An Efficient Approach for Secure Storage, Search using AES in Cloud Storage

  • Authors

    • P Anjaiah
    • C Raghavendra
    • K Rajendra Prasad
    2018-07-20
    https://doi.org/10.14419/ijet.v7i3.12.16449
  • Fuzzy inquiry, encryption on cloud, distributed computing, AES, trump card.
  • The expanded rate of development and adaption of distributed computing, day by day, more delicate data is being brought together onto the cloud. For the security of profitable data, the information must be encoded before externalization. The current inquiry procedures enable the client to seek over encoded information utilizing keyword yet these methods represent just correct hunt. There is no resilience for grammatical errors and organization irregularities which are typical client conduct. This makes compelling information stockpiling and use an exceptionally difficult errand, providing client seeking extremely baffling and wasteful. In this paper, we concentrate on secure capacity utilizing Advanced Encryption Standard (AES) and data recovery by performing Fuzzysearch on information which is scrambled while transferring on the cloud. We are proposing the execution of a progressed Fuzzykeywordtechnique called the Wildcard based procedures which restores the coordinating records when clients seeking inputs definitely coordinate the predefined keyword or the nearest conceivable coordinating documents in light of likeness catchphrase semantics when correct match comes up short. In the proposed method, using alter separation to measure keywords similitude and build up a proficient strategies for developing fuzzy keyword sets, which concentrate on diminishing the capacity and portrayal overtop.

     

     

  • References

    1. [1] Google, “Britney spears spellingcorrectionâ€, Referenced online at http:// www.google.com/jobs/britney.html, June 2009.

      [2] M. Bellare, A. Boldyreva, and A. O’Neill, “Deterministic and efficiently searchable encryption,†in Proceedings of Crypto 2007, volume 4622 of LNCS. Springer-Verlag,2007.

      [3] K.Rajendra Prasad, C.Raghavendra,Padakandla Vyshnav, “Intelligent System for Visualized Data Analytics A Reviewâ€, International Journal of Pure and Applied Mathematics, Volume 116 No. 21 2017, 217-224.

      [4] E.-J. Goh, “Secure indexes,†Cryptology ePrint Archive, Report 2003/216, 2003, http://eprint.iacr.org/.

      [5] D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,†in Proc. of EUROCRYP’04,2004.

      [6] B. Waters, D. Balfanz, G. Durfee, and D. Smetters, “Building an encrypted and searchable audit log,†in Proc. of 11th Annual Network and Distributed System, 2004.

      [7] C. Nalini, C. Raghavendra, K. Rajendra Prasad, “Comparative Observation and Performance Analysis of Multiple Algorithms on Iris Dataâ€, International Journal of Pure and Applied Mathematics, Volume 116 No. 9 2017, 319-325.

      [8] R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,†in Proc. of ACM CCS’06,2006.

      [9] K. Rajendra Prasad, C. Raghavendra, K Sai Saranya, “A Review on Classification of Breast Cancer Detection using Combination of The Feature Extraction Modelsâ€, International Journal of Pure and Applied Mathematics, Volume 116 No. 21 2017, 203-208.

      [10] F. Bao, R. Deng, X. Ding, and Y. Yang, “Private query on encrypted data in multi-user settings,†in Proc. of ISPEC’08,2008.

      [11] C. Raghavendra, Dr. A Kumaravel, A. Anjaiah, “A New Hybrid Method for Image De-Noising In Light Of Wavelet Transformâ€, International Journal of Pure and Applied Mathematics, Volume 116 No. 21 2017, 197-202.

      [12] A. Behm, S. Ji, C. Li, , and J. Lu, “Space- constrained gram-based indexing for efficient approximate string search,†in Proc. ofICDE’09.

      [13] S. Ji, G. Li, C. Li, and J. Feng, “Efficient interactive fuzzy keyword search,†in Proc. of WWW’09,2009.

      [14] C. Raghavendra, A. Kumaraveland S. Sivasuramanyan, “Features Subset Selection using Improved Teaching Learning based Optimisation (ITLBO) Algorithms for Iris Recognitionâ€, Indian Journal of Science and Technology, Vol 10(34), DOI: 10.17485/ijst/2017/v10i34/118307, September 2017.

      [15] R. Ostrovsky, “Software protection and simulations on oblivious rams,†Ph.D dissertation, Massachusetts Institute of Technology,1992.

      [16] C. Raghavendra, A. Kumaravel and S. Sivasuramanyan, “Identifying images on moving objects to enhance the recognitionâ€, Indian Journal of Science and Technology, Vol 7(1.5), pp. 279-282, December 2017.

      [17] Fuzzy keyword search over encrypted data in cloud computing" by T. Balamuralikrishna.

  • Downloads

  • How to Cite

    Anjaiah, P., Raghavendra, C., & Rajendra Prasad, K. (2018). An Efficient Approach for Secure Storage, Search using AES in Cloud Storage. International Journal of Engineering & Technology, 7(3.12), 661-665. https://doi.org/10.14419/ijet.v7i3.12.16449