Data privacy is a topic of great concern in the process of building business systems, especially in recent years with cloud computing, cloud storage and other applications scale growing, just like the Database As Service (DAS), Software As A Service (SAAS). These applications are gradually being accepted and widely used in Outsourced mode where data security is very important.Encryption of data is an effective data protection. But data retrieval and use has become extremely difficult after data encryption because of destroyed the order, regularity, grammar and meaning of the inherent characteristics of the original data. On the other hand, in the research Institute and the high-tech fields, the reuse of information is an important means to reflect the value. Therefore, it is very important how to efficiently retrieve the ciphertext data problems under untrusted service environment.The paper studies retrieval model of full-text search technology, retrieval model of the ciphertext, and security index which includes four processes:the key generation, the index structure, keyword trap door, retrieval algorithms. Then we focus on improved the ciphertext retrieval program based on Bloom Filter, especially one of the key processes:index construction, keyword trap door and retrieval algorithms. The model compares with the previous ciphertext retrieval model, with a higher security and not loses retrieval efficiency.On the basis of theoretical improvement, the paper implements the system of retrieval ciphertext for high security applications background, using Java software development techniques. The system model is based on Bloom Filter. Then the paper gives detailed description of four key processes, key generation, index construction, keywords trapdoor, retrieval algorithms. And through a series of experiments, the results show that the cipher text retrieval system with a high degree of effectiveness can be applied to actual business system.Finally, in summarizing the results of this study, the paper discusses future research directions, including how to improve the retrieval performance, precision, recall. |