Open Access   Article Go Back

Fuzzy Keyword Search over Encrypted Stego in Cloud

TanmayDahake 1 , MirsohailShaikh 2 , Vipul Khandeparkar3 , Neerav Panchal4and Gajanan Bherde4

Section:Review Paper, Product Type: Journal Paper
Volume-4 , Issue-2 , Page no. 125-127, Feb-2016

Online published on Feb 29, 2016

Copyright © TanmayDahake, MirsohailShaikh, Vipul Khandeparkar,Neerav Panchal4and Gajanan Bherde . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: TanmayDahake, MirsohailShaikh, Vipul Khandeparkar,Neerav Panchal4and Gajanan Bherde, “Fuzzy Keyword Search over Encrypted Stego in Cloud,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.125-127, 2016.

MLA Style Citation: TanmayDahake, MirsohailShaikh, Vipul Khandeparkar,Neerav Panchal4and Gajanan Bherde "Fuzzy Keyword Search over Encrypted Stego in Cloud." International Journal of Computer Sciences and Engineering 4.2 (2016): 125-127.

APA Style Citation: TanmayDahake, MirsohailShaikh, Vipul Khandeparkar,Neerav Panchal4and Gajanan Bherde, (2016). Fuzzy Keyword Search over Encrypted Stego in Cloud. International Journal of Computer Sciences and Engineering, 4(2), 125-127.

BibTex Style Citation:
@article{Khandeparkar_2016,
author = {TanmayDahake, MirsohailShaikh, Vipul Khandeparkar,Neerav Panchal4and Gajanan Bherde},
title = {Fuzzy Keyword Search over Encrypted Stego in Cloud},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2016},
volume = {4},
Issue = {2},
month = {2},
year = {2016},
issn = {2347-2693},
pages = {125-127},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=809},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=809
TI - Fuzzy Keyword Search over Encrypted Stego in Cloud
T2 - International Journal of Computer Sciences and Engineering
AU - TanmayDahake, MirsohailShaikh, Vipul Khandeparkar,Neerav Panchal4and Gajanan Bherde
PY - 2016
DA - 2016/02/29
PB - IJCSE, Indore, INDIA
SP - 125-127
IS - 2
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1486 1418 downloads 1398 downloads
  
  
           

Abstract

Today cloud is a relatively young and booming technological advancement. Cloud services are getting more and more popular these days, from online software to cloud storages like Google drive, one drive, Dropbox, etc. Smartphones and increasing internet connectivity are the main catalyst to this booming industry. The benefits that can be obtained from this technology are many like low cost, low maintenance and many more. Consumers now don’t have to worry about the storage space, now they can subscribe to cloud storage and avail much more data storage capacity at low cost compared to actual hardware. But there are many problems too, security and privacy is one of the major one. In this paper we will propose a solution for this problem in the context of cloud storage. We propose usage of cryptography and steganography. Cryptography converts ordinary information (plain text) into something that doesn’t make sense or incomprehensible information (cipher text). Steganography is concealment of information. Unlike cryptography it doesn’t attract attention, it just appears to be a normal data but within it a sensitive data is hidden. The other problem is data retrieval or searching. We propose using fuzzy logic for this.Fuzzy keyword search incredibly improves framework ease of use by giving back the coordinating data when clients seeking inputs precisely coordinate the predefined keywords or the nearest conceivable coordinating data in view of keyword similitude semantics, when careful match comes up short.

Key-Words / Index Term

Cloud Computing, Fuzzy Keyword Search, Privacy, Cloud Security

References

[1] Chih-Chung Lu and Shau-Yin Tseng , ”Integrated Design of AES (Advanced Encryption Standard) Encrypter and Decrypter” ,IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP’02) 1063-6862/02
[2] Chih-Chung Lu and Shau-Yin Tseng , ”Integrated Design of AES (Advanced Encryption Standard) Encrypter and Decrypter” ,IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP’02) 1063-6862/02
[3] “How to base 64” by Randy Charles Morin, www.kbcafe.com
[4] Gunjan Nehru, Puja Dhar, “A Detailed look of Audio Steganography Techniques LSB and Genetic Algorithm Approach”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, January 2012, ISSN (Online): 1694-0814
[5] Jin Li, Qian Wang, Cong Wang, Ning Cao, KuiRen†, and Wenjing Lou, “Fuzzy Keyword Search over Ecrypted Data in Cloud Computing,” IEEE INFOCOM 2010,978-1-4244-5837-0/10