TY - GEN
T1 - Privacy Preserving Mapping Schemes Supporting Comparison
AU - Tang, Qiang
N1 - 10.1145/1866835.1866846
PY - 2010/10
Y1 - 2010/10
N2 - To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, > relationships among the corresponding data items. We propose three privacy notions, namely ideal privacy, level-1 privacy, and level-2 privacy, and three constructions satisfying these privacy notions respectively.
AB - To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, > relationships among the corresponding data items. We propose three privacy notions, namely ideal privacy, level-1 privacy, and level-2 privacy, and three constructions satisfying these privacy notions respectively.
KW - METIS-277476
KW - Cloud computing
KW - IR-75364
KW - EWI-19183
KW - Privacy
KW - SCS-Cybersecurity
KW - secure 2-party computation
U2 - 10.1145/1866835.1866846
DO - 10.1145/1866835.1866846
M3 - Conference contribution
SN - 978-1-4503-0089-6
SP - 53
EP - 58
BT - ACM Cloud Computing Security Workshop (CCSW)
PB - Association for Computing Machinery
CY - New York
T2 - ACM Cloud Computing Security Workshop, CCSW 2010
Y2 - 9 October 2010 through 9 October 2010
ER -