N-Gram Based Secure Similar Document Detection

被引:0
|
作者
Jiang, Wei [1 ]
Samanthula, Bharath K. [1 ]
机构
[1] Missouri S&T, Dept Comp Sci, Rolla, MO 65401 USA
关键词
privacy; security; n-gram;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure similar document detection (SSDD) plays an important role in many applications, such as justifying the need-to-know basis and facilitating communication between government agencies. The SSDD problem considers situations where Alice with a query document wants to find similar information from Bob's document collection. During this process, the content of the query document is not disclosed to Bob, and Bob's document collection is not disclosed to Alice. Existing SSDD protocols are developed under the vector space model, which has the advantage of identifying global similar information. To effectively and securely detect similar documents with overlapping text fragments, this paper proposes a novel n-gram based SSDD protocol.
引用
收藏
页码:239 / 246
页数:8
相关论文
共 50 条
  • [21] N-Gram FST Indexing for Spoken Term Detection
    Liu, Chao
    Wang, Dong
    Tejedor, Javier
    [J]. 13TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION 2012 (INTERSPEECH 2012), VOLS 1-3, 2012, : 2091 - 2094
  • [22] Byte Level n-Gram Analysis for Malware Detection
    Jain, Sacbin
    Meena, Yogesb Kumar
    [J]. COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 51 - 59
  • [23] Bugram: Bug Detection with N-gram Language Models
    Wang, Song
    Chollak, Devin
    Movshovitz-Attias, Dana
    Tan, Lin
    [J]. 2016 31ST IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2016, : 708 - 719
  • [24] An evaluation of n-gram correspondence models for transliteration detection
    Department of Information Systems, SCIT, CoCIS, Makerere University, Kampala, Uganda
    [J]. Lect. Notes Electr. Eng, (615-622):
  • [25] EXPLOITING N-GRAM IMPORTANCE AND WIKIPEDIA BASED ADDITIONAL KNOWLEDGE FOR IMPROVEMENTS IN GAAC BASED DOCUMENT CLUSTERING
    Kumar, Niraj
    Vemula, Venkata Vinay Babu
    Srinathan, Kannan
    Varma, Vasudeva
    [J]. KDIR 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND INFORMATION RETRIEVAL, 2010, : 182 - 187
  • [26] Research of Affective Recognize Based on N-gram
    Xue Weimin
    Lin Benjing
    Yu Bing
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2008, : 702 - +
  • [27] A quantitative approach for intrusions detection and prevention based on statistical n-gram models
    Boulaiche, Ammar
    Bouzayani, Hatem
    Adi, Kamel
    [J]. ANT 2012 AND MOBIWIS 2012, 2012, 10 : 450 - 457
  • [28] A variant of n-gram based language classification
    Tomovic, Andrija
    Janicic, Predrag
    [J]. AI(ASTERISK)IA 2007: ARTIFICIAL INTELLIGENCE AND HUMAN-ORIENTED COMPUTING, 2007, 4733 : 410 - +
  • [29] BHMDC: A byte and hex n-gram based malware detection and classification method
    Tang, Yonghe
    Qi, Xuyan
    Jing, Jing
    Liu, Chunling
    Dong, Weiyu
    [J]. COMPUTERS & SECURITY, 2023, 128
  • [30] HTTP attack detection using n-gram analysis
    Oza, Aditya
    Ross, Kevin
    Low, Richard M.
    Stamp, Mark
    [J]. COMPUTERS & SECURITY, 2014, 45 : 242 - 254