首页> 外文期刊>Computer standards & interfaces >A two-party privacy preserving set intersection protocol against malicious users in cloud computing
【24h】

A two-party privacy preserving set intersection protocol against malicious users in cloud computing

机译:云计算中针对恶意用户的两方隐私保护集交叉协议

获取原文
获取原文并翻译 | 示例

摘要

Set intersection is a fundamental operation in data mining and cloud computing. In this paper, a protocol is proposed to determine the intersection between two datasets while preserving the privacy of each set. Malicious participants are considered and the misbehavior of participants is prevented. Our method is based on a combination of commutative encryption and hash-based commitments. Performance evaluation demonstrates the effectiveness of the protocol. Security discussion is given showing that the protocol provides data privacy, secure set intersection and tolerance to participants cheating.
机译:集合相交是数据挖掘和云计算中的基本操作。在本文中,提出了一种协议来确定两个数据集之间的交集,同时保留每个集合的隐私。考虑恶意参与者,并防止参与者的不当行为。我们的方法基于可交换加密和基于哈希的承诺的组合。性能评估证明了该协议的有效性。给出的安全性讨论表明该协议为参与者作弊提供了数据保密性,安全集交集和容忍度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号