Security and Privacy in Big Data, Blessing or Curse?
|
|
- Violet Conley
- 8 years ago
- Views:
Transcription
1 Security and Privacy in Big Data, Blessing or Curse? 2 nd National Cryptography Days 9-11 April 2015 Dr. Zeki Erkin Cyber Security Section Department of Intelligent Systems Delft University of Technology 1
2 About me BSc and Istanbul, 2002, 2005 Delft, 2010 TU Delft, Assist. TU Delft, Cyber Security Group FET Signal Processing in the Encrypted Domain STW Kindred Spirits Dutch/COMMIT Trusted Healthcare and Extreme Wireless Sensor Networks 3TU Big Software on the Run Secure Signal Processing, Privacy Enhancing Technologies MPC, Homomorphic Encryption PCs, TCs: JoPETS, PETs, IEEE TIFS, WIFS, ICIP, ICASSP Bochum, Aarhus, UC Irvine, IBM Zurich 2
3 Outline Security and Privacy in Big data Motivation Secure Signal Processing Face Recognition Recommender Systems Research Challenges and Opportunities 3
4 Privacy concerns Data data and more data 4
5 Problem statement Sensitive Data Commercially valuable algorithm 1. Service provider trustworthy Bankruptcy, lost-theft of data, insiders 2. Service provider untrustworthy Malicious acts, selling-transfer of data to the 3 rd parties Cloud computing: outsourcing computation and storage Where, when, by whom? Laws? Privacy? Espionage? Can we protect privacy while processing data without hampering services? 5
6 Players Government Regulation, legalization, protecting privacy, providing security and safety (critical infrastructures), creating new business fields Citizens Demanding security and privacy. Economical benefits, job opportunities Business Increasing profit, reducing costs, reaching out to more customers, new business ideas Academia Solutions for societal problems 6
7 Secure Data Processing computational privacy Privacy Enhancing Technologies Privacy by Design Applied cryptography Homomorphic encryption Garbled circuits Secret sharing MPC techniques Do not reveal sensitive data in plaintext! 7
8 Face Recognition Alice Bob Is he a criminal? Database Processing Yes, ID/No 8
9 with Privacy Alice Bob Is he a criminal? Database Processing [Yes], [ID]/[No] Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, R. L. Lagendijk and T. Toft, Privacy- Preserving Face Recognition, 9th International Symposium on Privacy Enhancing Technologies, LNCS 5672, pp , August
10 Eigenface Algorithm 10
11 Secure Face Recognition 11
12 Homomorphic Encryption A number of schemes preserve structure after encryption. Additive Homomorphism (Paillier 99) 12
13 Projection in the encrypted domain Alice (sk) Bob (pk) Input image Encrypted pixel values Feature vectors in a database Apply projection and obtain the feature vector of the input image. 13
14 Euclidean Distance Alice (sk) Bob (pk) F y =(f (y,1),f (y,2),...,f (y,k) ) Secure Multiplication Protocol! Homomorphism 14
15 Secure Multiplication Protocol Bob Alice 15
16 Finding the minimum Alice (sk) Bob (pk) [D 2 (F x,f y )], [D 2 (F x,f w )],...,[D 2 (F x,f z )] Find the minimum squared distance! But [D 2 (F x,f y )] = g D2 (F x,f y ) r n 1 mod n 2 = [D 2 (F x,f w )] = g D2 (F x,f w ) r n 2 mod n 2 =
17 Finding the Minimum: Concept 17
18 Interactive Game Alice Bob 18
19 Comparison [e i ] = [1] [c i ] [r i ] 1 `Y 1 [c j ] [r j ] [c j ] 2r j j=i+1 19
20 Secure Face Recognition 20
21 Performance Implemented in 2009 Integer arithmetic 400 images (112x92) 18 seconds Implementation in 2009 (hybrid approach) Garbled circuits 1000 images 13 seconds 21
22 Recommender Systems Problem: Privacy likes/dislikes: identification and tracking medical data cannot be stored and processed Solution: Privacy Enhancing Technologies 22
23 Ideal System 23
24 3-Party Setting Erkin, Z., Veugen, T., Toft, T., Lagendijk, R.: Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing. IEEE Transactions on Information Forensics and Security 7 (06/ ) Beye, M., Erkin, Z., Lagendijk, R.: Efficient privacy preserving K-means clustering in a three-party setting. In: Information Forensics and Security (WIFS), 2011 IEEE International Workshop on. ( dec ) 1 6 Canny, J.: Collaborative filtering with privacy. In Proceedings IEEE Symposium on Security and Privacy, IEEE (2002)
25 Dynamic Execution Problem Kononchuk, D., Z. Erkin, J. C. A. van der Lubbe, and R. L. Lagendijk, "Privacy-Preserving User Data Oriented Services For Groups With Dynamic Participation", ESORICS, Egham, UK, 09/
26 Case Study: Ahold E(ID) Data Profiles 320M visitors in NL per year Suggestions This is BIG DATA 26
27 Curse or Blessing Curse Awareness - society Legalization - governments Limitations - industry Blessing Research questions! Privacy by design wins! 27
