Xianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA (857)

Size: px
Start display at page:

Download "Xianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA 02215 +1 (857) 540 0460 xmeng@cs.bu.edu www.xianruimeng."

Transcription

1 Xianrui Meng MCS 138, 111 Cummington Mall Boston, MA (857) RESEARCH INTERESTS In my research, I investigate practical privacy-preserving solutions for data analytics and cloud computing, such as searchable encryption and graph encryption. Broadly, my work is mainly focused on designing and analyzing privacy-preserving technologies for databases and cryptographic protocols, often motivated by privacy issues in cloud computing, big data, machine learning, and cyber-security. EDUCATION Massachusetts, USA Post-Bachelor Ph.D. Program in Computer Science, 4.0/4.0 September, 2010 present Dissertation Topic : Practical Privacy-Preserving Queries on Encrypted Databases Research Area: Data Privacy, Database Security, Data Mining, Applied Cryptography Major Advisor: Prof. George Kollios Massachusetts, USA Master of Science in Computer Science, 3.89/4.00 September, 2010 February, 2013 Master Thesis: Security and Privacy-preserving Aspects of Mobile application for Post-Surgical Care Major Advisor: Prof. Steven Homer The State University of Pennsylvania Pennsylvania, USA Bachelor of Science, 3.91/4.00 (Magna Cum Laude) September, 2006 May, 2010 Mathematics and Computer Science (Dual Degree) Minor: Statistics, Electronics PUBLICATIONS NED: An Inter-Graph Node Metric Based On Edit Distance. CoRR:abs/ , Submitted to KDD 2016 Top-k Queries on Encrypted Databases with Strong Privacy Guarantee CoRR:abs/ , Submitted to VLDB /5

2 GRECS: Approximate Shortest Distance Queries on Encrypted Graphs with Seny Kamara, Kobbi Nissim, George Kollios Appears in 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, USA, 2015 Privacy Preserving Similarity Evaluation of Time Series Data Appears in 17th International Conference on Extending Database Technology (EDBT), Athens, Greece, 2014 Computational Fuzzy Extractors with Benjamin Fuller, Leonid Reyzin. Appears in 19th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), Bengaluru, India, 2013 Security and Privacy-preserving Aspects of Mobile application for Post- Surgical Care with Steve Homer and Zlateva Tanya Master Thesis, Technical Report Perfect Distance Star Appears in Rose-Hulman Undergraduate Mathematics Journal RESEARCH EXPERIENCE Industrial Internship Research Internship at Microsoft Research, Redmond Lab June-September, 2014 Querying and Searching on Encrypted data. Constructing novel encrypted indexing structures for efficient querying by leveraging techniques from searchable encryption. Mentor: Seny Kamara, Researcher in the Cryptography Group Research Fellow at Privacy-preserving Machine Learning Algorithm Working on developing privacy-preserving protocols for machine learning algorithms, such as clustering for malicious domain detection and secure entity resolution. Research funded by NSF CNS (A Modular approach to Cloud Security) With Alina Oprea (RSA lab) Structured Encryption for Massive Datasets To develop the encryption scheme for system of structured datasets. Research funded by NSF CNS (A Modular approach to Cloud Security) With Seny Kamara(MSR), George Kollios 2/5

3 Working on developing graph encryption scheme for large graph database with support of various graph queries. Research funded by NSF III (Managing and Mining Uncertain Graphs) With Seny Kamara (MSR), Kobbi Nissim (Harvard & Ben-Gurion), George Kollios Managing and Mining Uncertain Graphs Proposed a provable inter-graph node metric and an efficient algorithm for modified tree edit distance. The novel node similarity measurement is demonstrated to be effective in transfer learning and de-anonymization. With Haohan Zhu, George Kollios Computational Fuzzy Extractors Spring Summer 2013 Research on biometric key-exchange protocol, fuzzy extractors. Funded by NSF (TC: Large: Securing the Open Softphone) With Benjamin Fuller (MIT Lincoln Lab & BU), Leonid Reyzin (BU) Privacy-Preserving Computation on Time Series Data Spring Summer 2013 Developed a privacy-preserving protocol for computing the distance between the time series data using Dynamic Time Warping. With Haohan Zhu (BU), George Kollios (BU) Softphone Security on post-surgical care Fall Summer 2013 Developed secure protocol using XCode (ios app) for post-surgical professionals. (Master Thesis) Funded by NSF (TC: Large: Securing the Open Softphone) With Steven Homer (BU) Undergraduate Research Research on Perfect Distance Tree Fall Spring 2010 Advised by Prof. William Calhoun. Research on Parallel Computing using MPI Fall Spring 2010 Pittsburgh Supercomputing Center, advised by Prof. Zahira Khan. TALKS 1. ACM CCS Conference, GRECS: Approximate Shortest Distance Queries on Encrypted Graphs, October , Data Lab Seminar, Graph Encryption for shortest distance queries, September Microsoft Research, Cryptography Group Seminar, Graph Encryption: k-reachability & SimRank, August /5

