Research Article
Query-Biased Preview over Outsourced and Encrypted Data
Protocol 1
SecQBP protocol.
| Storage: | | (1) the user U runs to generate the key | | (2) runs to get the encrypted document and the index , | | and sends to the server S | | Query: | | (1) U runs to get a token and sends it to S | | (2) runs to produce the score result , and | | sends it to U along with document identifier | | (3) runs to get the index number (best matched snippet) | | (4) runs a CPBR protocol as discussed, generates a query token | | from and sends to S | | (5) responses with from | | (6) runs to get the encrypted snippet | | (7) runs to get the plaintext |
|