7 CONCLUSION
We showed how to compute two specific set relations
namely private outsourced inclusiveness test and pri-
vate outsourced disjointness test using the space-
efficient data representation Bloom filter. In addition
to fulfill privacy on the content, we provided a certain
level of privacy on the cardinality of the Bloom filter’s
data structure. Our implementation’s results validate
an acceptable level of privacy, for instance when ap-
plied to a cloud security audit on access control. Such
an approach based on Bloom filters could be easily
adapted also to other set relations or operations like
equality or relative complement.
REFERENCES
Bloom, B. H. (1970). Space/time trade-offs in hash cod-
ing with allowable errors. Commun. ACM, 13(7):422–
426.
Burkhart, M. and fontas, X. D. (2012). Fast private set op-
erations with sepia.
Churches, T. and Christen, P. (2004). Some methods for
blindfolded record linkage. BMC Med. Inf. & Deci-
sion Making.
Dong, C., Chen, L., and Wen, Z. (2013). When private set
intersection meets big data: an efficient and scalable
protocol. In Sadeghi, A., Gligor, V. D., and Yung, M.,
editors, 2013 ACM SIGSAC Conference on Computer
and Communications Security, CCS’13, Berlin, Ger-
many, November 4-8, 2013, pages 789–800. ACM.
Egert, R., Fischlin, M., Gens, D., Jacob, S., Senker, M., and
Tillmanns, J. (2015). Privately computing set-union
and set-intersection cardinality via bloom filters. In
Foo, E. and Stebila, D., editors, Information Security
and Privacy - 20th Australasian Conference, ACISP
2015, Brisbane, QLD, Australia, June 29 - July 1,
2015, Proceedings, volume 9144 of Lecture Notes in
Computer Science. Springer.
Freedman, M. J., Nissim, K., and Pinkas, B. (2004). Effi-
cient private matching and set intersection. In Cachin,
C. and Camenisch, J., editors, Advances in Cryptology
- EUROCRYPT 2004, International Conference on
the Theory and Applications of Cryptographic Tech-
niques, Interlaken, Switzerland, May 2-6, 2004, Pro-
ceedings, volume 3027 of Lecture Notes in Computer
Science. Springer.
Goh, E. (2003). Secure indexes. IACR Cryptology ePrint
Archive, 2003:216.
Goldreich, O. (2004). The Foundations of Cryptography -
Volume 2: Basic Applications. Cambridge University
Press.
Hohenberger, S. and Weis, S. A. (2006). Honest-verifier
private disjointness testing without random oracles. In
Danezis, G. and Golle, P., editors, Privacy Enhancing
Technologies, 6th International Workshop, PET 2006,
Cambridge, UK, June 28-30, 2006, Revised Selected
Papers, volume 4258 of Lecture Notes in Computer
Science, pages 277–294. Springer.
Kerschbaum, F. (2012). Outsourced private set intersec-
tion using homomorphic encryption. In Youm, H. Y.
and Won, Y., editors, 7th ACM Symposium on Infor-
mation, Compuer and Communications Security, ASI-
ACCS ’12, Seoul, Korea, May 2-4, 2012. ACM.
Kiayias, A. and Mitrofanova, A. (2005). Testing dis-
jointness of private datasets. In Patrick, A. S. and
Yung, M., editors, Financial Cryptography and Data
Security, 9th International Conference, FC 2005,
Roseau, The Commonwealth of Dominica, February
28 - March 3, 2005, Revised Papers, Lecture Notes in
Computer Science, pages 109–124. Springer.
Kissner, L. and Song, D. X. (2005). Privacy-preserving set
operations. In Shoup, V., editor, Advances in Cryp-
tology - CRYPTO 2005: 25th Annual International
Cryptology Conference, Santa Barbara, California,
USA, August 14-18, 2005, Proceedings, volume 3621
of Lecture Notes in Computer Science. Springer.
Li, Z. and Gong, G. (2012). Efficient data aggregation with
secure bloom filter in wireless sensor networks.
Pinkas, B., Schneider, T., and Zohner, M. (2014). Faster pri-
vate set intersection based on OT extension. In Fu, K.
and Jung, J., editors, Proceedings of the 23rd USENIX
Security Symposium, San Diego, CA, USA, August 20-
22, 2014., pages 797–812. USENIX Association.
Qiu, L., Li, Y., and Wu, X. (2007). Preserving privacy in
association rule mining with bloom filters. J. Intell.
Inf. Syst., 29(3):253–278.
Swamidass, S. J. and Baldi, P. (2007). Mathematical cor-
rection for fingerprint similarity measures to improve
chemical retrieval. Journal of Chemical Information
and Modeling, 47(3):952–964. PMID: 17444629.
Tajan, L. and Westhoff, D. (2019). Retrospective tracking
of suspects in GDPR conform mobile access networks
datasets. In Proceedings of the Third Central Euro-
pean Cybersecurity Conference, CECC 2019, Munich,
Germany, November 14-15, 2019, pages 16:1–16:6.
ACM.
Tajan, L., Westhoff, D., and Armknecht, F. (2019). Pri-
vate set relations with bloom filters for outsourced
SLA validation. IACR Cryptology ePrint Archive,
2019:993.
Tajan, L., Westhoff, D., Reuter, C. A., and Armknecht, F.
(2016). Private information retrieval and searchable
encryption for privacy-preserving multi-client cloud
auditing. In 11th International Conference for In-
ternet Technology and Secured Transactions, ICITST
2016, Barcelona, Spain, December 5-7, 2016. IEEE.
Ye, Q., Wang, H., Pieprzyk, J., and Zhang, X. (2008). Ef-
ficient disjointness tests for private datasets. In Mu,
Y., Susilo, W., and Seberry, J., editors, Information
Security and Privacy, 13th Australasian Conference,
ACISP 2008, Wollongong, Australia, July 7-9, 2008,
Proceedings, volume 5107 of Lecture Notes in Com-
puter Science, pages 155–169. Springer.
SECRYPT 2020 - 17th International Conference on Security and Cryptography
450