JCC  Vol.3 No.9 , September 2015
Improved Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords
Abstract: A search strategy over encrypted cloud data based on keywords has been improved and has presented a method using different strategies on the client and the server to improve the search efficiency in this paper. The client uses the Chinese and English to achieve the synonym construction of the keywords, the establishment of the fuzzy-syllable words and synonyms set of keywords and the implementation of fuzzy search strategy over the encryption of cloud data based on keywords. The server side through the analysis of the user’s query request provides keywords for users to choose and topic words and secondary words are picked out. System will match topic words with historical inquiry in time order, and then the new query result of the request is directly gained. The analysis of the simulation experiment shows that the fuzzy search strategy can make better use of historical results on the basis of privacy protection for the realization of efficient data search, saving the search time and improving the efficiency of search.
Cite this paper: Zhang, P. and Wang, J. (2015) Improved Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords. Journal of Computer and Communications, 3, 90-98. doi: 10.4236/jcc.2015.39010.

[1]   Li, J., Wang, Q., Wang, C., Ren, K. and Lou, W.J. (2010) Fuzzy Keyword Search over Encrypted Data in Cloud Computing. Proceedings of IEEE INFOCOM Mini-Conference, San Diego, 15-19 March 2010, 441-445.

[2]   Hore, B., Mehrotra, S., Canim, M., and Kantarcioglu, M. (2012) Secure Multidimensional Range Queries over Outsourced Data. The VLDB Journal, 21, 333-358.

[3]   Lin, C., Su, W.B., Meng, K., Liu, Q. and Liu, W.D. (2013) Cloud Computing Security: Architecture, Mechanism and Modeling Evaluation. Chinese Journal of Computer, 36, 1765-1784.

[4]   Cao, N., Wang, C., Li, M., Ren, K. and Lou, W.J. (2011) Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. Proceedings of IEEE INFOCOM 2011, Shanghai, 10-15 April 2011, 829-837.

[5]   Tebibel, T. and Kaci, A. (2015) Parallel Search over Encrypted Data under Attribute Based Encryption on the Cloud Computing. Computers & Security, in press.

[6]   Wang, P. and Ravishankar, C.V. (2013) Secure and Efficient Range Queries on Outsourced Databases Using R-Trees. 29th International Conference on Data Engineering (ICDE), Brisbane, 8-12 April 2013, 314-325.

[7]   Wang, Z.Y., Xu,Y.R. and Guo, J. (2012) New Technologies of Intelligent Text Search. Transactions on Intelligent Systems, 7, 40-49.

[8]   Wu, J.M., Han, Y.H. and Ji, D.D. (2013) Research and Design of Search Engine for Digital Works Based on Lucene. Computer Engineering & Science, 35, 166-172.

[9]   Yin, Z. and Cao, J. (2012) Clouds Search Optimization Algorithm with Difference Quotient Information and Its Convergence Analysis. Computer Science, 39, 252-255.

[10]   Zhou, B., Liu, Y.Q., Zhang, M., Jin, Y.J. and Ma, S.P. (2011) Incorporating Web Browsing Activities into Anchor Texts for Web. Information Retrieval, 14, 290-314.

[11]   Zhang, P. and Wang, J.Z. (2014) An Improved Efficient Search Method Based on Big Data. Application Research of Computer, 31, 2331-2333.

[12]   Fang, Z.J., Zhou, S. and Xia, Z.H. (2015) Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords. Computer Science, 42, 136-139.

[13]   Huang, R.W., Gui, X.L., Chen, N.J. and Yao, J. (2015) Encryption Algorithm Supporting Relational Calculations in Cloud Computing. Journal of Software, 26, 1181-1195. (In Chinese)