Research Article
Query-Biased Preview over Outsourced and Encrypted Data
| Input: | | (1) : the document identifier | | (2) : the keyword-frequency set collection | | (3) : consists of the master key for row encryption | | and the permutation key for | | Output: A secure additive ranking index | | Method: | | (1) scan , extract distinct keywords | | (2) create an data matrix , the value of each data is | | the frequency of the keyword in the th snippet | | (3) for each row , the encryption/decryption key is . | | Thus the keys for all rows form a vector | | (4) create an matrix , each cell has length | | (5) compute using Matrix-AC | | (6) for all , set where is the th row of the encrypted matrix | | (7) if , set remaining entries of to random values |
|