2021 International Conference on Information Networking (ICOIN) 2021
DOI: 10.1109/icoin50884.2021.9333950
|View full text |Cite
|
Sign up to set email alerts
|

Is Bloom Filter a Bad Choice for Security and Privacy?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

4
3

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 12 publications
0
14
0
Order By: Relevance
“…Equation (8) gives optimal false positive probability for given m bits array and n input items (15). Now, the value of k is replaced in Equation ( 7), we get Equation (9).…”
Section: Bloom Filtermentioning
confidence: 99%
See 1 more Smart Citation
“…Equation (8) gives optimal false positive probability for given m bits array and n input items (15). Now, the value of k is replaced in Equation ( 7), we get Equation (9).…”
Section: Bloom Filtermentioning
confidence: 99%
“…Bloom Filter [20] is an approximate set membership filtering data structure which is defined in Definition 1. It is extremely popular in diverse domains, particularly, Big Data [34], IoT, Cloud Computing, Networking [35], Security [21,36], Database, Bioinformatics [37], and Biometrics. Bloom Filter is applied to reduce the main memory footprint.…”
Section: Bloom Filtermentioning
confidence: 99%
“…Counting Bloom Filter become popular due to false negative free. Deletion introduces false negatives in conventional Bloom Filter [25], but deletion is the most important operation in many applications. Therefore, diverse variants of counting Bloom Filter have been introduced, and Luo et al [33] reported 15 counting Bloom Filters till 24 December 2018.…”
Section: B Frequency Countmentioning
confidence: 99%
“…Murmur hash function is the best non-cryptographic string hash functions [24]. There are also cryptographic string hash functions, however, it does not enhances the performance and the false positive probability [25]. Therefore, we compare countBF with SBF and CBF to evaluate the characteristics using various test cases.…”
Section: Introductionmentioning
confidence: 99%
“…Besides, Bloom Filter implements hash functions to generate a separate digest for every element representation efficiently and uniquely. So, data entry to and data extraction from the filter based on the hashing requires linear complexity of time O(1) [11].…”
Section: Introductionmentioning
confidence: 99%