2018
DOI: 10.1155/2018/5841967
|View full text |Cite
|
Sign up to set email alerts
|

Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing

Abstract: With the development of cloud computing, the advantages of low cost and high computation ability meet the demands of complicated computation of multimedia processing. Outsourcing computation of cloud could enable users with limited computing resources to store and process distributed multimedia application data without installing multimedia application software in local computer terminals, but the main problem is how to protect the security of user data in untrusted public cloud services. In recent years, the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2025
2025

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…In Table 2 , s in classic algorithms represent the data scale. Table 2 shows: (1) Comparing with the classic PSI-CA protocols, The computational complexity and communication complexity will increase linearly with the increasing data scale, such as Huang’s 11 scheme, Dong’s 25 , Kerschbaum’s 39 , and Zhu’s 41 . So if the data scale are too large, the complexity will increase linearly and the efficiency will be greatly reduced.…”
Section: Performancementioning
confidence: 99%
“…In Table 2 , s in classic algorithms represent the data scale. Table 2 shows: (1) Comparing with the classic PSI-CA protocols, The computational complexity and communication complexity will increase linearly with the increasing data scale, such as Huang’s 11 scheme, Dong’s 25 , Kerschbaum’s 39 , and Zhu’s 41 . So if the data scale are too large, the complexity will increase linearly and the efficiency will be greatly reduced.…”
Section: Performancementioning
confidence: 99%
“…Zhu et al (2018) introduced a novel privacy-preserving outsourcing computation method that integrated Goldwasser–Micali homomorphic encryption with the Bloom filter to address the scalability issue to provide a new privacy-preserving protocol. Despite improvement was observed, it did not address the incremental data update issue.…”
Section: Literature Review Of Related Workmentioning
confidence: 99%
“…For example, refs. [2][3][4]9] considered outsourcing set intersection operations to the cloud while preserving the privacy of the data sets. In addition, symmetric/asymmetric encryption with equality test, e.g., [10,11], is a specific solution for one-element data sets.…”
Section: Schemesmentioning
confidence: 99%