Search Results for author: Sharad Mehrotra

Found 12 papers, 1 papers with code

Prism: Private Verifiable Set Computation over Multi-Owner Outsourced Databases

no code implementations7 Apr 2021 Yin Li, Dhrubajyoti Ghosh, Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma

This paper proposes Prism, a secret sharing based approach to compute private set operations (i. e., intersection and union), as well as aggregates over outsourced databases belonging to multiple owners.

Concealer: SGX-based Secure, Volume Hiding, and Verifiable Processing of Spatial Time-Series Datasets

no code implementations10 Feb 2021 Peeyush Gupta, Sharad Mehrotra, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang

This paper proposes a system, entitled Concealer that allows sharing time-varying spatial data (e. g., as produced by sensors) in encrypted form to an untrusted third-party service provider to provide location-based applications (involving aggregation queries over selected regions over time windows) to users.

Time Series

Panda: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data

no code implementations13 May 2020 Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Dhrubajyoti Ghosh, Peeyush Gupta

We, first, provide a new security definition, entitled partitioned data security for guaranteeing that the joint processing of non-sensitive data (in cleartext) and sensitive data (in encrypted form) does not lead to any leakage.

Quest: Practical and Oblivious Mitigation Strategies for COVID-19 using WiFi Datasets

no code implementations5 May 2020 Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang

In this paper, we introduce Quest, a system that empowers organizations to observe individuals and spaces to implement policies for social distancing and contact tracing using WiFi connectivity data in a passive and privacy-preserving manner.

Privacy Preserving

Sieve: A Middleware Approach to Scalable Access Control for Database Management Systems

1 code implementation16 Apr 2020 Primal Pappachan, Roberto Yus, Sharad Mehrotra, Johann-Christoph Freytag

We present Sieve, a layered approach of implementing FGAC in existing database systems, that exploits a variety of it's features such as UDFs, index usage hints, query explain; to scale to large number of policies.

Databases

Canopy: A Verifiable Privacy-Preserving Token Ring based Communication Protocol for Smart Homes

no code implementations8 Apr 2020 Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian

Specifically, the paper focuses on inferring the user's activities -- which may, in turn, lead to the user's privacy -- via inferences through device activities and network traffic analysis.

Privacy Preserving

Network2Vec Learning Node Representation Based on Space Mapping in Networks

no code implementations23 Oct 2019 Huang Zhenhua, Wang Zhenyu, Zhang Rui, Zhao Yangyang, Xie Xiaohui, Sharad Mehrotra

Complex networks represented as node adjacency matrices constrains the application of machine learning and parallel algorithms.

General Classification Link Prediction +2

IoT Notary: Sensor Data Attestation in Smart Environment

no code implementations27 Aug 2019 Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani

Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems.

Semi-Supervised Few-Shot Learning for Dual Question-Answer Extraction

no code implementations8 Apr 2019 Jue Wang, Ke Chen, Lidan Shou, Sai Wu, Sharad Mehrotra

In this paper, we redefine the problem as question-answer extraction, and present SAMIE: Self-Asking Model for Information Ixtraction, a semi-supervised model which dually learns to ask and to answer questions by itself.

Few-Shot Learning

Verifiable Round-Robin Scheme for Smart Homes

no code implementations24 Jan 2019 Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian

This paper focuses on the new challenges of privacy that arise in IoT in the context of smart homes.

Cryptography and Security Networking and Internet Architecture

Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data

no code implementations20 Dec 2018 Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Anurag Mishra

Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge.

Cannot find the paper you are looking for? You can Submit a new open access paper.