Research Article

Query-Biased Preview over Outsourced and Encrypted Data

Algorithm 3

Constructing SecARI: .
Input:
(1) : the document identifier
(2) : the keyword-frequency set collection
(3) : consists of the master key for row encryption
  and the permutation key for
Output: A secure additive ranking index
Method:
(1) scan , extract distinct keywords
(2) create an data matrix , the value of each data is
  the frequency of the keyword in the th snippet
(3) for each row , the encryption/decryption key is .
  Thus the keys for all rows form a vector
(4) create an matrix , each cell has length
(5) compute using Matrix-AC
(6) for all , set where is the th row of the encrypted matrix
(7) if , set remaining entries of to random values