Abstract
With an explosive growth in the deployment of networked applications over the Internet, searching the encrypted information that the user needs becomes increasingly important. However, the information search precision is quite low when using Vector space model for mass information retrieval, because long documents having poor similarity values are poorly represented in the vector space model and the order in which the terms appear in the document is lost in the vector space representation with intuitive weighting. To address the problems, this study proposed an N-level vector model (NVM)-based relevancy ranking scheme with an introduction of a new formula of the term weighting, taking into account the location of the feature term in the document to describe the content of the document properly, investigated into ways of ranking the encrypted documents using the proposed scheme, and conducted realistic simulation of information retrieval of mass encrypted data over multimedia networking. Results indicated that the timing of the index building, the most costing part of the relevancy ranking scheme, increased with the increase in both the document size and the multimedia content of the document being searched, which is in agreement with the expected. Performance evaluation demonstrated that our specially designed NVM-based encrypted information retrieval system is effective in ranking the encrypted documents transmitted over multimedia networks with large recall ratio and great retrieval precision.
Similar content being viewed by others
References
Abbadi I (2014) Cloud management and security. Wiley, West Sussex
Abdalla M, Bellare M, Catalano D et al (2005) Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. Proceedings of Advances in Cryptology-CRYPTO 2005. Springer. 2005:205–222
Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. Proceedings of the 2004 ACM SIGMOD international conference on Management of data. ACM; 2004:563–574
Ahmed S, Pan P, Tang S (2010) Clustering websites using a MapReduce programming model. J Commun Comput 7:18–26
Baeza-Yates R, Ribeiro-Neto B (2011) Modern information retrieval, the concepts and technology behind search. Addison-Wesley, Harlow, England
Baeza-Yates R, Ribeiro-Neto B et al (1999) Modern information retrieval, vol 82. Addison-Wesley, New York
Boneh D, Di Crecenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. Advances in Cryptology-Eurocrypt 2004. Springer. 2004:506–522
Brakerski Z, Vaikuntanathan V (2011) Efficient fully homomorphic encryption from (standard) LWE. Proceedings of IEEE 52nd Annual Symposium on Foundations of Computer Science (FOCS2011), Palm Springs, CA, USA, 2011:97–106
Buyya R, Teo C, Venugopal S (2008) Market-oriented cloud computing: vision, hype, and reality for delivering it services as computing utilities. Proceedings of 10th IEEE International Conference on High Performance Computing and Communications (HPCC’08) 2008:5–13
Chang Y, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. Proceedings of Applied Cryptography and Network Security. Springer. 2005:391–421
Gao J, Nie JY, Zhang J et al (2001) TREC-9 CLIR experiments at MSRCN, NIST Special Publication
Goh EJ (2003) Secure indexes. An early version of this paper first appeared on the Cryptology ePrint. Archived on 7 October 2003
Goldreich O, Ostrovsky R (1996) Software protection and simulation on oblivious RAMs. J ACM 43(3):431–473
Goldwasser S, Kalai Y, Peikert C et al (2010) Robustness of the learning with errors assumption. Proceedings of Innovations in Computer Science (ICS) 2010:230–240
Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. Proceedings of Applied Cryptography and Network Security. Springer. 2004:31–45
Grossman DA, Frieder O (1998) Information retrieval: algorithms and heuristics. Kluwer Academic Publishers, Boston
Lyubashevsky V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. Advances in Cryptology-EUROCRYPT 2010:1–23
Manning CD, Raghavan P, Schutze H, Corporation E (2008) Introduction to information retrieval, vol 1. Cambridge University Press, Cambridge
Manning CD, Schutze H et al (1999) Foundations of statistical natural language processing. MIT Press, Cambridge
Park DJ, Kim K, Lee PJ (2005) Public key encryption with conjunctive field keyword search. Proceedings of the 2004 Workshop on Information Security Applications. 2005:73–86
Salton G (1971) The SMART retrieval system-experiments in automatic document processing. Prentice Hall, USA, pp 115–411
Salton G, Mc Gill MJ (1983) Introduction to modern information retrieval. McGraw-Hill, New York
Salton G, Wong A, Yang CS (1975) A vector space model for automatic indexing. Commun ACM 18(11):613–620
Song D, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. Proceedings of 2000 I.E. Symposium on Security and Privacy (S&P 2000) 2000:44–55
Weis J, Alves-Foss J (2011) Securing database as a service: issues and compromises. IEEE Secur Priv 9(6):49–55
Yerukhimovich A (2015) A General framework for one database private information retrieval. http://www.cs.umd.edu/Grad/scholarlypapers/papers/Arkady-pircomp.pdf. Accessed 2 Mar 2015
Acknowledgments
This work was supported in part by the National Natural Science Foundation of China under Grant 61272469 and Grant 61303237, and the Wuhan Scientific Research Program under Grant 2013010501010144. The authors would like to thank anonymous reviewers for their valuable suggestions.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Peng, J., Tang, S., Zhang, L. et al. Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking. Multimed Tools Appl 76, 2569–2589 (2017). https://doi.org/10.1007/s11042-015-3224-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-3224-y