Font Size: a A A

Based On Bloom Filter Ciphertext Full-text Retrieval Technology Research

Posted on:2013-07-27Degree:MasterType:Thesis
Country:ChinaCandidate:X L ZhuFull Text:PDF
GTID:2248330374499707Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Data privacy is a topic of great concern in the process of building business systems, especially in recent years with cloud computing, cloud storage and other applications scale growing, just like the Database As Service (DAS), Software As A Service (SAAS). These applications are gradually being accepted and widely used in Outsourced mode where data security is very important.Encryption of data is an effective data protection. But data retrieval and use has become extremely difficult after data encryption because of destroyed the order, regularity, grammar and meaning of the inherent characteristics of the original data. On the other hand, in the research Institute and the high-tech fields, the reuse of information is an important means to reflect the value. Therefore, it is very important how to efficiently retrieve the ciphertext data problems under untrusted service environment.The paper studies retrieval model of full-text search technology, retrieval model of the ciphertext, and security index which includes four processes:the key generation, the index structure, keyword trap door, retrieval algorithms. Then we focus on improved the ciphertext retrieval program based on Bloom Filter, especially one of the key processes:index construction, keyword trap door and retrieval algorithms. The model compares with the previous ciphertext retrieval model, with a higher security and not loses retrieval efficiency.On the basis of theoretical improvement, the paper implements the system of retrieval ciphertext for high security applications background, using Java software development techniques. The system model is based on Bloom Filter. Then the paper gives detailed description of four key processes, key generation, index construction, keywords trapdoor, retrieval algorithms. And through a series of experiments, the results show that the cipher text retrieval system with a high degree of effectiveness can be applied to actual business system.Finally, in summarizing the results of this study, the paper discusses future research directions, including how to improve the retrieval performance, precision, recall.
Keywords/Search Tags:Retrieval Ciphertext, Index Security, Bloom Filter
PDF Full Text Request
Related items