An Effective Keyword Search over Encrypted Data In Cloudenvironment

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2018, Vol 20, Issue 5

Abstract

As Cloud Computing ends up pervasive, touchy data are as a rule progressively unified into the cloud. For the insurance of information protection, delicate information must be scrambled before outsourcing, which makes compelling information usage an extremely difficult errand. Albeit customary accessible encryption plans enable clients to safely seek over encoded information through watchwords, these methods bolster just boolean inquiry, without catching any importance of information documents. This approach experiences two fundamental downsides when straightforwardly connected with regards to Cloud Computing. From one viewpoint, clients, who don't really have pre-information of the encoded cloud information, need to post process each recovered document so as to discover ones most coordinating their enthusiasm; On the other hand, constantly recovering all records containing the questioned catchphrase additionally acquires pointless system movement, which is completely unwanted in the present pay-as-you-utilize cloud worldview. In this paper we formalize and fathom the successful fluffy catchphrase seek over encoded information while keeping up the protection of information. Fluffy watchword look restores the catchphrase if correct match happen generally restores the nearest conceivable coordinating record. In this, we misuse alter remove method to discover comparative. Catchphrase Fuzzy watchword look significantly upgrade framework ease of use. The usage of the proposed arrangement demonstrates the effectiveness of the framework. Index Terms:

Authors and Affiliations

j. Sailaja

Keywords

Related Articles

 A Proposed Framework for Integrating Stack Path Identificationand Encryption Informed by Machine Learning as a SpoofingDefense Mechanism

 Abstract: Spoofing attacks have been terrorizing the information world for decades; so many methodologieshave been formulated to attempt the eradication of these attacks. This study elaborates on a proposedframewor...

 Analysis of Spending Pattern on Credit Card Fraud Detection

 Abstract: Credit card is one of the convenient way of payment in online shopping. In this on lineshopping, payment is made by giving information like card no, security code , expiration date of theCredit card etc ....

 Embedded Vision System for Autonomous Face Recognizer Robot using Eigenface Detector-PCA Improved Face Detection for Largely Occluded Faces

Abstract: The problem is to propose a method for detecting the face and recognizing the face for a robot. This is a challenging problem because faces are non-rigid and have a high degree of variability in size, shape, co...

NLP for Automated Conceptual Data Modeling

Abstract:One of the procedures for obtaining the better understanding of the system by splitting the large system into smaller parts, this procedure is termed as analysis. Manually creating softwareartifacts and building...

 Optimized Fuzzy Routing for MANET

 temporary network without the aid of any established infrastructure of centralized administration. In suchenvironment, the nodes operate both as hosts as well as routers. Due to mobility, the topology of the networ...

Download PDF file
  • EP ID EP402126
  • DOI 10.9790/0661-2005028489.
  • Views 105
  • Downloads 0

How To Cite

j. Sailaja (2018). An Effective Keyword Search over Encrypted Data In Cloudenvironment. IOSR Journals (IOSR Journal of Computer Engineering), 20(5), 84-89. https://europub.co.uk./articles/-A-402126