Research Article

Query-Biased Preview over Outsourced and Encrypted Data

Algorithm 2

Encrypting a document: .
Input: a document , the encryption key
Output: the encrypted document , a keyword-frequency
set collection
Method:
(1) padding according to snippet length as discussed
(2) treat as pieces
(3) for   do
(4) create a keyword-frequency set for
(5) scan for distinct valid keywords. For each keyword, count the
  keyword frequency, and add the vector (keyword, frequency) to
   as set element
(6) encrypting the snippet as
(7) end for