Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{172037, author = {Chetan N. Rathod and Bhumika K. Charnanand}, title = {Cloud Computing's Fuzzy Search Over Encrypted Data}, journal = {International Journal of Innovative Research in Technology}, year = {2025}, volume = {3}, number = {11}, pages = {316-319}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=172037}, abstract = {Since all data is stored on the cloud, cloud computing is known to be centralised. Data may or may not be sensitive, but it is unacceptable to compromise privacy. Encrypting data is a prerequisite for outsourcing. Although encryption makes it difficult to use data, traditional software can still retrieve data even when encryption is in place. However, in order to obtain data, the exact keyword must match during the search in order to download the necessary file; otherwise, you will receive blank results. Even a small typo is unacceptable, and we regularly encounter errors of this kind. This results in low efficiency and negatively impacts system usability. Thus, by achieving them and maintaining data encryption against unauthorised users and cloud owners, we are able to formalise the issue and find solutions through a variety of methods. By matching the exact or closest match text to the stored keywords and retrieving the approximate closest results, fuzzy keyword search improves the system's usability. Here, we're quantifying keywords using edit distance and building the keyword set using sophisticated techniques that help cut down on overhead and storage. With the aid of file mapping based on usage, this also aids in search ranking, which places the most frequently viewed documents first, followed by others. In order to keep it safe even from cloud users, we are also putting one of the more sophisticated encryption algorithms into practice before uploading it over the cloud. The more sophisticated function outlined here involves using a selective encryption algorithm to work with images and videos in addition to documents.}, keywords = {Cloud computing, encryption, fuzzy search, edit distance, ranking search}, month = {January}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry