To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, > relationships among the corresponding data items. We propose three privacy notions, namely ideal privacy, level-1 privacy, and level-2 privacy, and three constructions satisfying these privacy notions respectively.
|Workshop||ACM Cloud Computing Security Workshop, CCSW 2010|
|Period||9/10/10 → 9/10/10|
|Other||9 oct 2010|
- Cloud computing
- secure 2-party computation