4 4. Microsoft Research, Crypto Lunch, Computational Fuzzy Extractor, July Microsoft Research, Crypto Lunch, Graph Encryption, June , Engineering & Science Poster Session Privacy Preserving Similarity Evaluation of Time Series Data, October PASSHEMA, The Pennsylvania State System of Higher Education, Mathematics Association Perfect Distance Stars mod m, November Posters Top-k Query Processing on Encrypted Databases with Strong Security Guarantees Computer Science Research Open House, 2016 GRECS: pproximate Shortest Distance Queries on Encrypted Graphs Computer Science Research Open House, 2015 Privacy Preserving Similarity Evaluation of Time Series Data Computer Science Research Open House, 2014 Softphone security for post-surgical care The Advanced Cyber Security Center (ACSC) Poster Session 2013 TEACHING EXPERIENCE STUDENT MENTORING Ariel Hamlin (Now a Assistant Staff at MIT Lincoln Laboratory) Summer 2012 Implementation on the secure post-surgical protocol interface. Eeshan Kabir (Now a Software Engineer at NaviNet) Summer 2012 ios secure protocol implementation on Medical Records. TEACHING FELLOW CS330: Introduction to Algorithms (Taught by Leonid Levin) CS235: Algebraic Algorithms (Taught by Leonid Levin) CS111: Programming in Java (Taught by Aaron Stevens) CS101: Introduction to Computer Science (Taught by Aaron Stevens) JOURNAL & CONFERENCE REVIEWER TDSC 2016, ACM CCS 2014/2015, ACM SIGMOD 2013/2014/2015/2016, ASIACCS 2016, TKDE 2014/2015, VLDB 2013/2014/2015, EDBT/ICDT 2015/2016, IEEE ICDE 2013/2014, IACR EUROCRYPT 2013, IACR ASIACRYPT 2014 COMPUTER SKILLS JAVA, C++, C, PYTHON, LATEX, MySQL, NoSQL Databases (MongoDB), Objective-C 4/5

5 REFERENCE George Kollios Steven Homer Seny Kamara Associate Brown University Leonid Reyzin 5/5

MATTEO RIONDATO Curriculum vitae

MATTEO RIONDATO Curriculum vitae MATTEO RIONDATO Curriculum vitae 100 Avenue of the Americas, 16 th Fl. New York, NY 10013, USA +1 646 292 6641 riondato@acm.org http://matteo.rionda.to EDUCATION Ph.D. Computer Science, Brown University,

More information

Machine Learning Department, School of Computer Science, Carnegie Mellon University, PA

Machine Learning Department, School of Computer Science, Carnegie Mellon University, PA Pengtao Xie Carnegie Mellon University Machine Learning Department School of Computer Science 5000 Forbes Ave Pittsburgh, PA 15213 Tel: (412) 916-9798 Email: pengtaox@cs.cmu.edu Web: http://www.cs.cmu.edu/

More information

Academic Planning Self-Study 2014

Academic Planning Self-Study 2014 Academic Planning Self-Study 2014 Department of Computer Science College and Graduate School of Arts and Sciences Boston University Submitted: October 10, 2014 1 I. THE CURRICULAR CONTEXT A. Degrees and

More information

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,

More information

Abhinandan Das EDUCATION AREAS OF INTEREST REPRESENTATIVE RESEARCH

Abhinandan Das EDUCATION AREAS OF INTEREST REPRESENTATIVE RESEARCH Abhinandan Das 4154 Upson Hall Department of Computer Science Cornell University Ithaca NY 14853 http://www.cs.cornell.edu/~asdas Office: (607) 255 4574 Home: (607) 227 5957 Cell: (607) 227 5957 Fax: (607)

More information

Office of the Provost

Office of the Provost Office of the Provost New Degree or Credit-Bearing Certificate Proposal Form Proposed New Degree: Academic Components Title of Degree or Credit-Bearing Certificate (e.g., Bachelor of Arts in History):

More information

Project Participants

Project Participants Annual Report for Period:10/2006-09/2007 Submitted on: 08/15/2007 Principal Investigator: Yang, Li. Award ID: 0414857 Organization: Western Michigan Univ Title: Projection and Interactive Exploration of

