Privacy Preserving Mapping Schemes Supporting Comparison

Qiang Tang

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    16 Citations (Scopus)
    72 Downloads (Pure)


    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, > relationships among the corresponding data items. We propose three privacy notions, namely ideal privacy, level-1 privacy, and level-2 privacy, and three constructions satisfying these privacy notions respectively.
    Original languageUndefined
    Title of host publicationACM Cloud Computing Security Workshop (CCSW)
    Place of PublicationNew York
    PublisherAssociation for Computing Machinery
    Number of pages6
    ISBN (Print)978-1-4503-0089-6
    Publication statusPublished - Oct 2010
    EventACM Cloud Computing Security Workshop, CCSW 2010 - Chicago, Illinois
    Duration: 9 Oct 20109 Oct 2010

    Publication series



    WorkshopACM Cloud Computing Security Workshop, CCSW 2010
    Other9 oct 2010


    • METIS-277476
    • Cloud computing
    • IR-75364
    • EWI-19183
    • Privacy
    • SCS-Cybersecurity
    • secure 2-party computation

    Cite this