when querying with a misspelling name, comparing
to the original chaotic searchable encryption method.
The same test is then performed when the user did
require the most similar three identity files for his
query and the results for the first and second
algorithms are then calculated. The averages over the
100 names for the first and second algorithms are
respectively equal to 0.796 and 1. As we can see, the
algorithms are more successful, in this case, to find
the right identity files when querying with a
misspelling name. The main reason is that the cloud
provider is retrieving three files and not just one and
then there is a bigger chance to find the matched
identity file.
6 CONCLUSIONS
In this paper, we proposed the first combined chaos and
metaphone based searchable encryption approach. The
proposed algorithm allows fuzzy keyword searches
over the encrypted data stored on the cloud. Our
approach proved the possibility of the usage of the
searchable encryption on the identity storage use case
and guarantees the privacy and confidentiality of the
people crossing borders even vis-à-vis the cloud
provider who is semi-trusted in our case.
ACKNOWLEDGEMENTS
This work is made within the framework of the Irish
Centre for Cloud Computing and Commerce (IC4)
which is an Irish government and Enterprise Ireland
supported technology research centre established in
2012.
REFERENCES
Awad, A., Matthews, A., Qiao, Y., Lee, B., 2015. "Chaotic
Searchable Encryption for Mobile Cloud Storage."
IEEE Transactions on Cloud Computing.
Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.,
2010. "Fuzzy keyword search over encrypted data in
cloud computing," INFOCOM, 2010 Proceedings
IEEE, Dept. of ECE, Illinois Inst. of Technol., Chicago,
IL, USA.
Yang, B., Pang, X., Du, Q., Xie, D., 2014. "Effective Error-
Tolerant Keyword Search for Secure Cloud
Computing," Journal of computer science and
technology, vol. 29, no.1, pp. 81-89.
Bringer, J., Chabanne, H., 2011. "Embedding edit distance
to enable private keyword search," Secure and Trust
Computing, Data Management and Applications,
Communications in Computer and Information
Science, vol. 186, no. 1, pp. 105-113.
Kuzu, M., Islm, M. S., Kantarcioglu, M., 2012. "Efficient
similarity search over encrypted data," ICDE's12
proceedings of the 2012 IEEE 28th International
conference on data engineering, pp. 1156-1167, IEEE
computer society Washington, DC, USA.
Awad, A., Awad, D., 2010. "Efficient image chaotic
encryption algorithm with no propagation error," ETRI
journal, vol. 32, no. 5, pp. 774-783.
Awad, A., Miri, A., 2012. "A new image encryption
algorithm based on a chaotic DNA substitution
method," in Communications (ICC), 2012 IEEE
International Conference on, pp. 1011-1015.
Ismail, M., Chalhoub, G., Bakhache, B., 2012. "Evaluation
of a fast symmetric cryptographic algorithm based on
the chaos theory for wireless sensor networks,"
in Trust, Security and Privacy in Computing and
Communications (TrustCom), 2012 IEEE 11th
International Conference on, pp. 913-919.
Rostom, R., Bakhache, B., Salami, H., Awad, A., 2014.
"Quantum cryptography and chaos for the transmission
of security keys in 802.11 networks," in the 17th IEEE
Mediterranean Electrotechnical Conference
(MELECON), pp. 350-356.
Lawrence, Ph., 1990. “Hanging on the Metaphone,”
Computer Language, Vol. 7, No. 12.
Lawrence, Ph., 2000. "The double metaphone search
algorithm." C/C++ users journal, pp. 38-43.
Metaphone3. http://www.amorphics.com/ metaphone3.html.
Parmar, V. P., Kumbharana, C. K., 2014. “Study Existing
Various Phonetic Algorithms and Designing and
Development of a working model for the New
Developed Algorithm and Comparison by
implementing it with Existing Algorithm”.
International Journal of Computer Applications.
Fakenamegenerator, 2013. http://www.fakenamegenerator.
com/ order.php.
Moby Words, 2016. "Moby Words" project.
http://icon.shef.ac.uk/Moby/mwords.html.
Awad, A., Matthews, A., Lee, B., 2014. "Secure cloud
storage and search scheme for mobile devices," in the
17th IEEE Mediterranean Electrotechnical Conference
(MELECON), pp. 144-150.
Hoepman, J. H., Hubbers, E., Jacobs, B., Oostdijk, M.,
Schreur, R W., 2006. “Crossing borders: Security and
privacy issues of the european e-passport,” In Advances
in Information and Computer Security, Springer Berlin
Heidelberg, pp. 152-167.
Pang, C., Gu, L., Hansen, D., Maeder, A., 2009. “Privacy-
preserving fuzzy matching using a public reference
table,” In Intelligent Patient Management, Springer
Berlin Heidelberg, pp. 71-89.
Bissessar, D., Adams, C., Stoianov, A., 2016. “Privacy,
Security and Convenience: Biometric Encryption for
Smartphone-Based Electronic Travel Documents,” In
Recent Advances in Computational Intelligence in
Defense and Security 2016, Springer International
Publishing, pp. 339-366.