Professional Documents
Culture Documents
Method on Cloud
3. Privacy-preserving similarity based text retrieval In the paper [7], to enhance the security function-hiding inner
product encryption is proposed which prevents the leakage of
C. Wang, N. Cao, K. Ren, and W. J. Lou, search pattern. A tree-based index structure is adopted to
facilitate the searching process and updating operations.An
In this paper [3], the system tries to solve the problem of
extensive security analysis is provided and experiments over
searching on the encrypted data stored. Even if perform
the real world data show that the proposed scheme is efficient
searching on encrypted documents the chances of getting
query related documents are very less. This paper partially
4. PROPOSED SYSTEM
overcomes it. It also assures the file retrieval accuracy. Hence
without compromising the privacy the service is properly
4.1 System Model:
utilized. MRSE-HCI architecture:
4. Privacy-preserving similarity based text retrieval In Multi keyword Ranked Search Encryption –
Hierarchical Clustering Index, each document can be
H. Pang, J. Shen, and R. Krishnan
represented using a vector with index. Keywords are
In this paper [4], the proposed work tries to hide search results represented as dimensions of the vector and their values
from unauthorized observers. Also server side ranking represent whether the keyword is present in the document or
provides query related results which reduces overhead of the not. Likewise, the search keywords are also represented in the
end users. same manner. Search results are generated based on the
relevance scores which are figured out by finding the product
5. Privacy-preserving multi-keyword ranked search over the transformed query and documents. According to the
encrypted cloud data relevance score the related top k documents are returned to the
end user. MRSE-HCI architecture is shown in Fig. 1.
N. Cao, C.Wang, M. Li, K. Ren, and W. J. Lou, “
The data user submits a query to the cloud server for getting The data user sends the query to the data owner who
desired documents and the cloud server returns the target will later analyse the query and builds the query
documents to the data user. This architecture mainly consists vector QV by analysing the keywords of query with
of following algorithms- the help of dictionary DW, QV then is extended to a
(n+u+1) bit query vector.
1) Pre-processing:
In this stage, the plain text documents D will be 6) Search:
converted into document vector Dv. This process Upon receiving the Tw from data user, the cloud
includes stemming, stopword removal, generate server computes the relevance score between Tw
dictionary keywords following TF-IDF generation. and index Ic and then chooses the matched cluster
The outcome of this stage will be used as an input in
which has the highest relevance score.
index tree generation stage.
2) Key-generation:
7) Decryption:
Two keys are generated-
The data user utilizes the secret key k to decrypt the
1. Secret key (sk) that is used to encrypt the index
returned cipher text.
tree. Two invertible matrices M1, M2 whose
elements are random integers with cardinality
4.2 Architecture:
(n+u+1) as secret key sk. Data owner: The data owner performs following tasks-
2. key (K) used to encrypt the documents.
3) Index tree generation: 1. selects the collection documents di= {d1, d2… dm} to be
The above mentions key “sk” is used to generate the stored on cloud.
encrypted index (I).Then the data owner calculates
the DC and CCV (collection of cluster centers 2. Builds the secure searchable index tree (I) of these
vectors) by using a quality hierarchical clustering documents.
(QHC) method. After that, the data
3. Generate the encrypted document collection (C) for these
documents.
owner applies the dimension-expanding and vector-
splitting procedure to every document vector. 4. At last uploads the index tree (i) and collection of encrypted
4) Encryption: documents(C) on cloud server.
The data owner adopts a secure symmetric
encryption algorithm (e.g. AES) to encrypt the plain 5. Distributes the secret key (sk) to authorized user which is
document set D and outsources it to the cloud required to generate the trap door.
server.
6. Also shares the decryption key (K) with the user.
5) Trapdoor:
Data users
8. REFERENCES
[1] Chen, Chi, et al. “An efficient privacy-preserving ranked
keyword search method.” IEEE Transactions on Parallel and
Distributed Systems 27.4 (2016): 951-963.