Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

An Efficient Dictionary and Lingual Keyword based Secure Search Scheme in Cloud Storage

International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 68 - Number 15
Year of Publication: 2013
Sushil Kumar Verma
Sijo Mathew
Shashank Srivastava
S. Venkataesan

Sushil Kumar Verma, Sijo Mathew, Shashank Srivastava and S Venkataesan. Article: An Efficient Dictionary and Lingual Keyword based Secure Search Scheme in Cloud Storage. International Journal of Computer Applications 68(15):40-43, April 2013. Full text available. BibTeX

	author = {Sushil Kumar Verma and Sijo Mathew and Shashank Srivastava and S. Venkataesan},
	title = {Article: An Efficient Dictionary and Lingual Keyword based Secure Search Scheme in Cloud Storage},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {68},
	number = {15},
	pages = {40-43},
	month = {April},
	note = {Full text available}


Cloud computing has become the more accepted answer to the current information needs. With today's enterprises operating across multilingual and multicultural spectrum, cloud computing search algorithms should be upgraded to perform searches based on multilingual languages. Data stored in cloud is in encrypted form this is in order to maintain the data integrity, the data search techniques used in the cloud needs to maintain this encryption as the cloud service provider should not be able to ascertain what is entering and leaving the cloud. This paper proposes a solution ,which will provides a method for finding exact encrypted data by using multilingual search queries, phonetic based and also keeping the data integrity of the stored data in the cloud intact. The paper also provides a comparative study between the various public key encryptions and the proposed scheme.


  • R. ChinnaSamy, Dr. S. Sujatha. An Efficient Semantic Secure Keyword Based Search Scheme in Cloud Storage Services. In International Conference on Recent Trends in Information Technology ICRTIT-2012
  • Ning Cao, Cong Wang, MingLi, Kui Ren, and Wenjing Lou. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data. In IEEE INFOCOM 2011
  • Chang Liu, Liehuang Zhu, Longyijia Li, Yu'an Tan. Fuzzy Keyword Search on Encrypted Cloud Storage Data With Small Index. In Proceedings of IEEE CCIS2011
  • Boneh D, Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search. In: Proceedings of Eurocrypt 2004, Lecture notes in computer science, vol. 3027; 2004. p. 506–22.
  • Thulasimani Lakshmanan and Madheswaran Muthusamy. A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes . In The International Arab Journal of Information Technology, Vol. 9, No. 3, May 2012
  • Anup Mathew. Survey Paper on Security & Privacy Issues in Cloud Storage Systems. In EECE 571B, TERM SURVEY PAPER, APRIL 2012
  • Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In: Proceedings of TCC 2007, Lecture notes in computer science, vol. 4392; 2007. p. 535–54.
  • Liu Q, Wang G, Wu J. An efficient privacy preserving keyword search scheme in cloud computing. In: Proceedings of IEEE TrustCom-09 in conjunction with IEEE CSE-09; 2009. p. 715–20.
  • Ari Pirkola, Turid Hedlund, Heikki Keskutalo,and Kalerro Jarvelin, Dictionary-Based Cross Language Information Retrieval: Problems, Methods and Research Findings. In Information Retrieval 4(3/4),209-230
  • Y. -C. Chang and M. Mitzenmacher. Privacy Preserving Keyword Searches on Remote Encrypted Data. Proceedings of ACSN 2005, Lecture Notes in Computer Science 3531, pp. 442-455.
  • Liu Hong-xia, Dai Jia-zhu, Jiang Chao "Research on Privacy Preserving Keyword Search in Cloud Storage "Computer Science and Information Technology ICCSIT 2010 3rd IEEE International Conference
  • D. X. Song, D. Wagner and A. Perrig. Practical Techniques for Searches on Encrypted Data. Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 44-55