28 Research Challenges Efficiency Run-time, bandwidth, storage Security model Semi-honest, covert, malicious Cryptographic tools FHE, SHE, HE, GC, SS (additive, strong ramp) MPC techniques Application setting 2-party, 3-party, N-party Static and Dynamic Application domain Cloud computing Confidentiality(privacy), integrity (computation and storage) Smart grids Billing, data aggregation, verification, prediction Automotive, social networks, supply chains Data mining (finance), data fusion, real time, data mitigation etc 28
29 Opportunities Multi-disciplinary Cryptography, signal processing, pattern recognition, machine learning, social sciences: social-technical solutions (H2020) Wide application domain Biometrics, smart grids, cloud computing, finance, defence..etc H2020 Digital societies: Trust, Privacy ICT calls Thank you for your attention! 29
Computing on Encrypted Data
Computing on Encrypted Data Secure Internet of Things Seminar David Wu January, 2015 Smart Homes New Applications in the Internet of Things aggregation + analytics usage statistics and reports report energy
More informationBig Data - Security and Privacy
Big Data - Security and Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center! Big Data EveryWhere! Lots of data is being collected, warehoused, and mined Web data,
More informationTongue as a Biometric Visualizes New Prospects of Cloud Computing Security
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Tongue as a Biometric Visualizes New Prospects of Cloud Computing Security Sowmya
More informationAssociate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
More informationCOMPARING ENCRYPTED DATA. Thijs Veugen
COMPARING ENCRYPTED DATA Thijs Veugen Multimedia Signal Processing Group, Delft University of Technology, The Netherlands, and TNO Information and Communication Technology, Delft, The Netherlands ABSTRACT
More informationTowards Trustworthy Clouds
IBM Research Zurich Christian Cachin 12 September 2013 Towards Trustworthy Clouds 2009 IBM Corporation Cloud computing? 2 Cloud services are convenient No investment cost Pay only for consumption Scalable
More informationE6895 Advanced Big Data Analytics Lecture 8:! Encrypted Domain Data Mining
E6895 Advanced Big Data Analytics Lecture 8: Encrypted Domain Data Mining Ching-Yung Lin, Ph.D. Adjunct Professor, Dept. of Electrical Engineering and Computer Science Mgr., Dept. of Network Science and
More informationFully homomorphic encryption equating to cloud security: An approach
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50 Fully homomorphic encryption equating to cloud security: An approach
More informationDigital Object Identifier 10.1109/MSP.2012.2219653 Date of publication: 5 December 2012
[ R. (Inald) L. Lagendijk, Zekeriya Erkin, and auro Barni ] Encrypted Signal Processing for Privacy Protection [ Conveying the utility of homomorphic encryption and multiparty computation] In recent years,
More informationATTPS Publication: Trustworthy ICT Taxonomy
Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94
More informationExperimental Analysis of Privacy-Preserving Statistics Computation
Experimental Analysis of Privacy-Preserving Statistics Computation Hiranmayee Subramaniam 1, Rebecca N. Wright 2, and Zhiqiang Yang 2 1 Stevens Institute of Technology graduate, hiran@polypaths.com. 2
More informationPrivacy-preserving Data Mining: current research and trends
Privacy-preserving Data Mining: current research and trends Stan Matwin School of Information Technology and Engineering University of Ottawa, Canada stan@site.uottawa.ca Few words about our research Universit[é
More informationSecure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud
Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud K.S. Aswathy 1, G. Venifa Mini 2 1 M.E. Student, 2 Assistant Professor, Computer Science and Engineering, Noorul
More informationCyber Security @ DTU. Lars Ramkilde Knudsen
Cyber Security @ DTU Lars Ramkilde Knudsen Professor @ Technical University of Denmark (DTU) Member of the Academy of Technical Sciences in Denmark Chief Cryptographer @ Dencrypt Finans IT Dagen About
More informationTop Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America
1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:
More informationEfficient Privacy-Preserving Face Recognition
Efficient Privacy-Preserving Face Recognition Ahmad-Reza Sadeghi, Thomas Schneider, and Immo Wehrenberg Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany {ahmad.sadeghi,thomas.schneider}@trust.rub.de,immo.wehrenberg@rub.de
More information15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
More informationK-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT
Journal homepage: www.mjret.in K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT Akshay Dabi, Arslan Shaikh, Pranay Bamane, Vivek Thorat, Prof.Popat Borse. Computer Engineering.
More informationNEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA
THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 14, Number 1/2013, pp. 72 77 NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA Laurenţiu BURDUŞEL Politehnica
More informationEFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
More informationaddressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
More informationA Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
More informationBiometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
More informationSecurity Infrastructure for Trusted Offloading in Mobile Cloud Computing
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security
More informationIEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
More informationEIT ICT Labs MASTER SCHOOL. Specialisations
EIT ICT Labs MASTER SCHOOL Specialisations S&P EIT ICT Labs Master Programme Security & Privacy The Learning outcomes of this major are: Understanding the concepts and technologies for achieving confidentiality,
More informationSecure Computation Martin Beck
Institute of Systems Architecture, Chair of Privacy and Data Security Secure Computation Martin Beck Dresden, 05.02.2015 Index Homomorphic Encryption The Cloud problem (overview & example) System properties
More informationEnabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
More information3TU.BSR: Big Software on the Run
Summary Millions of lines of code - written in different languages by different people at different times, and operating on a variety of platforms - drive the systems performing key processes in our society.
More informationSecure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing
December 2013, 20(6): 88 95 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://jcupt.xsw.bupt.cn Secure and privacy-preserving DRM scheme
More informationPrivacy-Preserving Social Network Analysis for Criminal Investigations
Privacy-Preserving Social Network Analysis for Criminal Investigations Florian Kerschbaum SAP Research Karlsruhe, Germany florian.kerschbaum@sap.com Andreas Schaad SAP Research Karlsruhe, Germany andreas.schaad@sap.com
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationVerifiable Outsourced Computations Outsourcing Computations to Untrusted Servers
Outsourcing Computations to Untrusted Servers Security of Symmetric Ciphers in Network Protocols ICMS, May 26, 2015, Edinburgh Problem Motivation Problem Motivation Problem Motivation Problem Motivation
More informationPrivacy Preserving Distributed Cloud Storage
Privacy Preserving Distributed Cloud Storage Praveenkumar Khethavath 1 *, Doyel Pal 2 1 Department of Mathematics, Engineering and Computer Science, LaGuardia Community College, Long Island City, NY 11101.
More informationA SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES
A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES K.M.Ruba Malini #1 and R.Lakshmi *2 # P.G.Scholar, Computer Science and Engineering, K. L. N College Of
More informationWhitewash: Securely Outsourcing Garbled Circuit Generation
Whitewash: Securely Outsourcing Garbled Circuit Generation MSR Workshop on Applied Multi-Party Computation February 2014 Henry Hank Carter, Charles Lever, Patrick Traynor SMC on mobile devices Mobile devices
More informationArnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 Security Analytics Crypto and Privacy Technologies Infrastructure Security 60+ members Framework and Taxonomy Chair - Sree Rajan, Fujitsu
More informationExploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners
Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li Richard Shin Vern Paxson Electrical Engineering and Computer Sciences University of California at Berkeley
More informationGlobal Soft Solutions JAVA IEEE PROJECT TITLES - 2015
Global Soft Solutions No : 6, III Floor Chitra Complex Chatram Bus Stand Trichy 620 002 www.globalsoftsolutions.in Email : gsstrichy@gmail.com Ph : 0431 4544308 / Cell : 94431 22110 JAVA IEEE PROJECT TITLES
More informationEIT ICT Labs MASTER SCHOOL S&P Programme Specialisations
EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations S&P EIT ICT Labs Master Programme Security & Privacy The programme in Security and Privacy focuses on the study of the design, development and evaluation
More informationHey! Cross Check on Computation in Cloud
Hey! Cross Check on Computation in Cloud Ajeet Singh Rajput Computer Science and Engineering Department S.D.B.C.T, Mhow Road,Indore,(M.P), India ajeetsinghrajput@gmail.com M.E.(CSE), S.D.B.C.T, Indore
More informationThird Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.
