Fuzzy Keyword Search over Encrypted Stego in Cloud

Authors

  • Dahake T Department of Computer Engineering, K.J. Somaiya College of Engineering, Mumbai University,India
  • Shaikh MS
  • Khandeparkar V Department of Computer Engineering, K.J. Somaiya College of Engineering, Mumbai University
  • Panchal N Department of Computer Engineering, K.J. Somaiya College of Engineering, Mumbai University
  • Bherde G Department of Computer Engineering, K.J. Somaiya College of Engineering, Mumbai University

Keywords:

Cloud Computing, Fuzzy Keyword Search, Privacy, Cloud Security

Abstract

Today cloud is a relatively young and booming technological advancement. Cloud services are getting more and more popular these days, from online software to cloud storages like Google drive, one drive, Dropbox, etc. Smartphones and increasing internet connectivity are the main catalyst to this booming industry. The benefits that can be obtained from this technology are many like low cost, low maintenance and many more. Consumers now don’t have to worry about the storage space, now they can subscribe to cloud storage and avail much more data storage capacity at low cost compared to actual hardware. But there are many problems too, security and privacy is one of the major one. In this paper we will propose a solution for this problem in the context of cloud storage. We propose usage of cryptography and steganography. Cryptography converts ordinary information (plain text) into something that doesn’t make sense or incomprehensible information (cipher text). Steganography is concealment of information. Unlike cryptography it doesn’t attract attention, it just appears to be a normal data but within it a sensitive data is hidden. The other problem is data retrieval or searching. We propose using fuzzy logic for this.Fuzzy keyword search incredibly improves framework ease of use by giving back the coordinating data when clients seeking inputs precisely coordinate the predefined keywords or the nearest conceivable coordinating data in view of keyword similitude semantics, when careful match comes up short.

References

Chih-Chung Lu and Shau-Yin Tseng , ”Integrated Design of AES (Advanced Encryption Standard) Encrypter and Decrypter” ,IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP’02) 1063-6862/02

Chih-Chung Lu and Shau-Yin Tseng , ”Integrated Design of AES (Advanced Encryption Standard) Encrypter and Decrypter” ,IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP’02) 1063-6862/02

“How to base 64” by Randy Charles Morin, www.kbcafe.com

Gunjan Nehru, Puja Dhar, “A Detailed look of Audio Steganography Techniques LSB and Genetic Algorithm Approach”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, January 2012, ISSN (Online): 1694-0814

Jin Li, Qian Wang, Cong Wang, Ning Cao, KuiRen†, and Wenjing Lou, “Fuzzy Keyword Search over Ecrypted Data in Cloud Computing,” IEEE INFOCOM 2010,978-1-4244-5837-0/10

Downloads

Published

2025-11-11

How to Cite

[1]
T. Dahake, M. S. Shaikh, V. Khandeparkar, N. Panchal, and G. Bherde, “Fuzzy Keyword Search over Encrypted Stego in Cloud”, Int. J. Comp. Sci. Eng., vol. 4, no. 2, pp. 125–127, Nov. 2025.