A New Method for Searching Keyword in Cloud Servers Using Anfis
-
2640
Downloads
-
3757
Views
Authors
Fatemeh Goli
- Mirdamad Institute for Higher Education, Gorgan, Iran.
Hossein Momeni
- Golestan University, Gorgan, Iran.
Ali Yavari
- Sama technical and vocational training college, Islamic Azad University, Gorgan Branch, Gorgan, Iran.
Abstract
With the popularity of computing cloud in recent decade, sensitive information is stored in cloud systems. To protect the sensitive data before saving, cryptographic operation must be done. In cryptography with the traditional method the user can search its data with high security ability, but the disadvantage of this method is to enter the same items in data for searching. And there is not any virtual error for false type. This major weakness causes not to harmonize the alone mentioned method in searching on cloud servers. In this paper we solve the search problem of cloud encrypted words in light and fuzzy system with maintaining the data security. Its aim is to search in cases which there is not the user's possible errors be changed into the rules using a light and fuzzy network, and discussed with the use of neural network to learning the pattern of the server data, and when searching the network provides the closest option to the user. Our experimental results show that this method of diagnosis is above 90 percent in the scope of the written rules for fuzzy system.
Share and Cite
ISRP Style
Fatemeh Goli, Hossein Momeni, Ali Yavari, A New Method for Searching Keyword in Cloud Servers Using Anfis, Journal of Mathematics and Computer Science, 11 (2014), no. 4, 300 - 308
AMA Style
Goli Fatemeh, Momeni Hossein, Yavari Ali, A New Method for Searching Keyword in Cloud Servers Using Anfis. J Math Comput SCI-JM. (2014); 11(4):300 - 308
Chicago/Turabian Style
Goli, Fatemeh, Momeni, Hossein, Yavari, Ali. "A New Method for Searching Keyword in Cloud Servers Using Anfis." Journal of Mathematics and Computer Science, 11, no. 4 (2014): 300 - 308
Keywords
- cloud computing
- fuzzy search
- neural search
- neuro-fuzzy
- cryptography
MSC
References
-
[1]
M. Bellare, A. Boldyreva, A. O’Neill, Deterministic and efficiently searchable encryption, in Proceedings of Crypto 2007, volume 4622 ofLNCS, Springer-Verlag (2007)
-
[2]
F. Bao, R. Deng, X. Ding, Y. Yang, Private query on encrypted data in multi-user settings, in Proc. of ISPEC’08, (2008)
-
[3]
R. Curtmola, J. A. Garay, S. Kamara, R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in Proc. of ACM CCS’06, (2006)
-
[4]
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou, Fuzzy Keyword Search over Encrypted Data in Cloud Computing, , (2010)
-
[5]
V. Levenshtein, Binary codes capable of correcting spurious insertions and deletions of ones, Problems of Information Transmission, 1 (1965), 8–17
-
[6]
B. Waters, D. Balfanz, G. Durfee, D. Smetters, Building an encrypted and searchable audit log, in Proc. of 11th Annual Network and Distributed System, (2004)
-
[7]
J. M. Zurada, Introduction to artificial neural systems , vol. 8: West publishing company , New York (1992)
-
[8]
S. Mitra, Y. Hayashi, Neuro-fuzzy rule generation: survey in soft computing framework, Neural Networks, IEEE Transactions on, 11 (2000), 748-768
-
[9]
C. Li, J. Lu, Y. Lu, Efficient merging and filtering algorithms for approximate string searches, in Proc. of ICDE’08, (2008)
-
[10]
S. Ji, G. Li, C. Li, J. Feng, Efficient interactive fuzzy keyword search, in Proc. of WWW’09, (2009)
-
[11]
D. Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in Proc. of IEEE Symposium on Security andPrivacy’00, (2000)
-
[12]
E.-J. Goh, Secure indexes, Cryptology ePrint Archive, Report2003/216 (2003)
-
[13]
Y.-C. Chang, M. Mitzenmacher, Privacy preserving keyword searches on remote encrypted data, in Proc. of ACNS’05, (2005)
-
[14]
D. Boneh, G. D. Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in Proc. of EUROCRYP’04, (2004)
-
[15]
J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. Strauss, R. N.Wright, Secure multiparty computation of approximations, in Proc. Of ICALP’01. , ()
-
[16]
R. Ostrovsky, Software protection and simulations on oblivious rams, Ph.D dissertation, Massachusetts Institute of Technology (1992)