CFP last date
20 May 2024
Reseach Article

Privacy Preserving Optimized Fuzzy like Search over Encrypted Data using Phonology

by Saurabh Gupta, Piyushank Gupta, Anup Kumar, Mohd. Wasim
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 7
Year of Publication: 2022
Authors: Saurabh Gupta, Piyushank Gupta, Anup Kumar, Mohd. Wasim
10.5120/ijca2022922045

Saurabh Gupta, Piyushank Gupta, Anup Kumar, Mohd. Wasim . Privacy Preserving Optimized Fuzzy like Search over Encrypted Data using Phonology. International Journal of Computer Applications. 184, 7 ( Apr 2022), 45-49. DOI=10.5120/ijca2022922045

@article{ 10.5120/ijca2022922045,
author = { Saurabh Gupta, Piyushank Gupta, Anup Kumar, Mohd. Wasim },
title = { Privacy Preserving Optimized Fuzzy like Search over Encrypted Data using Phonology },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2022 },
volume = { 184 },
number = { 7 },
month = { Apr },
year = { 2022 },
issn = { 0975-8887 },
pages = { 45-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number7/32345-2022922045/ },
doi = { 10.5120/ijca2022922045 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:20:54.768139+05:30
%A Saurabh Gupta
%A Piyushank Gupta
%A Anup Kumar
%A Mohd. Wasim
%T Privacy Preserving Optimized Fuzzy like Search over Encrypted Data using Phonology
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 7
%P 45-49
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With increasing need of e-Governance for boosting principle of “Minimum Government - Maximum Governance”, lots of government software applications were developed to capture citizen’s data and deliver various services to them. Sometimes captured data (like KYC data) is highly sensitive in nature and governed by personal information protection laws. Data at rest is of no use unless it is analyzed to generate useful information. Since the ownership of data lies with different government bodies, analysis over this data was possible only in isolation or else data privacy is compromised on data sharing. One approach to maintain data privacy before sharing it is to encrypt it using an encryption technique but strong Encryption techniques use diffusion principle identified by Claude Shannon which makes analysis over Cipher text in-efficacious. This is major deterrent in discovery of useful patterns, relationships and insights in contrast to when analysis is done over multiple data sources collectively which can be important input for Government Agencies in thwarting untoward incidents. This paper presents an approach to make use of Double Metaphone algorithm which reduces English words to their phonetic representations by using combination of consonant sounds and plausible pronunciations thereby achieving efficient fuzzy like search using exact match over encrypted phonetic representations. The string variations created by typo mistakes during search by a user was handled by the phonology and consonant substitution, thereby achieving speedy and accurate fuzzy like search over encrypted data. This not only preserves the privacy but enables data owners to share the data to the cloud for running further analytics over cipher text and sharing encrypted results with authorized government agencies on demand for further decryption with pre-shared symmetric key.

References
  1. Vision areas of Digital India Initiative available at https://www.digitalindia.gov.in/content/vision-and-vision-areas
  2. Judgment of Justice K. S. Puttaswamy (Retd.). and ANR by Hon’ble Supreme Court available at https://main.sci.gov.in/supremecourt/2012/35071/35071 _2012_Judgement_24-Aug-2017.pdf .
  3. Neha Mishra; Data Governance and Digital Trade in India: Losing Sight of the Forest for the Trees retrieved from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3835497
  4. Krishna Prakash Kalyanathaya, Dr.D. Akila, Dr.G. Suseendren "A Fuzzy Approach to Approximate String Matching for Text Retrieval in NLP" in Journal of Computational Information Systems 15:3(2019) Page 26-32
  5. Ako Muhamad Abdullah "Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data" published on June 16, 2017 in Cryptography and Network Security
  6. Justin Zobel, Philip Dart, Phonetic String Matching: Lessons from Information Retrieval
  7. Philips, Lawrence. (2000). The Double Metaphone Search Algorithm. C/C++ Users Journal. 18. 38-43.
  8. E. Manogar and S. Abirami, "A study on data deduplication techniques for optimized storage," 2014 Sixth International Conference on Advanced Computing (ICoAC), 2014, pp. 161-166, doi: 10.1109/ICoAC.2014.7229702.
  9. Ankita Pilani and G. Mayil Muthu Kumaran, “Comparative Study of Name Matching Algorithms,” 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom)
  10. Sneha A. Mittal and Dr. C. Rama Krishna, “Privacy Preserving Synonym Based Fuzzy Multi-keyword Search Over Encrypted Cloud Data,” 2016 International Conference on Computing, Communication and Automation (ICCCA2016)
  11. GUOXIU LIU et al., “FSSE: An Effective Fuzzy Semantic Searchable Encryption Scheme Over Encrypted Cloud Data,” 2020 IEEE Access, Digital Object Identifier 10.1109/ACCESS.2020.2966367
  12. Ristad, Eric & Yianilos, Peter. (1998). Learning String Edit Distance. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 20. 522 - 532. 10.1109/34.682181.
  13. Seema Sultana and Sunanda Dixit, “Indexes in PostgreSQL,” 2017 International Conference on Innovative Mechanisms for Industry Applications (ICIMIA 2017)
  14. Wei Lu et al., “Efficiently Supporting Edit Distance Based String Similarity Search Using B+-Trees,” 2014 IEEE Transactions on Knowledge and Data Engineering, Vol. 26, No. 12
Index Terms

Computer Science
Information Sciences

Keywords

Data Privacy Data Analytics Data Governance Advanced Encryption Standard Double Metaphone Fuzzy Search Phonetic Matching