no code implementations • 24 Jan 2019 • Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian
This paper focuses on the new challenges of privacy that arise in IoT in the context of smart homes.
Cryptography and Security Networking and Internet Architecture
no code implementations • 27 Aug 2019 • Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani
Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems.
no code implementations • 8 Apr 2020 • Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian
Specifically, the paper focuses on inferring the user's activities -- which may, in turn, lead to the user's privacy -- via inferences through device activities and network traffic analysis.
no code implementations • 27 Apr 2020 • Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Sumaya Almanee
Despite exciting progress on cryptography, secure and efficient query processing over outsourced data remains an open challenge.
no code implementations • 5 May 2020 • Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang
In this paper, we introduce Quest, a system that empowers organizations to observe individuals and spaces to implement policies for social distancing and contact tracing using WiFi connectivity data in a passive and privacy-preserving manner.
no code implementations • 7 Apr 2021 • Yin Li, Dhrubajyoti Ghosh, Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma
This paper proposes Prism, a secret sharing based approach to compute private set operations (i. e., intersection and union), as well as aggregates over outsourced databases belonging to multiple owners.