Research Article
Query-Biased Preview over Outsourced and Encrypted Data
Protocol 1
SecQBP protocol.
Storage: | (1) the user U runs to generate the key | (2) runs to get the encrypted document and the index , | and sends to the server S | Query: | (1) U runs to get a token and sends it to S | (2) runs to produce the score result , and | sends it to U along with document identifier | (3) runs to get the index number (best matched snippet) | (4) runs a CPBR protocol as discussed, generates a query token | from and sends to S | (5) responses with from | (6) runs to get the encrypted snippet | (7) runs to get the plaintext |
|