Zobrazeno 1 - 10
of 350
pro vyhledávání: '"SHARMA, Shantanu"'
This paper addresses volume leakage (i.e., leakage of the number of records in the answer set) when processing keyword queries in encrypted key-value (KV) datasets. Volume leakage, coupled with prior knowledge about data distribution and/or previousl
Externí odkaz:
http://arxiv.org/abs/2310.12491
Autor:
Chakraborty, Vishal, Ann-Elvy, Stacy, Mehrotra, Sharad, Nawab, Faisal, Sadoghi, Mohammad, Sharma, Shantanu, Venkatsubhramanian, Nalini, Saeed, Farhan
Data regulations, such as GDPR, are increasingly being adopted globally to protect against unsafe data management practices. Such regulations are, often ambiguous (with multiple valid interpretations) when it comes to defining the expected dynamic be
Externí odkaz:
http://arxiv.org/abs/2308.07501
Autor:
Elkordy, Ahmed Roushdy, Ezzeldin, Yahya H., Han, Shanshan, Sharma, Shantanu, He, Chaoyang, Mehrotra, Sharad, Avestimehr, Salman
Publikováno v:
APSIPA Transactions on Signal and Information Processing, Volume 12, Issue 1, 2023
Federated analytics (FA) is a privacy-preserving framework for computing data analytics over multiple remote parties (e.g., mobile devices) or silo-ed institutional entities (e.g., hospitals, banks) without sharing the data among parties. Motivated b
Externí odkaz:
http://arxiv.org/abs/2302.01326
Autor:
Panwar, Nisha, Sharma, Shantanu, Wang, Guoxi, Mehrotra, Sharad, Venkatasubramanian, Nalini, Diallo, Mamadou H., Sani, Ardalan Amiri
Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems. There are several reasons why such a trust is misplaced -- IoT systems may violate the rules deliberately or IoT devices
Externí odkaz:
http://arxiv.org/abs/2108.02293
Autor:
Li, Yin, Ghosh, Dhrubajyoti, Gupta, Peeyush, Mehrotra, Sharad, Panwar, Nisha, Sharma, Shantanu
This paper proposes Prism, a secret sharing based approach to compute private set operations (i.e., intersection and union), as well as aggregates over outsourced databases belonging to multiple owners. Prism enables data owners to pre-load the data
Externí odkaz:
http://arxiv.org/abs/2104.03354
This paper proposes a system, entitled Concealer that allows sharing time-varying spatial data (e.g., as produced by sensors) in encrypted form to an untrusted third-party service provider to provide location-based applications (involving aggregation
Externí odkaz:
http://arxiv.org/abs/2102.05238
End-to-end communication over the network layer (or data link in overlay networks) is one of the most important communication tasks in every communication network, including legacy communication networks as well as mobile ad hoc networks, peer-to-pee
Externí odkaz:
http://arxiv.org/abs/2006.05901
Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge. This paper continues along with the emerging trend in secure data processing that recognizes that the entire dataset may
Externí odkaz:
http://arxiv.org/abs/2005.06154
Autor:
Gupta, Peeyush, Mehrotra, Sharad, Panwar, Nisha, Sharma, Shantanu, Venkatasubramanian, Nalini, Wang, Guoxi
Contact tracing has emerged as one of the main mitigation strategies to prevent the spread of pandemics such as COVID-19. Recently, several efforts have been initiated to track individuals, their movements, and interactions using technologies, e.g.,
Externí odkaz:
http://arxiv.org/abs/2005.02510
Despite exciting progress on cryptography, secure and efficient query processing over outsourced data remains an open challenge. We develop a communication-efficient and information-theoretically secure system, entitled Obscure for aggregation querie
Externí odkaz:
http://arxiv.org/abs/2004.13115