Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2015 (2015), Article ID 706102, 17 pages
http://dx.doi.org/10.1155/2015/706102
Research Article

Universal Keyword Classifier on Public Key Based Encrypted Multikeyword Fuzzy Search in Public Cloud

1R.M.D Engineering College, R.S.M Nagar, Kavaraipettai, Chennai, Tamil Nadu 601206, India
2R.M.K College of Engineering and Technology, R.S.M Nagar, Puduvoyal, Chennai, Tamil Nadu 601206, India

Received 20 May 2015; Revised 17 July 2015; Accepted 29 July 2015

Academic Editor: Juan M. Corchado

Copyright © 2015 Shyamala Devi Munisamy and Arun Chokkalingam. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Geelan, “Twenty one experts define cloud computing,” Virtualization, 2008, http://virtualization.sys-con.com/node/612375. View at Google Scholar
  2. I. Foster, Y. Zhao, I. Raicu, and S. Lu, “Cloud computing and grid computing 360-degree compared,” in Proceedings of the Grid Computing Environments Workshop (GCE '08), pp. 1–10, Austin, Tex, USA, November 2009. View at Publisher · View at Google Scholar
  3. http://searchsmbstorage.techtarget.com/feature/Understanding-cloud-storage-services-A-guide-for-beginners.
  4. Q. Liu, G. Wang, and J. Wu, “Secure and privacy preserving keyword searching for cloud storage services,” Journal of Network and Computer Applications, vol. 35, no. 3, pp. 927–933, 2012. View at Publisher · View at Google Scholar
  5. K. Ren, C. Wang, and Q. Wang, “Towards secure and effective data utilization in public cloud,” IEEE Transactions on Network, vol. 26, no. 6, pp. 69–74, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,” in Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79–88, Alexandria, Va, USA, 2006. View at Publisher · View at Google Scholar
  7. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy keyword search over encrypted data in cloud computing,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '10), pp. 441–445, IEEE, San Diego, Calif, USA, March 2010. View at Publisher · View at Google Scholar
  8. L. Sarga, “Cloud computing: an overview,” Journal of Systems Integration, 2012, http://si-journal.org/index.php/JSI/article/viewFile/131/101. View at Google Scholar
  9. W. Zhou, L. Liu, H. Jing, C. Zhang, and S. Yao, “K-gram based fuzzy keyword search over encrypted cloud computing,” Journal of Software Engineering and Applications, Scientific Research, no. 6, pp. 29–32, 2013. View at Publisher · View at Google Scholar
  10. J. Wang, H. Ma, Q. Tang et al., “Efficient verifiable fuzzy keyword search over encrypted data in cloud computing,” Computer Science and Information Systems, vol. 10, no. 2, pp. 667–684, 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. P. Xu, H. Jin, Q. Wu, and W. Wang, “Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack,” IEEE Transactions on Computers, vol. 62, no. 11, pp. 2266–2277, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. B. Wang, S. Yu, W. Lou, and Y. T. Hou, “Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud,” in Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM '14), pp. 2112–2120, IEEE, Toronto, Canada, April-May 2014. View at Publisher · View at Google Scholar
  13. S. Kamara and K. Lauter, “Cryptographic cloud storage,” in Financial Cryptography and Data Security, vol. 6054 of Lecture Notes in Computer Science, pp. 136–149, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar
  14. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Advances in Cryptology—EUROCRYPT 2004, vol. 3027 of Lecture Notes in Computer Science, pp. 506–522, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar
  15. J. Baek, R. Safavi-Naini, and W. Susilo, “Public key encryption with keyword search revisited,” in Computational Science and Its Applications—ICCSA 2008, vol. 5072 of Lecture Notes in Computer Science, pp. 1249–1259, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar
  16. S.-T. Hsu, C.-C. Yang, and M.-S. Hwang, “A study of public key encryption with keyword search,” International Journal of Network Security, vol. 15, no. 2, pp. 71–79, 2013, http://ijns.jalaxy.com.tw/contents/ijns-v15-n2/ijns-2013-v15-n2-p71-79.pdf. View at Google Scholar
  17. Y. Zhao, H. Ma, X. Chen, Q. Tang, and H. Zhu, “A new trapdoor-indistinguishable public key encryption with keyword search,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 3, no. 1-2, pp. 72–81, 2012. View at Google Scholar · View at Scopus