More information

Problem Solving Hands-on Labware for Teaching Big Data Cybersecurity Analysis

Problem Solving Hands-on Labware for Teaching Big Data Cybersecurity Analysis , 22-24 October, 2014, San Francisco, USA Problem Solving Hands-on Labware for Teaching Big Data Cybersecurity Analysis Teng Zhao, Kai Qian, Dan Lo, Minzhe Guo, Prabir Bhattacharya, Wei Chen, and Ying

More information

C U R R I C U L U M V I T A E T R I V A N L E

C U R R I C U L U M V I T A E T R I V A N L E C U R R I C U L U M V I T A E T R I V A N L E Department of Computer Science, 253 Love Building Florida State University, Tallahassee, Florida 32306-4530, USA. Phone: (850) 345-6468, Fax: (850) 644-0058.

More information

keywords: big-graphs, big-data, graph-systems, knowledge graphs, uncertain graphs, graph streams, revenue maximization, moving objects indexing.

keywords: big-graphs, big-data, graph-systems, knowledge graphs, uncertain graphs, graph streams, revenue maximization, moving objects indexing. ARIJIT KHAN Systems Group Computer Science Department ETH Zurich +41-44-632-4407 arijit.khan@inf.ethz.ch http://people.inf.ethz.ch/khana RESEARCH INTERESTS Big-graphs management and analytics, with a focus

More information

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud , pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab

More information

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India

More information

M.S., Computer and Information Science, University of Massachusetts, Amherst, May 1984. Thesis: On Ramsey Tautologies.

M.S., Computer and Information Science, University of Massachusetts, Amherst, May 1984. Thesis: On Ramsey Tautologies. Duane A. Bailey Department of Computer Science 47 Lab Campus Drive Williams College Williamstown, Massachusetts 01267 413 597 2417 bailey@cs.williams.edu Education Ph.D., Computer and Information Science,

More information

XIAOKUI SHU. PERSONAL INFORMATION 2202 Kraft Drive http://xshu.net Blacksburg, VA 24060

XIAOKUI SHU. PERSONAL INFORMATION 2202 Kraft Drive http://xshu.net Blacksburg, VA 24060 XIAOKUI SHU PERSONAL INFORMATION 2202 Kraft Drive http://xshu.net Blacksburg, VA 24060 subx@cs.vt.edu RESEARCH INTERESTS Anomaly detection in systems and networks e.g., program execution modeling, event

More information

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: reshmamaryabraham@gmail.com

More information

University-Industry Work Group: Education

University-Industry Work Group: Education University-Industry Work Group: Education Tanya Zlateva Director, Center for Reliable Information Systems and Cyber Security (RISCS) Associate Dean for Academic Programs, Metropolitan College (MET) Boston

More information

1999 2004 Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics.

1999 2004 Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics. Curriculum Vitae Vassilis Zikas Postdoctoral Researcher, UCLA University of California, Los Angeles Los Angeles, CA 90095-1596 +1 (424) 781-7942 vzikas@cs.ucla.edu www.cs.ucla.edu/~vzikas Education 2006

More information

Security and Privacy in Big Data, Blessing or Curse?

Security and Privacy in Big Data, Blessing or Curse? Security and Privacy in Big Data, Blessing or Curse? 2 nd National Cryptography Days 9-11 April 2015 Dr. Zeki Erkin Cyber Security Section Department of Intelligent Systems Delft University of Technology

More information

Dr. Shashank Srivastava. Contact. E-mail: shashank12@mnnit.ac.in. Telephone: 0532-2271365. Teaching. Courses Taught: Current Courses: Past Courses:

Dr. Shashank Srivastava. Contact. E-mail: shashank12@mnnit.ac.in. Telephone: 0532-2271365. Teaching. Courses Taught: Current Courses: Past Courses: Dr. Shashank Srivastava Assistant Professor Department of Computer Science & Engineering Image Processing Department Building-First Floor Motilal Nehru National Institute of Technology Allahabad-211004,

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

CORE CLASSES: IS 6410 Information Systems Analysis and Design IS 6420 Database Theory and Design IS 6440 Networking & Servers (3)

CORE CLASSES: IS 6410 Information Systems Analysis and Design IS 6420 Database Theory and Design IS 6440 Networking & Servers (3) COURSE DESCRIPTIONS CORE CLASSES: Required IS 6410 Information Systems Analysis and Design (3) Modern organizations operate on computer-based information systems, from day-to-day operations to corporate

More information

Experimental Analysis of Privacy-Preserving Statistics Computation

Experimental Analysis of Privacy-Preserving Statistics Computation Experimental Analysis of Privacy-Preserving Statistics Computation Hiranmayee Subramaniam 1, Rebecca N. Wright 2, and Zhiqiang Yang 2 1 Stevens Institute of Technology graduate, hiran@polypaths.com. 2

More information

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing S.Hemalatha, Dr.R.Manickachezian Ph.D Research Scholar, Department of Computer Science, N.G.M College, Pollachi,

More information

COURSE TITLE COURSE DESCRIPTION

COURSE TITLE COURSE DESCRIPTION COURSE TITLE COURSE DESCRIPTION CS-00X COMPUTING EXIT INTERVIEW All graduating students are required to meet with their department chairperson/program director to finalize requirements for degree completion.