More informationPaillier Threshold Encryption Toolbox
Paillier Threshold Encryption Toolbox October 23, 2010 1 Introduction Following a desire for secure (encrypted) multiparty computation, the University of Texas at Dallas Data Security and Privacy Lab created
More informationRECOMMENDATION systems consist of a processor
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 3, MARCH 2015 445 A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations
More informationXianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA 02215 +1 (857) 540 0460 xmeng@cs.bu.edu www.xianruimeng.
Xianrui Meng MCS 138, 111 Cummington Mall Boston, MA 02215 +1 (857) 540 0460 xmeng@cs.bu.edu www.xianruimeng.org RESEARCH INTERESTS In my research, I investigate practical privacy-preserving solutions
More informationInternet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges
More informationSurvey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,
More informationPrivacy-preserving Data-aggregation for Internet-of-things in Smart Grid
Privacy-preserving Data-aggregation for Internet-of-things in Smart Grid Aakanksha Chowdhery Postdoctoral Researcher, Microsoft Research ac@microsoftcom Collaborators: Victor Bahl, Ratul Mahajan, Frank
More informationOn the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016
On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT
More information2. Cyber security research in the Netherlands
2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed
More information3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
More informationNetwork Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
More informationA NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
More informationHomomorphic encryption and emerging technologies COSC412
Homomorphic encryption and emerging technologies COSC412 Learning objectives Describe useful work that can be done on encrypted data Appreciate the overall way in which an example homomorphic encryption
More informationNSF Workshop on Big Data Security and Privacy
NSF Workshop on Big Data Security and Privacy Report Summary Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 19, 2015 Acknowledgement NSF SaTC Program for support Chris Clifton and
More informationEfficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique
More informationNational Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
More informationAuthor. Ginés Dólera Tormo. Advisors Dr. Félix Gómez Mármol (NEC Laboratories Europe) Prof. Dr. Gregorio Martínez Pérez (University of Murcia)
Systems with Faculty of Computer Science ENHANCING USER CENTRIC IDENTITY MANAGEMENT SYSTEMS WITH REPUTATION MODELS IN DISTRIBUTED ENVIRONMENTS Author Advisors Dr. Félix Gómez Mármol (NEC Laboratories Europe)
More informationSecurity and Privacy in IoT Challenges to be won
Security and Privacy in IoT Challenges to be won Enrico Del Re University of Florence and CNIT Italy June 16-18, 2015 CHIST-ERA Conference 2015 1 FROM WHERE WE START.. June 16-18, 2015 CHIST-ERA Conference
More informationE-Democracy and e-voting
E-Democracy and e-voting How to make them secure and transparent August 2013 Jordi Puiggali CSO and SVP R&D Jordi.puiggali@scytl.com Index Introduction e-democracy Security and Transparency in e-voting
More informationEnd-to-end Secure Data Aggregation in Wireless Sensor Networks
End-to-end Secure Data Aggregation in Wireless Sensor Networks Keyur Parmar 1 Devesh Jinwala 2 1 Ph.D Scholar & Senior Research Fellow Department of Computer Engineering SVNIT, Surat, India 2 Professor
More informationDelft Data Science Seminar January 26, 2015
Delft Data Science Seminar January 26, 2015 Big Data Analytics for Cyber Situational Awareness 1 100 billions in economic and societal value Content Creation millions of new jobs and millions of new talent
More informationSOME SECURITY CHALLENGES IN CLOUD COMPUTING. Hoang N.V.
