In the area of cloud computing, judging the fulfillment of service-level agreements on a technical level is gaining more and more importance. To support this we introduce privacy preserving set relations as inclusiveness and disjointness based ao Bloom filters. We propose to compose them in a slightly different way by applying a keyed hash function. Besides discussing the correctness of set relations, we analyze how this impacts the privacy of the sets content as well as providing privacy on the sets cardinality. Indeed, our solution proposes to bring another layer of privacy on the sizes. We are in particular interested how the overlapping bits of a Bloom filter impact the privacy level of our approach. We concretely apply our solution to ...
International audienceSeveral secure distributed data mining methods have been proposed in the liter...
The study of privacy preserving matchmaking is a heavily researched topic in the literature, made fu...
To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privac...
We propose in this work to solve privacy preserving set relations performed by a third party in an o...
Abstract. Bloom filters provide a space- and time-efficient mean to check the inclusion of an elemen...
Part 3: Privacy-Preserving Data Applications IInternational audienceBloom filters provide a space- a...
In the work at hand, we state that privacy and malleability of data are two aspects highly desired b...
We study the problem of running a set membership test in private manner. We require that a client wa...
This thesis focuses on the private membership test (PMT) problem and presents three single server pr...
With the development of cloud computing, the advantages of low cost and high computation ability mee...
Privacy preserving association rule mining has been an active research area since recently. To this ...
Abstract. In this paper, we propose a privacy-preserving variant of Bloom-filters. The Bloom-filter ...
We study the problem of running a set membership test in private manner. We require that a client...
Security and privacy are increasing concerns for both IT service customers and providers. According ...
This thesis focuses on the private membership test (PMT) problem and presents three single server pr...
International audienceSeveral secure distributed data mining methods have been proposed in the liter...
The study of privacy preserving matchmaking is a heavily researched topic in the literature, made fu...
To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privac...
We propose in this work to solve privacy preserving set relations performed by a third party in an o...
Abstract. Bloom filters provide a space- and time-efficient mean to check the inclusion of an elemen...
Part 3: Privacy-Preserving Data Applications IInternational audienceBloom filters provide a space- a...
In the work at hand, we state that privacy and malleability of data are two aspects highly desired b...
We study the problem of running a set membership test in private manner. We require that a client wa...
This thesis focuses on the private membership test (PMT) problem and presents three single server pr...
With the development of cloud computing, the advantages of low cost and high computation ability mee...
Privacy preserving association rule mining has been an active research area since recently. To this ...
Abstract. In this paper, we propose a privacy-preserving variant of Bloom-filters. The Bloom-filter ...
We study the problem of running a set membership test in private manner. We require that a client...
Security and privacy are increasing concerns for both IT service customers and providers. According ...
This thesis focuses on the private membership test (PMT) problem and presents three single server pr...
International audienceSeveral secure distributed data mining methods have been proposed in the liter...
The study of privacy preserving matchmaking is a heavily researched topic in the literature, made fu...
To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privac...