Research Article

Query-Biased Preview over Outsourced and Encrypted Data

Protocol 1

SecQBP protocol.
Storage:
(1) the user U runs to generate the key
(2) runs to get the encrypted document and the index ,
  and sends to the server S
Query:
(1) U runs to get a token and sends it to S
(2) runs to produce the score result , and
  sends it to U along with document identifier
(3) runs to get the index number (best matched snippet)
(4) runs a CPBR protocol as discussed, generates a query token
 from and sends to S
(5) responses with from
(6) runs to get the encrypted snippet
(7) runs to get the plaintext