Encrypted Arabic Documents Search Model using Fuzzy Keywords in Cloud Computing

Nidal Hassan Hussein, Ahmed Khalid, Khalid Khanfar


Cloud computing is a burgeoning and revolutionary technology that has changed how data are stored and computed in the cloud. This technology incorporates many elements into an innovative architecture. Among them are autonomic computing, grid computing, and utility computing. Moreover, the rapid storage of data in the clouds has an impact on the security level of organizations. The chief challenge of cloud computing is how to build a secured cloud storage.The reason for this difficulty is thatbefore data transfer, data are usually encrypted in order to achieve a high utilization. Another real challenging task of cloud computing is how to apply a search over encrypted data. As many techniques support only exact keywordmatches, we propose a model to search over encrypted data that are written in Arabic. If an exact keyword match fails, our model will approximate the file as a secondary result. Our model will also use a fuzzy keyword search to enhance system usability by obtaining matching result whenever users input exact matches or the closest possible matches based on keywords. To the best of our knowledge, our model is considered to be the first research work that applies fuzzy search over Arabic encrypted data.


fuzzy keyword; cloud computing; encryption; edit distance; multi cloud; wildcard; arabic fuzzy search scheme; AFSS

Full Text:



Bao F, Deng R, Ding X, Yang Y. Private query on encrypted data in multi-user settings. Proc.Of ISPEC. 2008.

Bellare M, Boldyreva A, O’Neill A. Deterministic and efficiently searchable encryption. Proceedings of Crypto 2007; 4622 of LNCS.Springer-Verlag.

Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data. Proc. of IEEE Symposium on Security and Privacy. 2000.

Goh EJ. Secure indexes, Cryptology ePrint Archive. http://eprint.iacr. org/. 2003/216.

Boneh D, Crescenzo GD, Ostrovsky R, Persiano G. Public key encryption with keyword search. Proc. of EUROCRYP. 2004.

Waters B, Balfanz D, Durfee G, Smetters D. Building an encrypted and searchable audit log. Proc. Of 11th Annual Network and Distributed System. 2004.

Chang YC, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data. Proc. of ACNS. 2005.

Curtmola R, Garay JA, Kamara S, Ostrovsky R. Searchable symmetric encryption: improved definitions and efficient constructions. Proc. of ACM CCS. 2006.

Li J, Wang Q, Wang C, Cao N, Ren K, Lou W. Fuzzy keyword search over encrypted data in cloud computing. Proc. of IEEE INFOCOM. 2010

INF 3800, Edit Distance, 2011.02.21

M. Hellmann, Fuzzy Logic Introduction, LaboratoireAntennes Radar Telecom, F.R.E CNRS 2272

D. Parkhill, “The challenge of the computer utility,” Addison-Wesley Educational Publishers Inc., US,

P. Mell and T. Grance, “Draft nist working definition of cloud computing,” Referenced on June. 3rd,

Online at http://csrc.nist.gov/groups/SNS/cloud-computing/index.html, 2009.

M. Armbrust and et.al, “Above the clouds: A berkeley view of cloud computing,” Tech. Rep., Feb

[Online]. Available: http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html

Jin Li1, Qian Wang1, Cong Wang1, Ning Cao2, Kui Ren1, and Wenjing Lou2, ” Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing”,

Jospin Jeya, J. and E. Kannan,” Efficient Ranked And Secure File Retrieval In Cloud Computing”, American Journal of Applied Sciences 11 (6): 906-911, 2014 ISSN: 1546-9239

DOI: http://dx.doi.org/10.30630/joiv.1.2.22


  • There are currently no refbacks.

JOIV : International Journal on Informatics Visualization
Published by Information Technology Department
Politeknik Negeri Padang, Indonesia

© JOIV - ISSN : 2549-9610 | e-ISSN : 2549-9904 

Phone : +62-82386434344
Email  : hidraamnur@live.com | hidra@pnp.ac.id

Creative Commons License is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

View My Stats