摘要: Privacy-preserving document exchange among collaboration groups in an enterprise as well across enterprises requires techniques for sharing and search of access-controlled information through largely untrusted servers. In these settings systems need to provide confidentiality guarantees shared while offering IR properties comparable the ordinary engines. Top-k is a standard technique which enables fast query execution on very large indexes makes highly scalable. However, indexing top-k retrieval challenging task due sensitivity term statistics used ranking.In this paper we present Zerber+R -- ranking model allows privacy-preserving from outsourced inverted index. We propose relevance score transformation function scores different terms indistinguishable, such that even if stored server they do not reveal about indexed data. Experiments two real-world data sets show economical usage bandwidth offers with

参考文章(20)
Amit Singhal, Modern Information Retrieval : A Brief Overview IEEE Data(base) Engineering Bulletin. ,vol. 24, pp. 35- 43 ,(2001)
Dan Boneh, Hovav Shacham, Nagendra Modadugu, Eu-Jin Goh, SiRiUS: Securing Remote Untrusted Storage. network and distributed system security symposium. ,(2003)
Gerome Miklau, Dan Suciu, Controlling access to published data using cryptography very large data bases. pp. 898- 909 ,(2003) , 10.1016/B978-012722442-8/50084-7
Kevin Fu, Ram Swaminathan, Erik Riedel, Qian Wang, Mahesh Kallahalla, Plutus: Scalable Secure File Sharing on Untrusted Storage file and storage technologies. pp. 3- 3 ,(2003)
Víctor Pàmies, Open Directory Project Softcatalà (http://www.softcatala.org/). ,(2003)
Hakan Hacigümüş, Bala Iyer, Chen Li, Sharad Mehrotra, Executing SQL over encrypted data in the database-service-provider model Proceedings of the 2002 ACM SIGMOD international conference on Management of data - SIGMOD '02. pp. 216- 227 ,(2002) , 10.1145/564691.564717
Stefan Büttcher, Charles L. A. Clarke, A security model for full-text file system search in multi-user environments file and storage technologies. pp. 13- 13 ,(2005) , 10.5555/1251028.1251041
E. Bertino, S. Castano, E. Ferrari, Securing XML documents with Author-X IEEE Internet Computing. ,vol. 5, pp. 21- 31 ,(2001) , 10.1109/4236.935172
D. Alspach, H. Sorenson, Nonlinear Bayesian estimation using Gaussian sum approximations IEEE Transactions on Automatic Control. ,vol. 17, pp. 439- 448 ,(1972) , 10.1109/TAC.1972.1100034
Ashwin Swaminathan, Yinian Mao, Guan-Ming Su, Hongmei Gou, Avinash L. Varna, Shan He, Min Wu, Douglas W. Oard, Confidentiality-preserving rank-ordered search Proceedings of the 2007 ACM workshop on Storage security and survivability - StorageSS '07. pp. 7- 12 ,(2007) , 10.1145/1314313.1314316