More information

Fall$2015$New$MS$Student$Information$

Fall$2015$New$MS$Student$Information$ Dear%New%MS%Student,% Fall$2015$New$MS$Student$Information$ Department$of$Computer$Science$ Welcome%to%the%Department%of%Computer%Science%at%ODU!%%We%are%excited%to%have%you%join%our%MS% program.%%we%have%developed%this%packet%to%help%you%with%your%transition%into%the%program.%%in%addition%

More information

Ranked Search over Encrypted Cloud Data using Multiple Keywords

Ranked Search over Encrypted Cloud Data using Multiple Keywords Ranked Search over Encrypted Cloud Data using Multiple Keywords [1] Nita Elizabeth Samuel, [2] Revathi B. R, [3] Sangeetha.M, [4] SreelekshmySelvin, [5] Dileep.V.K [1][2][3][4] LBS Institute of Technology

More information

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,

More information

M.S. in Computer Science 2009-2011

M.S. in Computer Science 2009-2011 Karim O. Elish Assistant Professor Department of Computer Science Indiana University-Purdue University Fort Wayne, IN 46805 kelish@purdue.edu http://people.cs.vt.edu/~kelish/ RESEARCH INTERESTS Software

More information

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013 Brent Lagesse, Ph.D. Computing and Software Systems Box 358534 18115 Campus Way NE Bothell, WA 98011-8246 425.352.5313 lagesse@uw.edu Summary Curriculum Vitae Employment I am a professor at the University

More information

Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )

Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 ) Curriculum Vitae Michael Tu Current Employment: (August, 2012 ) Assistant Professor Department of Computer Information Technology and Graphics School of Technology Purdue University Calumet Email: manghui.tu@purduecal.edu

More information

Yu-Han Chang. USC Information Sciences Institute 4676 Admiralty Way (617) 678-2486 Marina del Rey, CA 90292

Yu-Han Chang. USC Information Sciences Institute 4676 Admiralty Way (617) 678-2486 Marina del Rey, CA 90292 Yu-Han Chang USC Information Sciences Institute ychang@isi.edu 4676 Admiralty Way (617) 678-2486 Marina del Rey, CA 90292 Research Interests My research centers on learning in rich multi-agent environments.

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring 2009. Nitesh Saxena Polytechnic University

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring 2009. Nitesh Saxena Polytechnic University Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic University Outline Administrative Stuff Introductory Technical Stuff Some Pointers Course Web Page http://isis.poly.edu/courses/cs6903-s10

More information

Wayne State University Phone: 313-282-1912 5057 Woodward Avenue, Suite 3010 www.linkedin.com/in/sharrukhzaman

Wayne State University Phone: 313-282-1912 5057 Woodward Avenue, Suite 3010 www.linkedin.com/in/sharrukhzaman Sharrukh Zaman Department of Computer Science E-mail: sharrukh@wayne.edu Phone: 313-282-1912 5057 Woodward Avenue, Suite 3010 www.linkedin.com/in/sharrukhzaman, 48202 www.cs.wayne.edu/sharrukh Education,

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES 1 MANJOORULLASHA SHAIK, 2 SYED.ABDULHAQ, 3 P.BABU 1 PG SCHOLAR, CSE (CN), QCET, NELLORE 2,3 ASSOCIATE PROFESSOR, CSE, QCET, NELLORE

More information

Accelerated Undergraduate/Graduate (BS/MS) Dual Degree Program in Computer Science

Accelerated Undergraduate/Graduate (BS/MS) Dual Degree Program in Computer Science Accelerated Undergraduate/Graduate (BS/MS) Dual Degree Program in The BS degree in requires 126 semester hours and the MS degree in Computer Science requires 30 semester hours. Undergraduate majors who

More information

An Implementation of RSA Algorithm in Google Cloud using Cloud SQL

An Implementation of RSA Algorithm in Google Cloud using Cloud SQL Research Journal of Applied Sciences, Engineering and Technology 4(19): 3574-3579, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: January 26, 2012 Accepted: March 02, 2012 Published:

