Adversary Model Operation in Cloud Computing

Download Now
Provided by: International Journal of Engineering Innovations and Research (IJEIR)
Topic: Cloud
Format: PDF
As cloud computing becomes prevalent, more and more sensitive information is being centralized into the cloud. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and selectively retrieve files of interest, these techniques support only exact keyword find out. In this paper, for the first time the authors formalize and solve the problem of effective fuzzy keyword find out over encrypted cloud data while maintaining keyword privacy. Fuzzy keyword search greatly enhances system usability by returning the matching files when users searching inputs exactly match the predefined keywords or the closet possible matching files based on keyword similarity semantics, when exact match fails.
Download Now

Find By Topic