International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 108 | Views: 170

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 5, May 2017


Fuzzy Search Engine for Cloud Encrypted Data

Swara Saoji | Nitin Bhil


Abstract: Now a day's cloud computing is one of the most effective data sharing scenario. It is a new model of enterprise IT infrastructure, which can organize huge resource of computing, storage and convenient and on-demand network access to a shared pool of configurable computing resources with great efficiency and minimum economic overhead. Many organizations and individuals are interested in storing their sensitive data egpersonal health record, financial record in cloud. Cloud computing enables the paradigm of data service outsourcing. To protect data privacy, sensitivity cloud data has to be encrypted before outsourced to the commercial public cloud, which makes effective data utilization service and increase accuracy. Fuzzy search technique is used for searching the documents stored on cloud. User will be able to search any documents with the help of s. The traditional searchable encryption schemes provide a number of approaches to search on encrypted data, but they all support only exact search. Exact search is unsuitable for cloud storage systems, because it doesn't allow users to make any spelling errors or format inconsistencies, and thereby reduces the system usability. The multi- fuzzy search scheme support more spelling mistakes. In our proposed system, fuzzy searching over encrypted cloud data is discussed but access permission verification for searched data is not discussed. In our proposed project, at the time of document searching we will filter the documents from result-set with the help of specified access permission. There is large number of users and huge amount of data files in cloud. Fuzzy search techniques allow users to securely search over encrypted data through s.


Keywords: Cloud computing, Fuzzy search, data service outsourcing, IT Infrastructure


Edition: Volume 6 Issue 5, May 2017,


Pages: 2463 - 2466


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top