Privacy Preserving Mapping Schemes Supporting Comparison

Qiang Tang

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    18 Citations (Scopus)
    111 Downloads (Pure)

    Abstract

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, > relationships among the corresponding data items. We propose three privacy notions, namely ideal privacy, level-1 privacy, and level-2 privacy, and three constructions satisfying these privacy notions respectively.
    Original languageUndefined
    Title of host publicationACM Cloud Computing Security Workshop (CCSW)
    Place of PublicationNew York
    PublisherAssociation for Computing Machinery
    Pages53-58
    Number of pages6
    ISBN (Print)978-1-4503-0089-6
    DOIs
    Publication statusPublished - Oct 2010
    EventACM Cloud Computing Security Workshop, CCSW 2010 - Chicago, Illinois
    Duration: 9 Oct 20109 Oct 2010

    Publication series

    Name
    PublisherACM

    Workshop

    WorkshopACM Cloud Computing Security Workshop, CCSW 2010
    Period9/10/109/10/10
    Other9 oct 2010

    Keywords

    • METIS-277476
    • Cloud computing
    • IR-75364
    • EWI-19183
    • Privacy
    • SCS-Cybersecurity
    • secure 2-party computation

    Cite this