Research Article
Query-Biased Preview over Outsourced and Encrypted Data
Input: | (1) : the document identifier | (2) : the keyword-frequency set collection | (3) : consists of the master key for row encryption | and the permutation key for | Output: A secure additive ranking index | Method: | (1) scan , extract distinct keywords | (2) create an data matrix , the value of each data is | the frequency of the keyword in the th snippet | (3) for each row , the encryption/decryption key is . | Thus the keys for all rows form a vector | (4) create an matrix , each cell has length | (5) compute using Matrix-AC | (6) for all , set where is the th row of the encrypted matrix | (7) if , set remaining entries of to random values |
|