Reference Hub5
Cloud-Based Fuzzy Keyword Search Scheme Over Encrypted Documents

Cloud-Based Fuzzy Keyword Search Scheme Over Encrypted Documents

Hanya M. Abdallah, Ahmed Taha, Mazen M. Selim
Copyright: © 2021 |Volume: 13 |Issue: 4 |Pages: 19
ISSN: 1941-6253|EISSN: 1941-6261|EISBN13: 9781799860259|DOI: 10.4018/IJSKD.2021100106
Cite Article Cite Article

MLA

Abdallah, Hanya M., et al. "Cloud-Based Fuzzy Keyword Search Scheme Over Encrypted Documents." IJSKD vol.13, no.4 2021: pp.82-100. http://doi.org/10.4018/IJSKD.2021100106

APA

Abdallah, H. M., Taha, A., & Selim, M. M. (2021). Cloud-Based Fuzzy Keyword Search Scheme Over Encrypted Documents. International Journal of Sociotechnology and Knowledge Development (IJSKD), 13(4), 82-100. http://doi.org/10.4018/IJSKD.2021100106

Chicago

Abdallah, Hanya M., Ahmed Taha, and Mazen M. Selim. "Cloud-Based Fuzzy Keyword Search Scheme Over Encrypted Documents," International Journal of Sociotechnology and Knowledge Development (IJSKD) 13, no.4: 82-100. http://doi.org/10.4018/IJSKD.2021100106

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

With the rapid growth and adoption of cloud computing, more sensitive information is centralized onto the cloud every day. For protecting this sensitive information, it must be encrypted before being outsourced. Current search schemes allow the user to query encrypted data using keywords, but these schemes do not guarantee the privacy of queries (i.e., when the user hits query more than once with the same keywords, the server can capture information about the data). This paper focuses on the secure storage and retrieval of ciphered data with preserving query privacy. The proposed scheme deploys the sparse vector space model to represent each query, which focuses on reducing the storage and representation overheads. And the proposed scheme adds a random number to each query vector. Hence, the cloud server cannot distinguish between queries with the same keywords, which ensures the privacy of the query. Experimental results show that the proposed scheme outperforms other relevant state-of-the-art schemes.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.