no code implementations • 10 Feb 2021 • Peeyush Gupta, Sharad Mehrotra, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang
This paper proposes a system, entitled Concealer that allows sharing time-varying spatial data (e. g., as produced by sensors) in encrypted form to an untrusted third-party service provider to provide location-based applications (involving aggregation queries over selected regions over time windows) to users.
no code implementations • 5 May 2020 • Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang
In this paper, we introduce Quest, a system that empowers organizations to observe individuals and spaces to implement policies for social distancing and contact tracing using WiFi connectivity data in a passive and privacy-preserving manner.
no code implementations • 8 Apr 2020 • Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian
Specifically, the paper focuses on inferring the user's activities -- which may, in turn, lead to the user's privacy -- via inferences through device activities and network traffic analysis.
no code implementations • 27 Aug 2019 • Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani
Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems.
no code implementations • 24 Jan 2019 • Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian
This paper focuses on the new challenges of privacy that arise in IoT in the context of smart homes.
Cryptography and Security Networking and Internet Architecture