Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Physical Sciences and Mathematics

Attribute-Based Fine-Grained Access Control For Outscored Private Set Intersection Computation, Mohammad Ali, Mohajeri Javad, Mohammad-Reza Sadeghi, Ximeng Liu Oct 2020

Attribute-Based Fine-Grained Access Control For Outscored Private Set Intersection Computation, Mohammad Ali, Mohajeri Javad, Mohammad-Reza Sadeghi, Ximeng Liu

Research Collection School Of Computing and Information Systems

Private set intersection (PSI) is a fundamental cryptographic protocol which has a wide range of applications. It enables two clients to compute the intersection of their private datasets without revealing non-matching elements. The advent of cloud computing drives the ambition to reduce computation and data management overhead by outsourcing such computations. However, since the cloud is not trustworthy, some cryptographic methods should be applied to maintain the confidentiality of datasets. But, in doing so, data owners may be excluded from access control on their outsourced datasets. Therefore, to control access rights and to interact with authorized users, they have to …


Efficient Fine-Grained Data Sharing Mechanism For Electronic Medical Record Systems With Mobile Devices, Hui Ma, Rui Zhang, Guomin Yang, Zishuai Zong, Kai He, Yuting Xiao Sep 2020

Efficient Fine-Grained Data Sharing Mechanism For Electronic Medical Record Systems With Mobile Devices, Hui Ma, Rui Zhang, Guomin Yang, Zishuai Zong, Kai He, Yuting Xiao

Research Collection School Of Computing and Information Systems

Sharing digital medical records on public cloud storage via mobile devices facilitates patients (doctors) to get (offer) medical treatment of high quality and efficiency. However, challenges such as data privacy protection, flexible data sharing, efficient authority delegation, computation efficiency optimization, are remaining toward achieving practical fine-grained access control in the Electronic Medical Record (EMR) system. In this work, we propose an innovative access control model and a fine-grained data sharing mechanism for EMR, which simultaneously achieves the above-mentioned features and is suitable for resource-constrained mobile devices. In the model, complex computation is outsourced to public cloud servers, leaving almost no …


Attribute-Based Encryption For Cloud Computing Access Control: A Survey, Yinghui Zhang, Robert H. Deng, Shengmin Xu, Jianfei Sun, Qi Li, Dong Zheng Sep 2020

Attribute-Based Encryption For Cloud Computing Access Control: A Survey, Yinghui Zhang, Robert H. Deng, Shengmin Xu, Jianfei Sun, Qi Li, Dong Zheng

Research Collection School Of Computing and Information Systems

Attribute-based encryption (ABE) for cloud computing access control is reviewed in this article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the taxonomy, ABE schemes are assorted into key-policy ABE (KP-ABE) schemes, ciphertext-policy ABE (CP-ABE) schemes, anti-quantum ABE schemes, and generic constructions. In accordance with cryptographically functional features, CP-ABE is further divided into nine subcategories with regard to basic functionality, revocation, accountability, policy hiding, policy updating, multi-authority, hierarchy, offline computation, and outsourced computation. In addition, a systematical methodology for discussing and comparing existing ABE schemes is proposed. For KP-ABE and each type of CP-ABE, the corresponding …


An Extended Framework Of Privacy-Preserving Computation With Flexible Access Control, Wenxiu Ding, Rui Hu, Zheng Yan, Xinren Qian, Robert H. Deng, Laurence T. Yang, Mianxiong Dong Jun 2020

An Extended Framework Of Privacy-Preserving Computation With Flexible Access Control, Wenxiu Ding, Rui Hu, Zheng Yan, Xinren Qian, Robert H. Deng, Laurence T. Yang, Mianxiong Dong

Research Collection School Of Computing and Information Systems

Cloud computing offers various services based on outsourced data by utilizing its huge volume of resources and great computation capability. However, it also makes users lose full control over their data. To avoid the leakage of user data privacy, encrypted data are preferred to be uploaded and stored in the cloud, which unfortunately complicates data analysis and access control. In particular, few existing works consider the fine-grained access control over the computational results from ciphertexts. Though our previous work proposed a framework to support several basic computations (such as addition, multiplication and comparison) with flexible access control, privacy-preserving division calculations …


Editing-Enabled Signatures: A New Tool For Editing Authenticated Data, Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng Jun 2020

Editing-Enabled Signatures: A New Tool For Editing Authenticated Data, Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng

Research Collection School Of Computing and Information Systems

Data authentication primarily serves as a tool to achieve data integrity and source authentication. However, traditional data authentication does not fit well where an intermediate entity (editor) is required to modify the authenticated data provided by the source/data owner before sending the data to other recipients. To ask the data owner for authenticating each modified data can lead to higher communication overhead. In this article, we introduce the notion of editing-enabled signatures where the data owner can choose any set of modification operations applicable on the data and still can restrict any possibly untrusted editor to authenticate the data modified …


Ml-Medic: A Preliminary Study Of An Interactive Visual Analysis Tool Facilitating Clinical Applications Of Machine Learning For Precision Medicine, Laura Stevens, David Kao, Jennifer Hall, Carsten Görg, Kaitlyn Abdo, Erik Linstead May 2020

Ml-Medic: A Preliminary Study Of An Interactive Visual Analysis Tool Facilitating Clinical Applications Of Machine Learning For Precision Medicine, Laura Stevens, David Kao, Jennifer Hall, Carsten Görg, Kaitlyn Abdo, Erik Linstead

Engineering Faculty Articles and Research

Accessible interactive tools that integrate machine learning methods with clinical research and reduce the programming experience required are needed to move science forward. Here, we present Machine Learning for Medical Exploration and Data-Inspired Care (ML-MEDIC), a point-and-click, interactive tool with a visual interface for facilitating machine learning and statistical analyses in clinical research. We deployed ML-MEDIC in the American Heart Association (AHA) Precision Medicine Platform to provide secure internet access and facilitate collaboration. ML-MEDIC’s efficacy for facilitating the adoption of machine learning was evaluated through two case studies in collaboration with clinical domain experts. A domain expert review was also …


A 2020 Perspective On "Client Risk Informedness In Brokered Cloud Services: An Experimental Pricing Study", Di Shang, Robert J. Kauffman May 2020

A 2020 Perspective On "Client Risk Informedness In Brokered Cloud Services: An Experimental Pricing Study", Di Shang, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

Cloud computing and the cloud services market have advanced in the past ten years. Cloud services now include most information technology (IT) services from fundamental computing services to more cutting- edge artificial intelligence (AI) services. Accordingly, opportunities have emerged for research on the design of new market features to improve the cloud services market to benefit providers and users. Based on our observation of the recent development of cloud services, in this short research commentary, we share our agenda for future studies of this important sector of IT services.


A Fully Distributed Hierarchical Attribute-Based Encryption Scheme, Ali Mohammad, Javad Mohajeri, Ximeng Liu, Ximeng Liu May 2020

A Fully Distributed Hierarchical Attribute-Based Encryption Scheme, Ali Mohammad, Javad Mohajeri, Ximeng Liu, Ximeng Liu

Research Collection School Of Computing and Information Systems

With the development of cloud computing, many enterprises have been interested in outsourcing their data to cloud servers to decrease IT costs and rise capabilities of provided services. To afford confidentiality and fine-grained data access control, attribute-based encryption (ABE) was proposed and used in several cloud storage systems. However, scalability and flexibility in key delegation and user revocation mechanisms are primary issues in ABE systems. In this paper, we introduce the concept of a fully distributed revocable ciphertext-policy hierarchical ABE (FDR-CP-HABE) and design the first FDR-CP-HABE scheme. Our scheme offers a high level of flexibility and scalability in the key …


Csci 49378: Final Project Assignment: Distributed Systems And Cloud Computing, Bonan Liu, Nyc Tech-In-Residence Corps Apr 2020

Csci 49378: Final Project Assignment: Distributed Systems And Cloud Computing, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Final Project Assignment for the course: "CSCI 49378: Intro to Distributed Systems and Cloud Computing" delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 10: Cloud Storage And Databases Ii, Bonan Liu, Nyc Tech-In-Residence Corps Apr 2020

Csci 49378: Lecture 10: Cloud Storage And Databases Ii, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Cloud Storage and Databases II" (Week Ten) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 7: Cloud Systems And Infrastructures I, Bonan Liu, Nyc Tech-In-Residence Corps Apr 2020

Csci 49378: Lecture 7: Cloud Systems And Infrastructures I, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Cloud Systems and Infrastructures I" (Week Seven) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 11: Logging, Monitoring, And Advanced Topics, Bonan Liu, Nyc Tech-In-Residence Corps Apr 2020

Csci 49378: Lecture 11: Logging, Monitoring, And Advanced Topics, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Logging, Monitoring, and Advanced Topics" (Week Eleven) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 8: Cloud Systems And Infrastructures Ii, Bonan Liu, Nyc Tech-In-Residence Corps Apr 2020

Csci 49378: Lecture 8: Cloud Systems And Infrastructures Ii, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Cloud Systems and Infrastructures II" (Week Eight) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 6: Cloud Computing Concepts, Bonan Liu, Nyc Tech-In-Residence Corps Apr 2020

Csci 49378: Lecture 6: Cloud Computing Concepts, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Cloud Computing Concepts" (Week Six) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 9: Cloud Storage And Databases I, Bonan Liu, Nyc Tech-In-Residence Corps Apr 2020

Csci 49378: Lecture 9: Cloud Storage And Databases I, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Cloud Storage and Databases I" (Week Nine) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Identity-Based Encryption Transformation For Flexible Sharing Of Encrypted Data In Public Cloud, Robert H. Deng, Zheng Qin, Qianhong Wu, Zhenyu Guan, Robert H. Deng, Yujue Wang, Yunya Zhou Apr 2020

Identity-Based Encryption Transformation For Flexible Sharing Of Encrypted Data In Public Cloud, Robert H. Deng, Zheng Qin, Qianhong Wu, Zhenyu Guan, Robert H. Deng, Yujue Wang, Yunya Zhou

Research Collection School Of Computing and Information Systems

With the rapid development of cloud computing, an increasing number of individuals and organizations are sharing data in the public cloud. To protect the privacy of data stored in the cloud, a data owner usually encrypts his data in such a way that certain designated data users can decrypt the data. This raises a serious problem when the encrypted data needs to be shared to more people beyond those initially designated by the data owner. To address this problem, we introduce and formalize an identity-based encryption transformation (IBET) model by seamlessly integrating two well-established encryption mechanisms, namely identity-basedencryption (IBE) and …


Privacy-Preserving Data Processing With Flexible Access Control, Wenxiu Ding, Zheng Yan, Robert H. Deng Mar 2020

Privacy-Preserving Data Processing With Flexible Access Control, Wenxiu Ding, Zheng Yan, Robert H. Deng

Research Collection School Of Computing and Information Systems

Cloud computing provides an efficient and convenient platform for cloud users to store, process and control their data. Cloud overcomes the bottlenecks of resource-constrained user devices and greatly releases their storage and computing burdens. However, due to the lack of full trust in cloud service providers, the cloud users generally prefer to outsource their sensitive data in an encrypted form, which, however, seriously complicates data processing, analysis, as well as access control. Homomorphic encryption (HE) as a single key system cannot flexibly control data sharing and access after encrypted data processing. How to realize various computations over encrypted data in …


Iot Based Virtual Reality Game For Physio-Therapeutic Patients, K. Martin Sagayam, Shibin D, Helen Dang, Mohd Helmy Abd Wahab, Radzi Ambar Jan 2020

Iot Based Virtual Reality Game For Physio-Therapeutic Patients, K. Martin Sagayam, Shibin D, Helen Dang, Mohd Helmy Abd Wahab, Radzi Ambar

Faculty Works: MCS (1984-2023)

Biofeedback therapy trains the patient to control voluntarily the involuntary process of their body. This non-invasive and non-drug treatment is also used as a means to rehabilitate the physical impairments that may follow a stroke, a traumatic brain injury or even in neurological aspects within occupational therapy. The idea behind this study is based on using immersive gaming as a tool for physical rehabilitation that combines the idea of biofeedback and physical computing to get a patient emotionally involved in a game that requires them to do the exercises in order to interact with the game. This game is aimed …


Pgas: Privacy-Preserving Graph Encryption For Accurate Constrained Shortest Distance Queries, Can Zhang, Liehuang Zhu, Kashif Sharif, Chuan Zhang, Ximeng Liu Jan 2020

Pgas: Privacy-Preserving Graph Encryption For Accurate Constrained Shortest Distance Queries, Can Zhang, Liehuang Zhu, Kashif Sharif, Chuan Zhang, Ximeng Liu

Research Collection School Of Computing and Information Systems

The constrained shortest distance (CSD) query is used to determine the shortest distance between two vertices of a graph while ensuring that the total cost remains lower than a given threshold. The virtually unlimited storage and processing capabilities of cloud computing have enabled the graph owners to outsource their graph data to cloud servers. However, it may introduce privacy challenges that are difficult to address. In recent years, some relevant schemes that support the shortest distance query on the encrypted graph have been proposed. Unfortunately, some of them have unacceptable query accuracy, and some of them leak sensitive information that …


Ai Techniques For Covid-19, Adedoyin Ahmed Hussain, Ouns Bouachir, Fadi Al-Turjman, Moayad Aloqaily Jan 2020

Ai Techniques For Covid-19, Adedoyin Ahmed Hussain, Ouns Bouachir, Fadi Al-Turjman, Moayad Aloqaily

All Works

© 2013 IEEE. Artificial Intelligence (AI) intent is to facilitate human limits. It is getting a standpoint on human administrations, filled by the growing availability of restorative clinical data and quick progression of insightful strategies. Motivated by the need to highlight the need for employing AI in battling the COVID-19 Crisis, this survey summarizes the current state of AI applications in clinical administrations while battling COVID-19. Furthermore, we highlight the application of Big Data while understanding this virus. We also overview various intelligence techniques and methods that can be applied to various types of medical information-based pandemic. We classify the …


Scalable And Secure Big Data Iot System Based On Multifactor Authentication And Lightweight Cryptography, Saleh Atiewi, Amer Al-Rahayfeh, Muder Almiani, Salman Yussof, Omar Alfandi, Ahed Abugabah, Yaser Jararweh Jan 2020

Scalable And Secure Big Data Iot System Based On Multifactor Authentication And Lightweight Cryptography, Saleh Atiewi, Amer Al-Rahayfeh, Muder Almiani, Salman Yussof, Omar Alfandi, Ahed Abugabah, Yaser Jararweh

All Works

© 2013 IEEE. Organizations share an evolving interest in adopting a cloud computing approach for Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology is considered as an effective approach to storing and managing the enormous amount of data generated by various devices. However, big data security of these organizations presents a challenge in the IoT-cloud architecture. To overcome security issues, we propose a cloud-enabled IoT environment supported by multifactor authentication and lightweight cryptography encryption schemes to protect big data system. The proposed hybrid cloud environment is aimed at protecting organizations' data in a highly secure manner. …


How Location-Aware Access Control Affects User Privacy And Security In Cloud Computing Systems, Wen Zeng, Reem Bashir, Trevor Wood, Francois Siewe, Helge Janicke, Isabel Wagner Jan 2020

How Location-Aware Access Control Affects User Privacy And Security In Cloud Computing Systems, Wen Zeng, Reem Bashir, Trevor Wood, Francois Siewe, Helge Janicke, Isabel Wagner

Research outputs 2014 to 2021

The use of cloud computing (CC) is rapidly increasing due to the demand for internet services and communications. The large number of services and data stored in the cloud creates security risks due to the dynamic movement of data, connected devices and users between various cloud environments. In this study, we will develop an innovative prototype for location-aware access control and data privacy for CC systems. We will apply location-aware access control policies to role-based access control of Cloud Foundry, and then analyze the impact on user privacy after implementing these policies. This innovation can be used to address the …


Scalable, Adaptable And Fast Estimation Of Transient Downtime In Virtual Infrastructures Using Convex Decomposition And Sample Path Randomization, Zhiling Guo, Jin Li, Ram Ramesh Jan 2020

Scalable, Adaptable And Fast Estimation Of Transient Downtime In Virtual Infrastructures Using Convex Decomposition And Sample Path Randomization, Zhiling Guo, Jin Li, Ram Ramesh

Research Collection School Of Computing and Information Systems

Network function virtualization enables efficient cloud-resource planning by virtualizing network services and applications into software running on commodity servers. A cloud-service provider needs to manage and ensure service availability of a network of concurrent virtualized network functions (VNFs). The downtime distribution of a network of VNFs can be estimated using sample-path randomization on the underlying birth–death process. An integrated modeling approach for this purpose is limited by its scalability and computational load because of the high dimensionality of the integrated birth–death process. We propose a generalized convex decomposition of the integrated birth-death process, which transforms the high-dimensional multi-VNF process into …


Server-Aided Revocable Attribute-Based Encryption For Cloud Computing Services, Hui Cui, Tsz Hon Yuen, Robert H. Deng, Guilin Wang Jan 2020

Server-Aided Revocable Attribute-Based Encryption For Cloud Computing Services, Hui Cui, Tsz Hon Yuen, Robert H. Deng, Guilin Wang

Research Collection School Of Computing and Information Systems

Attribute-based encryption (ABE) has been regarded as a promising solution in cloud computing services to enable scalable access control without compromising the security. Despite of the advantages, efficient user revocation has been a challenge in ABE. One suggestion for user revocation is using the binary tree in the key generation phase of an ABE scheme, which enables a trusted key generation center to periodically distribute the key update information to all nonrevoked users over a public channel. This revocation approach reduces the size of key updates from linear to logarithmic in the number of users. But it requires each user …