Abstract
Ciphertext retrieval can meet security requirements, but the complex structure of index and retrieval has hindered it from being widely used. This article, taking both safety and efficiency into account, designs an inverted index structure on the basis of compressed sensing to meet the security requirements and full-text retrieval efficiency. Index structure, based on compressed sensing, will be able to effectively resist the statistical analysis attack, static analysis attacks and tracking attacks, so that the index files exist in the form of ciphertext, without decryption in case retrieval. While using chunked encoding compression and indexing sensing technology, the retrieval system could adapt to adjust the storing method and block form of index structure, which can greatly reduce its server requirements and improve the retrieval efficiency. Compressed sensing inverted index structure, based on compressed sensing, will secure a balance in both security and retrieval efficiency, and thus meet the needs of retrieval.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bailey, P., Creswell, N., Hawking, D.: Engineering a multi-purpose test collection for web retrieval experiments. Inf. Process. Manag. 39(6), 853–871 (2003)
Goh, E.J., Shacham, H., Modadugu, N.: SiRiUS: securing remote untrusted storage. In: NDSS, vol. 3, pp. 131–145 (2003)
Anh, V.N., Moffat, A.: Impact transformation: effective and efficient web retrieval. In: Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 3–10 (2002)
Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM (JACM) 43(3), 431–473 (1996)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, pp. 44–55 (2000)
Goh, E.J.: Secure indexs. Technical report 2003/216, Cryptology ePrint Archive. http://eprint.iacr.org
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005)
Huang, R., Gui, X., Yu, S., Zhuang, W.: Research on privacy-preserving cloud storage framework supporting ciphertext retrieval. In: 2011 International Conference Network Computing and Information Security (NCIS), vol. 1, pp. 93–97(2011)
Acknowledgement
This research was supported by the Fundamental Research Funds for the Central Universities (FRF-TP-13-015A) and the Conjunction Project of Guangdong Province and Ministry of Education on integration of production, education and research (2012B091000052).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Song, N., Zou, L., Liu, Y. (2014). Research on the Inverted Index Based on Compression and Perception. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2013. Communications in Computer and Information Science, vol 426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43908-1_39
Download citation
DOI: https://doi.org/10.1007/978-3-662-43908-1_39
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43907-4
Online ISBN: 978-3-662-43908-1
eBook Packages: Computer ScienceComputer Science (R0)