New Techniques for Private Stream Searching
Citations
367 citations
Cites background from "New Techniques for Private Stream S..."
...A possible solution could be the use of obfuscation and privacy-preserving techniques to limit the information the VM exposes to the cloud (Bethencourt et al., 2009)....
[...]
313 citations
241 citations
211 citations
Cites methods from "New Techniques for Private Stream S..."
...Another approach to this situation was presented in the work of Bethencourt, Song, and Waters [3], which solves a system of linear equations to recover buffer contents....
[...]
...So, with an added factor of a correctness parameter to the buffer lengths, one can implement and obliviously update an encrypted Bloom filter with storage, using the probabilistic methods of [25], or [3]....
[...]
179 citations
References
7,390 citations
"New Techniques for Private Stream S..." refers background in this paper
...A Bloom filter [Bloom 1970] is a space-efficient data structure for storing a set of keys that has several unique features....
[...]
...ABloom .lter[Bloom1970] isaspace-ef.cientdata structure for storing a set of keys that has several unique features....
[...]
7,008 citations
3,960 citations
3,300 citations
3,024 citations