More information

Discover Viterbi: New Programs in Computer Science

Discover Viterbi: New Programs in Computer Science Discover Viterbi: New Programs in Computer Science Gaurav S. Sukhatme Professor and Chairman USC Computer Science Department Meghan McKenna Balding Graduate & Professional Programs April 23, 2013 WebEx

More information

Bob Boothe. Education. Research Interests. Teaching Experience

Bob Boothe. Education. Research Interests. Teaching Experience Bob Boothe Computer Science Dept. University of Southern Maine 96 Falmouth St. P.O. Box 9300 Portland, ME 04103--9300 (207) 780-4789 email: boothe@usm.maine.edu 54 Cottage Park Rd. Portland, ME 04103 (207)

More information

SECURED DATA STORAGE IN CLOUD

SECURED DATA STORAGE IN CLOUD International Journal of Information Technology & Management Information System (IJITMIS) Volume 6, Issue 2, July-December-2015, pp. 44-48, Article ID: IJITMIS_06_02_007 Available online at http://http://www.iaeme.com/issue.asp?jtype=ijitmis&vtype=6&itype=2

More information

Ahmed Metwally Google Inc. 1600 Amphitheatre Pkwy Mountain View, CA 94043 (805) 403-9725 ametwally@gmail.com

Ahmed Metwally Google Inc. 1600 Amphitheatre Pkwy Mountain View, CA 94043 (805) 403-9725 ametwally@gmail.com Education: Ahmed Metwally Google Inc. 1600 Amphitheatre Pkwy Mountain View, CA 94043 (805) 403-9725 ametwally@gmail.com 2002-2007: PhD; UC Santa Barbara, Department of Computer Science. Advisors: Prof.

More information

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT Merlin Shirly T 1, Margret Johnson 2 1 PG

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

Data-intensive HPC: opportunities and challenges. Patrick Valduriez

Data-intensive HPC: opportunities and challenges. Patrick Valduriez Data-intensive HPC: opportunities and challenges Patrick Valduriez Big Data Landscape Multi-$billion market! Big data = Hadoop = MapReduce? No one-size-fits-all solution: SQL, NoSQL, MapReduce, No standard,

More information

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD

More information

Languages Arabic and English (First language mastery) Persian (moderate comprehension) French and Spanish (took courses out of interest in languages)

Languages Arabic and English (First language mastery) Persian (moderate comprehension) French and Spanish (took courses out of interest in languages) Ahmed M. A. Oteafy, Ph.D. Assistant Professor of Electrical Engineering ESE Department College of Engineering Alfaisal University PO Box 50927 Riyadh 11533 Kingdom of Saudi Arabia E-mail: AOteafy@Alfaisal.edu

More information

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique

More information

Swiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg

Swiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg Swiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg 1 The MSc program in computer science Worldwide, computer scientists are in high demand. To cater for this demand,

More information

Agreement on. Dual Degree Master Program in Computer Science KAIST. Technische Universität Berlin

Agreement on. Dual Degree Master Program in Computer Science KAIST. Technische Universität Berlin Agreement on Dual Degree Master Program in Computer Science between KAIST Department of Computer Science and Technische Universität Berlin Fakultät für Elektrotechnik und Informatik (Fakultät IV) 1 1 Subject

More information

A Fully Homomorphic Encryption Implementation on Cloud Computing

A Fully Homomorphic Encryption Implementation on Cloud Computing International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 8 (2014), pp. 811-816 International Research Publications House http://www. irphouse.com A Fully Homomorphic

More information

Laura F. Boehm Vock. Voice: (715) 308-2405. Email: boehm@stolaf.edu Website: pages.stolaf.edu/boehm/

Laura F. Boehm Vock. Voice: (715) 308-2405. Email: boehm@stolaf.edu Website: pages.stolaf.edu/boehm/ Laura F. Boehm Vock Home Address 700 Douglas Avenue Apartment 703 Minneapolis, MN 55403 Voice: (715) 308-2405 University Address Department of Mathematics, Statistics and Computer Science St. Olaf College

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION Chandrala DN 1, Kulkarni Varsha 2 1 Chandrala DN, M.tech IV sem,department of CS&E, SVCE, Bangalore 2 Kulkarni Varsha, Asst. Prof.

More information

How To Get A Computer Science Degree

How To Get A Computer Science Degree MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008 Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report

More information

Teaching Scheme. Theory Practical Course Code L T P Credits Max. Min. Max. Min. ISE 10. -- -- 1MA201 Linear Algebra 3 1-4

Teaching Scheme. Theory Practical Course Code L T P Credits Max. Min. Max. Min. ISE 10. -- -- 1MA201 Linear Algebra 3 1-4 Teaching and for Second Year B.Tech Program in Information Technology I Semester With Effective from 201213 Theory Practical Scheme Marks Marks L T P Credits Max. Min. Max. Min. 1MA201 Linear Algebra 3

More information

Michael R. Clarkson Curriculum Vitae

Michael R. Clarkson Curriculum Vitae Michael R. Clarkson Curriculum Vitae February 20, 2015 Department of Computer Science Office phone: 607-255-0278 Cornell University Fax: 607-255-9143 461 Gates Hall clarkson@cs.cornell.edu 107 Hoy Road

More information

WEI CHEN. IT-enabled Innovation, Online Community, Open-Source Software, Startup Angel Funding, Interactive Marketing, SaaS Model

WEI CHEN. IT-enabled Innovation, Online Community, Open-Source Software, Startup Angel Funding, Interactive Marketing, SaaS Model WEI CHEN Rady School of Management University of California, San Diego 9500 Gilman Drive, MC 0553 La Jolla, CA 92093-0553 +1(858)337-5951 +1(858)534-0862 wei.chen@rady.ucsd.edu www.mrweichen.info RESEARCH

More information

Juliana V. Belding Department of Mathematics The University of Maryland College Park, MD 20742 jbelding@math.umd.edu www.math.umd.

Juliana V. Belding Department of Mathematics The University of Maryland College Park, MD 20742 jbelding@math.umd.edu www.math.umd. Juliana V. Belding Department of Mathematics The University of Maryland College Park, MD 20742 jbelding@math.umd.edu www.math.umd.edu/ jbelding EDUCATION Ph.D. in Mathematics, May 2008 (expected) University

More information

Trusted Public Auditing Process for Secure Cloud Storage

Trusted Public Auditing Process for Secure Cloud Storage Trusted Public Auditing Process for Secure Cloud Storage K.Adhiyaman 1, A. Jesudoss 2, D.Saravanan 3 1 Final Year MCA, Faculty of Computing, Department of MCA Sathyabama University, Chennai,Tamil Nadu,

More information

ST ALOYSIUS COLLEGE (AUTONOMOUS)

ST ALOYSIUS COLLEGE (AUTONOMOUS) ST ALOYSIUS COLLEGE (AUTONOMOUS) ALOYSIUS INSTITUTE OF MANAGEMENT & INFORMATION TECHNOLOGY MANGALORE, KARNATAKA Phone : 0824-2286890 6490299 e-mail : info@staloysius.ac.in SCHOOL OF INFORMATION TECHNOLOGY

More information

Study on Redundant Strategies in Peer to Peer Cloud Storage Systems

Study on Redundant Strategies in Peer to Peer Cloud Storage Systems Applied Mathematics & Information Sciences An International Journal 2011 NSP 5 (2) (2011), 235S-242S Study on Redundant Strategies in Peer to Peer Cloud Storage Systems Wu Ji-yi 1, Zhang Jian-lin 1, Wang

More information

Hui(Wendy) Wang Stevens Institute of Technology New Jersey, USA. VLDB Cloud Intelligence workshop, 2012

Hui(Wendy) Wang Stevens Institute of Technology New Jersey, USA. VLDB Cloud Intelligence workshop, 2012 Integrity Verification of Cloud-hosted Data Analytics Computations (Position paper) Hui(Wendy) Wang Stevens Institute of Technology New Jersey, USA 9/4/ 1 Data-Analytics-as-a- Service (DAaS) Outsource:

More information

Fengwei Zhang. Research Interest. Education. Employment History

Fengwei Zhang. Research Interest. Education. Employment History Fengwei Zhang Wayne State University 5057 Woodward Avenue, Suite 3010 Detroit, Michigan 48202 fengwei@wayne.edu http://fengwei.me Research Interest My primary research interests are in the areas of systems

More information

Office of the Provost

Office of the Provost Office of the Provost Change to an Existing Degree Program Form Proposed Change to an Existing Degree: Academic Components Please answer all relevant questions below. Consultation with the appropriate

More information

Data Security Using Reliable Re-Encryption in Unreliable Cloud

Data Security Using Reliable Re-Encryption in Unreliable Cloud ISSN (Online): 2277-5420 www.ijcsn.org Data Security Using Reliable Re-Encryption in Unreliable Cloud 328 1 Ajinkya Adhau, 2 Payal Bobade, 3 Priyanka Zilpe, 4 Yashodhara Fulmali 1, 2, 3, 4 Student, Department

More information

Adina Crainiceanu. Ph.D. in Computer Science, Cornell University, Ithaca, NY May 2006 Thesis Title: Answering Complex Queries in Peer-to-Peer Systems

Adina Crainiceanu. Ph.D. in Computer Science, Cornell University, Ithaca, NY May 2006 Thesis Title: Answering Complex Queries in Peer-to-Peer Systems Adina Crainiceanu Associate Professor Department of Computer Science United States Naval Academy 572M Holloway Road, Stop 9F Annapolis, MD 21402 http://www.usna.edu/users/cs/adina Email: adina@usna.edu

More information

Privacy & Security of Mobile Cloud Computing (MCC)

Privacy & Security of Mobile Cloud Computing (MCC) Privacy & Security of Mobile Cloud Computing (MCC) Manmohan Chaturvedi Principal Advisor Research & Technology Development Beyond Evolution Tech Solutions Pvt. Ltd. MOBILE COMPUTING CHALLENGES Mobile devices

More information

Master s Degree Programs. Global Technology Leadership

Master s Degree Programs. Global Technology Leadership Master s Degree Programs Global Technology Leadership Why BU? Consistently ranked among the most prestigious graduate engineering programs in the U.S. Study with the Best Work with renowned faculty and

More information

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer

More information

Sunnie Chung. Cleveland State University

Sunnie Chung. Cleveland State University Sunnie Chung Cleveland State University They are very new technologies to Computer Science in rise of Web Service on Internet (IoT) They were fast developed and fast evolving Research and Developments

More information

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3

More information

Education. Research Experience (Funded Projects)

Education. Research Experience (Funded Projects) Mark Floryan (540) 672-8850 mfloryan@cs.virginia.edu Department of Computer Science 85 Engineer's Way Charlottesville, VA 24018 Education University of Massachusetts: Amherst, MA Fall 2008 Spring 2013

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Surapriya Swain 1, Prof. Saurabh Gupta 2 1 Department of Computer Engineering, GSMCOE, Balewadi, Savitribai Phule

More information

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6 International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: editor@ijermt.org November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering

More information

DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT

DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT Security education is critical in today s cyber threat environment. Many schools have investigated different approaches to teaching fundamental

More information

Computer Science. General Education Students must complete the requirements shown in the General Education Requirements section of this catalog.

Computer Science. General Education Students must complete the requirements shown in the General Education Requirements section of this catalog. Computer Science Dr. Ilhyun Lee Professor Dr. Ilhyun Lee is a Professor of Computer Science. He received his Ph.D. degree from Illinois Institute of Technology, Chicago, Illinois (1996). He was selected

More information

Computer Science and Software Engineering

Computer Science and Software Engineering LT360, Topics in Latin: In-depth study of works not covered in earlier courses. This course is repeatable for credit. Prerequisites: LT203 and LT204, placement into the 300 level, or permission of instructor.

More information

A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment

A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment www.ijcsi.org 434 A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment V.THAVAVEL and S.SIVAKUMAR* Department of Computer Applications, Karunya University,

More information

Curriculum Vitae: Gideon Mazambani

Curriculum Vitae: Gideon Mazambani Contact: Curriculum Vitae: Gideon Mazambani Gideon Mazambani 801 Culver Street #109E Commerce, TX 75428 Email: gmazambani@yahoo.com Cell: 903-413-7557 Citizenship: Zimbabwean Education: 2011-Present (Expected

More information

Carl Burch. 1124 Clifton St mobile 501 499 9892 Conway AR 72034 3911. cburch@cburch.com http://www.cburch.com/ Education May 00

Carl Burch. 1124 Clifton St mobile 501 499 9892 Conway AR 72034 3911. cburch@cburch.com http://www.cburch.com/ Education May 00 Carl Burch 1124 Clifton St mobile 501 499 9892 Conway AR 72034 3911 cburch@cburch.com http://www.cburch.com/ Education May 00 May 98 May 95 Teaching Fall 04 present Fall 00 Spring 04 Summers 97 02 Spring

More information

GLORIA WASHINGTON, Ph.D. CONTACT: 202-640-3630 Email: gjwashi@gmail.com

GLORIA WASHINGTON, Ph.D. CONTACT: 202-640-3630 Email: gjwashi@gmail.com GLORIA WASHINGTON, Ph.D. CONTACT: 202-640-3630 Email: gjwashi@gmail.com EDUCATION: Ph.D. Computer Science, The George Washington University, Washington, DC, 2011 Research interests include human-computer

More information

Nicholas J. Hopper. Thesis title: Toward A Computational Theory of Steganography

Nicholas J. Hopper. Thesis title: Toward A Computational Theory of Steganography Nicholas J. Hopper Computer Science Department (412) 216 5023 hopper@cs.cmu.edu http://www.cs.cmu.edu/~hopper/ Research Interests Theoretical Computer Science, specializing in Theoretical Cryptography,

