Computationally volume-hiding structured encryption

S Kamara, T Moataz - Advances in Cryptology–EUROCRYPT 2019: 38th …, 2019 - Springer
We initiate the study of structured encryption schemes with computationally-secure leakage.
Specifically, we focus on the design of volume-hiding encrypted multi-maps; that is, of …

Structured encryption and leakage suppression

S Kamara, T Moataz, O Ohrimenko - … , Santa Barbara, CA, USA, August 19 …, 2018 - Springer
Structured encryption (STE) schemes encrypt data structures in such a way that they can be
privately queried. One aspect of STE that is still poorly understood is its leakage. In this work …

Secure and efficient distributed network provenance for IoT: A blockchain-based approach

D Liu, J Ni, C Huang, X Lin… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Network provenance is essential for Internet-of-Things (IoT) network administrators to
conduct the network diagnostics and identify root causes of network errors. However, the …

Privacy preservation in online social networks using multiple-graph-properties-based clustering to ensure k-anonymity, l-diversity, and t-closeness

R Gangarde, A Sharma, A Pawar, R Joshi, S Gonge - Electronics, 2021 - mdpi.com
As per recent progress, online social network (OSN) users have grown tremendously
worldwide, especially in the wake of the COVID-19 pandemic. Today, OSNs have become a …

ProvNet: Networked bi-directional blockchain for data sharing with verifiable provenance

C Chenli, W Tang, F Gomulka, T Jung - Journal of Parallel and Distributed …, 2022 - Elsevier
Data sharing is increasingly popular especially for scientific research and business fields
where large volume of datasets need to be used, but it involves data security and privacy …

Data provenance in security and privacy

B Pan, N Stakhanova, S Ray - ACM Computing Surveys, 2023 - dl.acm.org
Provenance information corresponds to essential metadata that describes the entities, users,
and processes involved in the history and evolution of a data object. The benefits of tracking …

Secure data streaming to untrusted road side units in intelligent transportation system

A Jolfaei, K Kant, H Shafei - … On Trust, Security And Privacy In …, 2019 - ieeexplore.ieee.org
The paper considers data security issues in vehicle-to-infrastructure communications, where
vehicles stream data to a road side unit. We assume aggregated data in road side units can …

Encrypted databases for differential privacy

A Agarwal, M Herlihy, S Kamara… - Proceedings on Privacy …, 2019 - petsymposium.org
The problem of privatizing statistical databases is a well-studied topic that has culminated
with the notion of differential privacy. The complementary problem of securing these …

Data security in multiparty edge computing environments

A Jolfaei, K Kant - Government Microcircuit Applications & …, 2019 - researchers.mq.edu.au
The paper considers data security issues in edge computing scenarios that involve data
streams coming out from individual devices to edge controllers (ECs). We assume multiple …

[PDF][PDF] Enhanced clustering based OSN privacy preservation to ensure k-anonymity, t-closeness, l-diversity, and balanced privacy utility

R Gangarde, A Sharma, A Pawar - Computers, Materials and …, 2023 - researchgate.net
Online Social Networks (OSN) sites allow end-users to share a great deal of information,
which may also contain sensitive information, that may be subject to commercial or non …