Research Article
Query-Biased Preview over Outsourced and Encrypted Data
| Input: a document , the encryption key | | Output: the encrypted document , a keyword-frequency | | set collection | | Method: | | (1) padding according to snippet length as discussed | | (2) treat as pieces | | (3) for do | | (4) create a keyword-frequency set for | | (5) scan for distinct valid keywords. For each keyword, count the | | keyword frequency, and add the vector (keyword, frequency) to | | as set element | | (6) encrypting the snippet as
| | (7) end for |
|