More information

Miriam Kuzbary miriam.kuzbary (at) rice (dot) edu

Miriam Kuzbary miriam.kuzbary (at) rice (dot) edu Miriam Kuzbary miriam.kuzbary (at) rice (dot) edu RESEARCH INTERESTS EDUCATION Knot and Link Concordance, Group Theory Ph.D. Mathematics. Fall 2012 - Present Advisor: Shelly Harvey B.S. Mathematical Sciences

More information

Ph.D. in Bioinformatics and Computational Biology Degree Requirements

Ph.D. in Bioinformatics and Computational Biology Degree Requirements Ph.D. in Bioinformatics and Computational Biology Degree Requirements Credits Students pursuing the doctoral degree in BCB must complete a minimum of 90 credits of relevant work beyond the bachelor s degree;

More information

Accelerated Bachelor of Science/Master of Science in Computer Science. Dual Degree Program

Accelerated Bachelor of Science/Master of Science in Computer Science. Dual Degree Program Accelerated Bachelor of Science/Master of Science in Computer Science 1 Dual Degree Program Definitions The discussion below uses the following definitions: o BS/MS program: The complete accelerated Bachelor

More information

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK International Journal of Advance Research In Science And Engineering IJARSE, Vol. No.4, Issue No.01, January 2015 http:// SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK Arudra Gopala Rao

More information

Global Soft Solutions JAVA IEEE PROJECT TITLES - 2015

Global Soft Solutions JAVA IEEE PROJECT TITLES - 2015 Global Soft Solutions No : 6, III Floor Chitra Complex Chatram Bus Stand Trichy 620 002 www.globalsoftsolutions.in Email : gsstrichy@gmail.com Ph : 0431 4544308 / Cell : 94431 22110 JAVA IEEE PROJECT TITLES

More information

Enhancement of Security in Distributed Data Mining

Enhancement of Security in Distributed Data Mining Enhancement of Security in Distributed Data Mining Sharda Darekar 1, Prof.D.K.Chitre, 2 1,2 Department Of Computer Engineering, Terna Engineering College,Nerul,Navi Mumbai. 1 sharda.darekar@gmail.com,

More information

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained

More information

AN EFFECTIVE STUDY ON IMPROVED DATA AUTHENTICATION IN CLOUD SYSTEM

AN EFFECTIVE STUDY ON IMPROVED DATA AUTHENTICATION IN CLOUD SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE AN EFFECTIVE STUDY ON IMPROVED DATA AUTHENTICATION IN CLOUD SYSTEM Bairu Ravi 1, B.Ramya 2 1 M.Tech Student, Dept of CSE, Arjun College

More information

Adam Anthony Baldwin-Wallace College Voice: (440) 826-2059 Department of Mathematics and Computer Science 275 Eastland Rd apanthon@bw.

Adam Anthony Baldwin-Wallace College Voice: (440) 826-2059 Department of Mathematics and Computer Science 275 Eastland Rd apanthon@bw. Adam Anthony Baldwin-Wallace College Voice: (440) 826-2059 Department of Mathematics and Computer Science 275 Eastland Rd apanthon@bw.edu Berea, OH 44017 http://www.bw.edu/ apanthon Updated July 16, 2012

More information

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,

More information

Hey! Cross Check on Computation in Cloud

Hey! Cross Check on Computation in Cloud Hey! Cross Check on Computation in Cloud Ajeet Singh Rajput Computer Science and Engineering Department S.D.B.C.T, Mhow Road,Indore,(M.P), India ajeetsinghrajput@gmail.com M.E.(CSE), S.D.B.C.T, Indore

More information

Welcome. Marios Papaefthymiou Professor and Chair Computer Science and Engineering

Welcome. Marios Papaefthymiou Professor and Chair Computer Science and Engineering New Faculty 2015-16 Welcome Computer Science and Engineering at the University of Michigan is thriving. Our undergraduate enrollments are at an all-time high and continue to grow, with triple the number

More information

Visual Analytics and Information Fusion

Visual Analytics and Information Fusion Visual Analytics and Information Fusion Data in many real world applications may arise from multiple sources, and can be viewed from different aspects. It is a significant analytical challenge to extract

More information

Computer Security Courses/Programs

Computer Security Courses/Programs Minneapolis, MN. Computer Security Courses/Programs Developed at Metropolitan State University Jigang Liu Department of Information and Computer Sciences College of Arts and Sciences Metropolitan State

More information

Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud

Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 2, November 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Enhanced Algorithm for Efficient Retrieval of Data from a Secure

More information