fuzzy search scheme support more spelling mistakes. In our proposed system, fuzzy searching over encrypted cloud data is discussed but access permission verification for searched data is not discussed. In our proposed project, at the time of document searching we will filter the documents from result-set with the help of specified access permission. There is large number of users and huge amount of data files in cloud. Fuzzy search techniques allow users to securely search over encrypted data through s.
Other Latest Articles
- Analysis of GFRG Multistoried Buildings with Irregular Horizontal and Vertical Configurations
- Analysis of Multistoried Buildings to Study the Influence of Depth of Belt Truss System
- User Interaction System Controller for Presentation using Kinect
- Agronomic Evaluation of Okra under Different Irrigation and Soil Management Practices at Isampou, Bayelsa State, Nigeria
- A Uni-Variate Analysis of Hedonistic-Altruistic Behavior of Home Reared, Institutionalized and Street Children
Last modified: 2021-06-30 18:55:25