Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Privacy-Preserving And Outsourced Multi-User K-Means Clustering, Bharath Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, Dangxi Liu Dec 2014

Privacy-Preserving And Outsourced Multi-User K-Means Clustering, Bharath Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, Dangxi Liu

Cyber Center Publications

Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources. As a result, such entities may want to refrain from participating in the PPDM process. To overcome this issue and to take many other benefits of cloud computing, outsourcing PPDM tasks to the cloud environment has recently gained special attention. We consider the scenario where n entities outsource their databases (in encrypted format) to the cloud and ask the cloud to perform the clustering task on their …


Poster: Protecting Against Data Exfiltration Insider Attacks Through Application Programs, Asmaa Mohamed Sallama, Elisa Bertino Nov 2014

Poster: Protecting Against Data Exfiltration Insider Attacks Through Application Programs, Asmaa Mohamed Sallama, Elisa Bertino

Cyber Center Publications

In this paper, we describe a system that distinguishes be- tween legitimate and malicious database transactions per- formed by application programs. Our system is particularly useful for protecting against code-modification attacks performed by insiders who have access to and can change the programs' source code to make them execute different queries than those they are expected to execute. Our system works with any type of DBMS and requires minimum modification to application programs.


An Efficient Certificateless Encryption For Secure Data Sharing In Public Clouds, Seung-Hyun Seo, Mohamed Yoosuf Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino Sep 2014

An Efficient Certificateless Encryption For Secure Data Sharing In Public Clouds, Seung-Hyun Seo, Mohamed Yoosuf Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino

Cyber Center Publications

We propose a mediated certificateless encryption scheme without pairing operations for securely sharing sensitive information in public clouds. Mediated certificateless public key encryption (mCL-PKE) solves the key escrow problem in identity based encryption and certificate revocation problem in public key cryptography. However, existing mCL-PKE schemes are either inefficient because of the use of expensive pairing operations or vulnerable against partial decryption attacks. In order to address the performance and security issues, in this paper, we first propose a mCL-PKE scheme without using pairing operations. We apply our mCL-PKE scheme to construct a practical solution to the problem of sharing sensitive …


Draft Genome Sequence Of Acetobacter Aceti Strain 1023, A Vinegar Factory Isolate, John Hung, Christopher Mill, Sandra Clifton, Vincent Magrini, Ketaki Bhide, Julie Francois, Aaron Ransome, Lucinda Fulton, Jyothi Thimmapuram, Richard Wilson, T. Joseph Kappock Jun 2014

Draft Genome Sequence Of Acetobacter Aceti Strain 1023, A Vinegar Factory Isolate, John Hung, Christopher Mill, Sandra Clifton, Vincent Magrini, Ketaki Bhide, Julie Francois, Aaron Ransome, Lucinda Fulton, Jyothi Thimmapuram, Richard Wilson, T. Joseph Kappock

Cyber Center Publications

The genome sequence of Acetobacter aceti 1023, an acetic acid bacterium adapted to traditional vinegar fermentation, comprises 3.0 Mb (chromosome plus plasmids). A. aceti 1023 is closely related to the cocoa fermenter Acetobacter pasteurianus 386B but possesses many additional insertion sequence elements.


A Practical Approach For Provenance Transmission In Wireless Sensor Networks, S.M. Iftekharul Alam, Sonia Fahmy May 2014

A Practical Approach For Provenance Transmission In Wireless Sensor Networks, S.M. Iftekharul Alam, Sonia Fahmy

Cyber Center Publications

Assessing the trustworthiness of sensor data and transmitters of this data is critical for quality assurance. Trust evaluation frameworks utilize data provenance along with the sensed data values to compute the trustworthiness of each data item. However, in a sizeable multi-hop sensor network, provenance information requires a large and variable number of bits in each packet, resulting in high energy dissipation due to the extended period of radio communication. In this paper, we design energy-efficient provenance encoding and construction schemes, which we refer to as Probabilistic Provenance Flow (PPF). Our work demonstrates the feasibility of adapting the Probabilistic Packet Marking …


Security Of Graph Data: Hashing Schemes And Definitions, Muhammad U. Arshad, Ashish Kundu, Elisa Bertino, Krishna Madhavan, Arif Ghafoor Mar 2014

Security Of Graph Data: Hashing Schemes And Definitions, Muhammad U. Arshad, Ashish Kundu, Elisa Bertino, Krishna Madhavan, Arif Ghafoor

Cyber Center Publications

Use of graph-structured data models is on the rise - in graph databases, in representing biological and healthcare data as well as geographical data. In order to secure graph-structured data, and develop cryptographically secure schemes for graph databases, it is essential to formally define and develop suitable collision resistant one-way hashing schemes and show them they are efficient. The widely used Merkle hash technique is not suitable as it is, because graphs may be directed acyclic ones or cyclic ones. In this paper, we are addressing this problem. Our contributions are: (1) define the practical and formal security model of …


Randomized And Efficient Authentication In Mobile Environments, Wei Jiang, Dan Lin, Feng Li, Elisa Bertino Feb 2014

Randomized And Efficient Authentication In Mobile Environments, Wei Jiang, Dan Lin, Feng Li, Elisa Bertino

Cyber Center Publications

In a mobile environment, a number of users act as a network nodes and communicate with one another to acquire location based information and services. This emerging paradigm has opened up new business opportunities and enables numerous applications such as road safety enhancement, service recommendations and mobile entertainment. A fundamental issue that impacts the success of these applications is the security and privacy concerns raised regarding the mobile users. In that, a malicious user or service provider can track the locations of a user traveled so that other malicious act can be carried out more effectively against the user. Therefore, …


Identidroid: Android Can Finally Wear Its Anonymous Suit, Bilal Shebaro, Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino Jan 2014

Identidroid: Android Can Finally Wear Its Anonymous Suit, Bilal Shebaro, Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino

Cyber Center Publications

Because privacy today is a major concern for mobile applications, network anonymizers are widely available on smartphones, such as Android. However despite the use of such anonymizers, in many cases applications are still able to identify the user and the device by different means than the IP address. The reason is that very often applications require device services and information that go beyond the capabilities of anonymous networks in protecting users’ identity and privacy. In this paper, we propose two solutions that address this problem. The first solution is based on an approach that shadows user and application data, device …