Search Results for author: Shantanu Sharma

Found 9 papers, 0 papers with code

Prism: Private Verifiable Set Computation over Multi-Owner Outsourced Databases

no code implementations7 Apr 2021 Yin Li, Dhrubajyoti Ghosh, Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma

This paper proposes Prism, a secret sharing based approach to compute private set operations (i. e., intersection and union), as well as aggregates over outsourced databases belonging to multiple owners.

Concealer: SGX-based Secure, Volume Hiding, and Verifiable Processing of Spatial Time-Series Datasets

no code implementations10 Feb 2021 Peeyush Gupta, Sharad Mehrotra, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang

This paper proposes a system, entitled Concealer that allows sharing time-varying spatial data (e. g., as produced by sensors) in encrypted form to an untrusted third-party service provider to provide location-based applications (involving aggregation queries over selected regions over time windows) to users.

Time Series

Panda: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data

no code implementations13 May 2020 Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Dhrubajyoti Ghosh, Peeyush Gupta

We, first, provide a new security definition, entitled partitioned data security for guaranteeing that the joint processing of non-sensitive data (in cleartext) and sensitive data (in encrypted form) does not lead to any leakage.

Quest: Practical and Oblivious Mitigation Strategies for COVID-19 using WiFi Datasets

no code implementations5 May 2020 Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang

In this paper, we introduce Quest, a system that empowers organizations to observe individuals and spaces to implement policies for social distancing and contact tracing using WiFi connectivity data in a passive and privacy-preserving manner.

Privacy Preserving

Canopy: A Verifiable Privacy-Preserving Token Ring based Communication Protocol for Smart Homes

no code implementations8 Apr 2020 Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian

Specifically, the paper focuses on inferring the user's activities -- which may, in turn, lead to the user's privacy -- via inferences through device activities and network traffic analysis.

Privacy Preserving

IoT Notary: Sensor Data Attestation in Smart Environment

no code implementations27 Aug 2019 Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani

Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems.

Verifiable Round-Robin Scheme for Smart Homes

no code implementations24 Jan 2019 Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian

This paper focuses on the new challenges of privacy that arise in IoT in the context of smart homes.

Cryptography and Security Networking and Internet Architecture

Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data

no code implementations20 Dec 2018 Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Anurag Mishra

Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge.

Cannot find the paper you are looking for? You can Submit a new open access paper.