International Journal on Computer Science and Technology (IJCST)
It has been Cloud Computing, more and more sensitive information being centralized into the cloud. It the protection of data privacy, sensitive data usually has to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Which is traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and selectively retrieve files of interest, these techniques support only exact keyword search. That is, there is no tolerance of minor typos and format inconsistencies which, on the other hand, are typical user searching behavior and happen very frequently.