SOME SECURITY CHALLENGES IN CLOUD COMPUTING Hoang N.V. What is cloud computing? Cloud computing: Advantages "pay-per-use model for enabling available, convenient and on-demand network access to a shared
More informationHomomorphic Encryption Schema for Privacy Preserving Mining of Association Rules
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules M.Sangeetha 1, P. Anishprabu 2, S. Shanmathi 3 Department of Computer Science and Engineering SriGuru Institute of Technology
More information1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
More informationSecure and Efficient Protocols for Iris and Fingerprint Identification
Secure and Efficient Protocols for Iris and Fingerprint Identification Marina Blanton 1 and Paolo Gasti 2 1 Department of Computer Science and Engineering, University of Notre Dame 2 Department of Information
More informationPrivacy Preserving Similarity Evaluation of Time Series Data
Privacy Preserving Similarity Evaluation of Time Series Data Haohan Zhu Department of Computer Science Boston University zhu@cs.bu.edu Xianrui Meng Department of Computer Science Boston University xmeng@cs.bu.edu
More informationThe Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It?
Institute for Cyber Security The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21, 2011 ravi.sandhu@utsa.edu
More informationPRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH
PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH FOC2015 Vienna / 17.06.2015 Challenges for Future ICT Systems Cloud computing
More informationEfficient Unlinkable Secret Handshakes for Anonymous Communications
보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Efficient Unlinkable Secret Handshakes for Anonymous Communications Eun-Kyung Ryu 1), Kee-Young Yoo 2), Keum-Sook Ha 3) Abstract The technique
More informationVector Calculus Fourier Series & Laplace Transform. 3 1 0 4 PYN106 Electromagnetic Field Theory 3 1/2 2/2 4
Courses/Credit Distribution of Computer Science and Engineering Department I. Basic Science Courses (BSC) Semester I PYN101 Oscillation and Optics 3 1/2 2/2 4 Semester II MAN105 Vector Calculus Fourier
More informationA Roadmap for Future Architectures and Services for Manufacturing. Carsten Rückriegel Road4FAME-EU-Consultation Meeting Brussels, May, 22 nd 2015
A Roadmap for Future Architectures and Services for Manufacturing Carsten Rückriegel Road4FAME-EU-Consultation Meeting Brussels, May, 22 nd 2015 Road4FAME in a nutshell Road4FAME = Development of a Strategic
More informationChapter 2 Design Aspects of Secure Biometric Systems and Biometrics in the Encrypted Domain
Chapter 2 Design Aspects of Secure Biometric Systems and Biometrics in the Encrypted Domain Claus Vielhauer, Jana Dittmann, and Stefan Katzenbeisser Abstract This chapter introduces the main security requirements
More informationInformation and Network Security & Privacy Research
Faculty of Engineering and Natural Sciences Computer Science and Engineering Information and Network Security & Privacy Research Albert Levi Sabancı University Computer Science and Engineering Cryptography
More informationPROFESSIONAL INTERESTS WORK EXPERIENCE GINÉS DÓLERA TORMO CURRICULUM VITAE OCTOBER 2014
Ginés Dólera Tormo Phone: +49 176 90775273 E-mail: ginesdt@um.es Date of birth: 21 July, 1985 Nationality: Spanish Address: Dossenheimer Landsrtrasse 100 D-69121 Heidelberg, Germany PROFESSIONAL INTERESTS
More informationData Grid Privacy and Secure Storage Service in Cloud Computing
Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,
More informationMethodology for Emulating Self Organizing Maps for Visualization of Large Datasets
Methodology for Emulating Self Organizing Maps for Visualization of Large Datasets Macario O. Cordel II and Arnulfo P. Azcarraga College of Computer Studies *Corresponding Author: macario.cordel@dlsu.edu.ph
More informationResume. Dr. Vedat COSKUN. Organisational E-mail Personal E-mail Personal Web Site Research Lab Web Site
Resume Dr. Vedat COSKUN Organisational E-mail Personal E-mail Personal Web Site Research Lab Web Site vedatcoskun@isikun.edu.tr vedatcoskun@me.com www.vedatcoskun.com www.nfclab.com Dr. Vedat Coskun is
More informationA Secure Model for Medical Data Sharing
International Journal of Database Theory and Application 45 A Secure Model for Medical Data Sharing Wong Kok Seng 1,1,Myung Ho Kim 1, Rosli Besar 2, Fazly Salleh 2 1 Department of Computer, Soongsil University,
More informationScalable and secure sharing of data in cloud computing using attribute based encryption
Volume :2, Issue :4, 416-420 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Ghodake Shubhangi Joshi Priyanka Khobragade Pranjali Chandak Manjiri Scalable
More informationCyber Security and Privacy
Cyber Security and Privacy Jovan Golić CySeP Winter School, Stockholm, 2014 EIT ICT Labs EIT ICT Labs is one of the first Knowledge and Innovation Communities set up in 2010 by the European Institute of
More informationImproving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
More informationBasheer Al-Duwairi Jordan University of Science & Technology
Basheer Al-Duwairi Jordan University of Science & Technology Assistant Professor Department of Network Engineering & Security @ JUST Education: PhD, Iowa State University, 2005 Ms, Iowa State University,
More informationApproaches for privacy-friendly Smart Metering: Architecture using homomorphic encryption and homomorphic MACs
Approaches for privacy-friendly Smart Metering: Architecture using homomorphic encryption and homomorphic MACs Seminar Trustworthy and Energy-Efficient Smart Grids Overview on Approach Introduced in: [B.
More informationPOSTGRADUATE OPEN DAY
POSTGRADUATE OPEN DAY Monday 1 December 2014 Dr Ivor Spence SCHOOL OF ELECTRONICS, ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Postgraduate Courses Overview MSc Courses MSc Software Development (Conversion)
More informationEnabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage
Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,
More informationAn Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud
An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud Sanjay Madria Professor and Site Director for NSF I/UCRC Center on Net-Centric Software and Systems Missouri University
More informationRfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India archanathange7575@gmail.com,
More informationHow To Research Security And Privacy Using Data Science
Research Topics in Security and Privacy using Data Science School of Informatics University of Edinburgh David Aspinall David.Aspinall@ed.ac.uk http://secpriv.inf.ed.ac.uk/ http://cybersec.ed.ac.uk/ Outline
More informationInnovation value pools for Utilities or Advanced Information and Communications (ICT) Technology in Energy
Innovation value pools for Utilities or Advanced Information and Communications (ICT) Technology in Energy Tony Court Director, Cisco Consulting Services Oct 2014 3 R s for Utility Success in 21 st Century
More informationSecure Binary Embeddings for Privacy Preserving Nearest Neighbors
Secure Binary Embeddings for Privacy Preserving Nearest Neighbors Petros Boufounos and Shantanu Rane Mitsubishi Electric Research Laboratories, Cambridge, MA 239, USA. {petrosb,rane}@merl.com Abstract
More informationNATIONAL SUN YAT-SEN UNIVERSITY
NATIONAL SUN YAT-SEN UNIVERSITY Department of Electrical Engineering (Master s Degree, Doctoral Program Course, International Master's Program in Electric Power Engineering) Course Structure Course Structures
More informationEXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS. Dokuri Sravanthi 1, P.Rupa 2
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE EXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS Dokuri Sravanthi 1, P.Rupa 2 1 M.Tech Student, Dept of CSE, CMR Institute
More informationSECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
More informationLoss Less and Privacy Preserved Data Retrieval in Cloud Environment using TRSE
I.J. Wireless and Microwave Technologies, 2015, 6, 19-25 Published Online November 2015 in MECS(http://www.mecs-press.net) DOI: 10.5815/ijwmt.2015.06.03 Available online at http://www.mecs-press.net/ijwmt
More informationCONTROLLING DATA IN THE CLOUD: OUTSOURCING COMPUTATION WITHOUT OUTSOURCING CONTROL
CONTROLLING DATA IN THE CLOUD: OUTSOURCING COMPUTATION WITHOUT OUTSOURCING CONTROL Paper By: Chow, R; Golle, P; Jakobsson, M; Shai, E; Staddon, J From PARC & Masuoka, R And Mollina From Fujitsu Laboratories
More informationStrategic Platforms Information Security 2014
Strategic Platforms Information Security 2014 -------------------------- Data Mining for security process monitoring New authentication mechanism for System Information Call for «Expression of Interest»
More informationSurvey on Securing Data using Homomorphic Encryption in Cloud Computing
International Journal of Computer Sciences and Engineering Open Access Survey Paper Volume-04, Issue-01 E-ISSN: 2347-2693 Survey on Securing Data using Homomorphic Encryption in Cloud Computing Suraj S.
More informationResearch Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
More informationAn Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
The 12th Australasian Conference on Information Security and Privacy (ACISP 07). (2 4 july 2007, Townsville, Queensland, Australia) J. Pieprzyk Ed. Springer-Verlag, LNCS????, pages??????. An Application
More information