Font Size: a A A

Algorithm Research Of The Similarity Search Over The Encrypted Cloud Data

Posted on:2018-12-29Degree:MasterType:Thesis
Country:ChinaCandidate:X WeiFull Text:PDF
GTID:2348330518996261Subject:Mathematics
Abstract/Summary:PDF Full Text Request
As the Instant Messaging, Video Transmission and Electronic Payment has been widely applied to our lives, protection of users' privacy and accuracy of the query has aroused widely concern, which all need the Cloud Computing Technology and Search Engine. Cloud Computing is a cost-per-quantity pattern which provides us a convenient, low-cost,on-demand access. Search Engine is based on certain strategies to return related information, according to user's search query.The thesis mainly studies the similarity search over the encrypted cloud data. The thesis deeply researches the problems of the fuzzy multi-keyword search, Synonym Query search and Privacy-Preserving and proposes the detailed solutions. The detailed works are as follows:1. Based on the encrypted cloud data, the problem is how to improve efficiency of the fuzzy multi-keyword searching. This thesis uses bloom filter, locally sensitive hashing function algorithm and binary tree data structure, proposed an algorithm to improve time efficiency of the fuzzy multi-keyword searching. The experiment can prove the correctness and the effectiveness of the algorithm.2. Based on synonym retrieval and user preference, this thesis use hash function and super increasing sequence to increase the diversity and richness of fuzzy multi-keyword searching results. The experiment can prove that the scheme return more better searching results to the users.3. In view of the issue that the cloud service providers can not be fully trusted, this thesis proposed an algorithm can protect the privacy.The algorithm can support the user to verify the correctness and integrity of the results which returned from cloud service and support data owners to set the access permissions...
Keywords/Search Tags:Multi-Keyword, Fuzzy Search, Synonym Search, Privacy-Protecting, Cloud Computing
PDF Full Text Request
Related items