Skip to main content

Research on the Inverted Index Based on Compression and Perception

  • Conference paper
  • First Online:
Trustworthy Computing and Services (ISCTCS 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 426))

Included in the following conference series:

  • 1178 Accesses

Abstract

Ciphertext retrieval can meet security requirements, but the complex structure of index and retrieval has hindered it from being widely used. This article, taking both safety and efficiency into account, designs an inverted index structure on the basis of compressed sensing to meet the security requirements and full-text retrieval efficiency. Index structure, based on compressed sensing, will be able to effectively resist the statistical analysis attack, static analysis attacks and tracking attacks, so that the index files exist in the form of ciphertext, without decryption in case retrieval. While using chunked encoding compression and indexing sensing technology, the retrieval system could adapt to adjust the storing method and block form of index structure, which can greatly reduce its server requirements and improve the retrieval efficiency. Compressed sensing inverted index structure, based on compressed sensing, will secure a balance in both security and retrieval efficiency, and thus meet the needs of retrieval.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bailey, P., Creswell, N., Hawking, D.: Engineering a multi-purpose test collection for web retrieval experiments. Inf. Process. Manag. 39(6), 853–871 (2003)

    Article  Google Scholar 

  2. Goh, E.J., Shacham, H., Modadugu, N.: SiRiUS: securing remote untrusted storage. In: NDSS, vol. 3, pp. 131–145 (2003)

    Google Scholar 

  3. Anh, V.N., Moffat, A.: Impact transformation: effective and efficient web retrieval. In: Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 3–10 (2002)

    Google Scholar 

  4. Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM (JACM) 43(3), 431–473 (1996)

    Article  MATH  MathSciNet  Google Scholar 

  5. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, pp. 44–55 (2000)

    Google Scholar 

  7. Goh, E.J.: Secure indexs. Technical report 2003/216, Cryptology ePrint Archive. http://eprint.iacr.org

  8. Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Huang, R., Gui, X., Yu, S., Zhuang, W.: Research on privacy-preserving cloud storage framework supporting ciphertext retrieval. In: 2011 International Conference Network Computing and Information Security (NCIS), vol. 1, pp. 93–97(2011)

    Google Scholar 

Download references

Acknowledgement

This research was supported by the Fundamental Research Funds for the Central Universities (FRF-TP-13-015A) and the Conjunction Project of Guangdong Province and Ministry of Education on integration of production, education and research (2012B091000052).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ningning Song .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Song, N., Zou, L., Liu, Y. (2014). Research on the Inverted Index Based on Compression and Perception. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2013. Communications in Computer and Information Science, vol 426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43908-1_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43908-1_39

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43907-4

  • Online ISBN: 978-3-662-43908-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics