Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm

This paper designs the MKSE and SEMSS methods. Among them, MKSE uses an improved TF-IDF weight calculation method to extract keywords and applies virtual keywords to construct inverted indexes, making it difficult for malicious attackers to infer the index content easily. SEMSS uses the Apriori algo...

Full description

Saved in:
Bibliographic Details
Main Authors: Demei Mao, Mingzhu Wang
Format: Article
Language:English
Published: Taylor & Francis Group 2025-12-01
Series:Applied Artificial Intelligence
Online Access:https://www.tandfonline.com/doi/10.1080/08839514.2024.2449303
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832586459476918272
author Demei Mao
Mingzhu Wang
author_facet Demei Mao
Mingzhu Wang
author_sort Demei Mao
collection DOAJ
description This paper designs the MKSE and SEMSS methods. Among them, MKSE uses an improved TF-IDF weight calculation method to extract keywords and applies virtual keywords to construct inverted indexes, making it difficult for malicious attackers to infer the index content easily. SEMSS uses the Apriori algorithm to mine the co-occurrence relationship between words and find the keyword set that meets the minimum support threshold to improve the recall rate of search results. Finally, the security of the scheme is verified from the aspects of semantic security, effici this paper designsency, data integrity, etc. The results showed that the data encryption time of MKSE and TRSE methods increased gradually with the increase in document collection storage. The index build time was increased as the document set grew. The accuracy of the improved TF-IDF method was 63.8%. The running time of Apriori decreased with the increase of minimum support. When the minimum support was 12.0%, the Apriori algorithm ran for 211 seconds. The MKSE method was more efficient than the TRSE method in searching documents by query keywords. When the document set size was 3000, the SEMSS method had a full search rate of 81.09%. This research realizes the semantic security of outsourced data, which can efficiently and comprehensively carry out cryptographic retrieval based on keyword sorting.
format Article
id doaj-art-3ce81f158c284d639b9e01ba2db30a12
institution Kabale University
issn 0883-9514
1087-6545
language English
publishDate 2025-12-01
publisher Taylor & Francis Group
record_format Article
series Applied Artificial Intelligence
spelling doaj-art-3ce81f158c284d639b9e01ba2db30a122025-01-25T13:39:09ZengTaylor & Francis GroupApplied Artificial Intelligence0883-95141087-65452025-12-0139110.1080/08839514.2024.2449303Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori AlgorithmDemei Mao0Mingzhu Wang1School of Electronic and Information Engineering, West Anhui University, Lu’an, ChinaExperiment and Training Teaching Management Department, West Anhui University, Lu’an, ChinaThis paper designs the MKSE and SEMSS methods. Among them, MKSE uses an improved TF-IDF weight calculation method to extract keywords and applies virtual keywords to construct inverted indexes, making it difficult for malicious attackers to infer the index content easily. SEMSS uses the Apriori algorithm to mine the co-occurrence relationship between words and find the keyword set that meets the minimum support threshold to improve the recall rate of search results. Finally, the security of the scheme is verified from the aspects of semantic security, effici this paper designsency, data integrity, etc. The results showed that the data encryption time of MKSE and TRSE methods increased gradually with the increase in document collection storage. The index build time was increased as the document set grew. The accuracy of the improved TF-IDF method was 63.8%. The running time of Apriori decreased with the increase of minimum support. When the minimum support was 12.0%, the Apriori algorithm ran for 211 seconds. The MKSE method was more efficient than the TRSE method in searching documents by query keywords. When the document set size was 3000, the SEMSS method had a full search rate of 81.09%. This research realizes the semantic security of outsourced data, which can efficiently and comprehensively carry out cryptographic retrieval based on keyword sorting.https://www.tandfonline.com/doi/10.1080/08839514.2024.2449303
spellingShingle Demei Mao
Mingzhu Wang
Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm
Applied Artificial Intelligence
title Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm
title_full Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm
title_fullStr Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm
title_full_unstemmed Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm
title_short Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm
title_sort encrypted search method for cloud computing data under attack based on tf idf and apriori algorithm
url https://www.tandfonline.com/doi/10.1080/08839514.2024.2449303
work_keys_str_mv AT demeimao encryptedsearchmethodforcloudcomputingdataunderattackbasedontfidfandapriorialgorithm
AT mingzhuwang encryptedsearchmethodforcloudcomputingdataunderattackbasedontfidfandapriorialgorithm