Skip to main content
Log in

Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With an explosive growth in the deployment of networked applications over the Internet, searching the encrypted information that the user needs becomes increasingly important. However, the information search precision is quite low when using Vector space model for mass information retrieval, because long documents having poor similarity values are poorly represented in the vector space model and the order in which the terms appear in the document is lost in the vector space representation with intuitive weighting. To address the problems, this study proposed an N-level vector model (NVM)-based relevancy ranking scheme with an introduction of a new formula of the term weighting, taking into account the location of the feature term in the document to describe the content of the document properly, investigated into ways of ranking the encrypted documents using the proposed scheme, and conducted realistic simulation of information retrieval of mass encrypted data over multimedia networking. Results indicated that the timing of the index building, the most costing part of the relevancy ranking scheme, increased with the increase in both the document size and the multimedia content of the document being searched, which is in agreement with the expected. Performance evaluation demonstrated that our specially designed NVM-based encrypted information retrieval system is effective in ranking the encrypted documents transmitted over multimedia networks with large recall ratio and great retrieval precision.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Abbadi I (2014) Cloud management and security. Wiley, West Sussex

    Book  Google Scholar 

  2. Abdalla M, Bellare M, Catalano D et al (2005) Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. Proceedings of Advances in Cryptology-CRYPTO 2005. Springer. 2005:205–222

  3. Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. Proceedings of the 2004 ACM SIGMOD international conference on Management of data. ACM; 2004:563–574

  4. Ahmed S, Pan P, Tang S (2010) Clustering websites using a MapReduce programming model. J Commun Comput 7:18–26

    Google Scholar 

  5. Baeza-Yates R, Ribeiro-Neto B (2011) Modern information retrieval, the concepts and technology behind search. Addison-Wesley, Harlow, England

    Google Scholar 

  6. Baeza-Yates R, Ribeiro-Neto B et al (1999) Modern information retrieval, vol 82. Addison-Wesley, New York

    Google Scholar 

  7. Boneh D, Di Crecenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. Advances in Cryptology-Eurocrypt 2004. Springer. 2004:506–522

  8. Brakerski Z, Vaikuntanathan V (2011) Efficient fully homomorphic encryption from (standard) LWE. Proceedings of IEEE 52nd Annual Symposium on Foundations of Computer Science (FOCS2011), Palm Springs, CA, USA, 2011:97–106

  9. Buyya R, Teo C, Venugopal S (2008) Market-oriented cloud computing: vision, hype, and reality for delivering it services as computing utilities. Proceedings of 10th IEEE International Conference on High Performance Computing and Communications (HPCC’08) 2008:5–13

  10. Chang Y, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. Proceedings of Applied Cryptography and Network Security. Springer. 2005:391–421

  11. Gao J, Nie JY, Zhang J et al (2001) TREC-9 CLIR experiments at MSRCN, NIST Special Publication

  12. Goh EJ (2003) Secure indexes. An early version of this paper first appeared on the Cryptology ePrint. Archived on 7 October 2003

  13. Goldreich O, Ostrovsky R (1996) Software protection and simulation on oblivious RAMs. J ACM 43(3):431–473

    Article  MathSciNet  MATH  Google Scholar 

  14. Goldwasser S, Kalai Y, Peikert C et al (2010) Robustness of the learning with errors assumption. Proceedings of Innovations in Computer Science (ICS) 2010:230–240

  15. Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. Proceedings of Applied Cryptography and Network Security. Springer. 2004:31–45

  16. Grossman DA, Frieder O (1998) Information retrieval: algorithms and heuristics. Kluwer Academic Publishers, Boston

    Book  MATH  Google Scholar 

  17. Lyubashevsky V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. Advances in Cryptology-EUROCRYPT 2010:1–23

  18. Manning CD, Raghavan P, Schutze H, Corporation E (2008) Introduction to information retrieval, vol 1. Cambridge University Press, Cambridge

    Book  MATH  Google Scholar 

  19. Manning CD, Schutze H et al (1999) Foundations of statistical natural language processing. MIT Press, Cambridge

    MATH  Google Scholar 

  20. Park DJ, Kim K, Lee PJ (2005) Public key encryption with conjunctive field keyword search. Proceedings of the 2004 Workshop on Information Security Applications. 2005:73–86

  21. Salton G (1971) The SMART retrieval system-experiments in automatic document processing. Prentice Hall, USA, pp 115–411

    Google Scholar 

  22. Salton G, Mc Gill MJ (1983) Introduction to modern information retrieval. McGraw-Hill, New York

    MATH  Google Scholar 

  23. Salton G, Wong A, Yang CS (1975) A vector space model for automatic indexing. Commun ACM 18(11):613–620

    Article  MATH  Google Scholar 

  24. Song D, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. Proceedings of 2000 I.E. Symposium on Security and Privacy (S&P 2000) 2000:44–55

  25. Weis J, Alves-Foss J (2011) Securing database as a service: issues and compromises. IEEE Secur Priv 9(6):49–55

    Article  Google Scholar 

  26. Yerukhimovich A (2015) A General framework for one database private information retrieval. http://www.cs.umd.edu/Grad/scholarlypapers/papers/Arkady-pircomp.pdf. Accessed 2 Mar 2015

Download references

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grant 61272469 and Grant 61303237, and the Wuhan Scientific Research Program under Grant 2013010501010144. The authors would like to thank anonymous reviewers for their valuable suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shanyu Tang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Peng, J., Tang, S., Zhang, L. et al. Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking. Multimed Tools Appl 76, 2569–2589 (2017). https://doi.org/10.1007/s11042-015-3224-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-3224-y

Keywords

Navigation