This paper proposes Prism, a secret sharing based approach to compute private set operations (i. e., intersection and union), as well as aggregates over outsourced databases belonging to multiple owners.
This paper proposes a system, entitled Concealer that allows sharing time-varying spatial data (e. g., as produced by sensors) in encrypted form to an untrusted third-party service provider to provide location-based applications (involving aggregation queries over selected regions over time windows) to users.
We, first, provide a new security definition, entitled partitioned data security for guaranteeing that the joint processing of non-sensitive data (in cleartext) and sensitive data (in encrypted form) does not lead to any leakage.
In this paper, we introduce Quest, a system that empowers organizations to observe individuals and spaces to implement policies for social distancing and contact tracing using WiFi connectivity data in a passive and privacy-preserving manner.
Despite exciting progress on cryptography, secure and efficient query processing over outsourced data remains an open challenge.
We present Sieve, a layered approach of implementing FGAC in existing database systems, that exploits a variety of it's features such as UDFs, index usage hints, query explain; to scale to large number of policies.
Specifically, the paper focuses on inferring the user's activities -- which may, in turn, lead to the user's privacy -- via inferences through device activities and network traffic analysis.
Complex networks represented as node adjacency matrices constrains the application of machine learning and parallel algorithms.
Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems.
In this paper, we redefine the problem as question-answer extraction, and present SAMIE: Self-Asking Model for Information Ixtraction, a semi-supervised model which dually learns to ask and to answer questions by itself.
This paper focuses on the new challenges of privacy that arise in IoT in the context of smart homes.
Cryptography and Security Networking and Internet Architecture
Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge.