Muhammad U. Arshad

ORCID: 0000-0002-0498-6175
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Data Mining Algorithms and Applications
  • Cloud Data Security Solutions
  • Access Control and Trust
  • Data Management and Algorithms
  • Distributed and Parallel Computing Systems
  • Advanced Graph Neural Networks
  • Scientific Computing and Data Management
  • Data Quality and Management
  • Advanced Clustering Algorithms Research
  • Research Data Management Practices
  • Algorithms and Data Compression
  • Advanced Database Systems and Queries
  • Privacy, Security, and Data Protection
  • Complexity and Algorithms in Graphs

Purdue University West Lafayette
2008-2018

University of Engineering and Technology Lahore
2006

Graphs are used for representing and understanding objects their relationships numerous applications such as social networks, Semantic Webs, biological networks. Integrity assurance of data query results graph databases is an essential security requirement. In this paper, we propose two efficient integrity verification schemes-HMACs graphs (gHMAC) two-party sharing, redactable HMACs (rgHMAC) third-party a cloud-based database service. We compute one HMAC value both the schemes other rgHMAC...

10.1109/tkde.2017.2776221 article EN publisher-specific-oa IEEE Transactions on Knowledge and Data Engineering 2017-11-22

We demonstrate bdbms, an extensible database engine for biological databases, bdbms started on the observation that technology has not kept pace with specific requirements of databases and several needed key functionalities are supported at level. While aims supporting these functionalities, this demo focuses on: (1) Annotation provenance management including storage, indexing, querying, propagation, (2) Local dependency tracking dependencies derivations among data items, (3) Update...

10.1109/icde.2008.4497631 article EN 2008-04-01

Use of graph-structured data models is on the rise - in graph databases, representing biological and healthcare as well geographical data. In order to secure data, develop cryptographically schemes for it essential formally define suitable collision resistant one-way hashing show them they are efficient. The widely used Merkle hash technique not is, because graphs may be directed acyclic ones or cyclic ones. this paper, we addressing problem. Our contributions are: (1) practical formal...

10.1145/2557547.2557564 article EN 2014-02-25

Privacy preservation has become an important requirement in information systems that deal with personal data. In many cases this is imposed by laws recognize the right of data owners to control whom their shared and purposes for which it can be shared. Hippocratic databases have been proposed as answer privacy requirement; they extend architecture standard DBMSs components ensure handled compliance its associated definitions. Previous work design some these components. Unfortunately, there...

10.1109/icde.2009.126 article EN Proceedings - International Conference on Data Engineering 2009-03-01

Decision Support Systems (DSS) are information systems that support decision making processes. In many scenarios these built on top of data managed by DBMSs and make extensive use its underlying grouping aggregation capabilities, i.e., Group-by operation. Unfortunately, the standard operator has inherent limitation being based only equality, all tuples in a group share same values attributes. Similarity-based (SGB) been recently proposed as an extension aimed to overcome this limitation. SGB...

10.1145/1516360.1516499 article EN 2009-03-24

There has been significant interest in the development of anonymization schemes for publishing graph data. However, privacy is a major concern dealing with In this paper, an integrated framework ensuring presence authorization mechanism proposed. Access control mechanisms provide additional safeguard against data breaches and ensure that only authorized information available to end-users based on their assigned roles. The highlights tradeoff between privileges. To attain pre-specified level,...

10.1109/tdsc.2017.2714660 article EN IEEE Transactions on Dependable and Secure Computing 2017-06-12

Graphs are used for representing and understanding objects their relationships numerous applications such as social networks, semantic webs, biological networks. Integrity assurance of data query results graph databases is an essential security requirement. In this paper, we propose two efficient integrity verification schemes - HMACs graphs (gHMAC) two-party sharing, redactable (rgHMAC) third-party a cloud-based database service. The proposed have linear complexity in terms the number...

10.1109/icde.2018.00268 article EN 2022 IEEE 38th International Conference on Data Engineering (ICDE) 2018-04-01
Coming Soon ...