- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Data Mining Algorithms and Applications
- Cloud Data Security Solutions
- Access Control and Trust
- Data Management and Algorithms
- Distributed and Parallel Computing Systems
- Advanced Graph Neural Networks
- Scientific Computing and Data Management
- Data Quality and Management
- Advanced Clustering Algorithms Research
- Research Data Management Practices
- Algorithms and Data Compression
- Advanced Database Systems and Queries
- Privacy, Security, and Data Protection
- Complexity and Algorithms in Graphs
Purdue University West Lafayette
2008-2018
University of Engineering and Technology Lahore
2006
Graphs are used for representing and understanding objects their relationships numerous applications such as social networks, Semantic Webs, biological networks. Integrity assurance of data query results graph databases is an essential security requirement. In this paper, we propose two efficient integrity verification schemes-HMACs graphs (gHMAC) two-party sharing, redactable HMACs (rgHMAC) third-party a cloud-based database service. We compute one HMAC value both the schemes other rgHMAC...
We demonstrate bdbms, an extensible database engine for biological databases, bdbms started on the observation that technology has not kept pace with specific requirements of databases and several needed key functionalities are supported at level. While aims supporting these functionalities, this demo focuses on: (1) Annotation provenance management including storage, indexing, querying, propagation, (2) Local dependency tracking dependencies derivations among data items, (3) Update...
Use of graph-structured data models is on the rise - in graph databases, representing biological and healthcare as well geographical data. In order to secure data, develop cryptographically schemes for it essential formally define suitable collision resistant one-way hashing show them they are efficient. The widely used Merkle hash technique not is, because graphs may be directed acyclic ones or cyclic ones. this paper, we addressing problem. Our contributions are: (1) practical formal...
Privacy preservation has become an important requirement in information systems that deal with personal data. In many cases this is imposed by laws recognize the right of data owners to control whom their shared and purposes for which it can be shared. Hippocratic databases have been proposed as answer privacy requirement; they extend architecture standard DBMSs components ensure handled compliance its associated definitions. Previous work design some these components. Unfortunately, there...
Decision Support Systems (DSS) are information systems that support decision making processes. In many scenarios these built on top of data managed by DBMSs and make extensive use its underlying grouping aggregation capabilities, i.e., Group-by operation. Unfortunately, the standard operator has inherent limitation being based only equality, all tuples in a group share same values attributes. Similarity-based (SGB) been recently proposed as an extension aimed to overcome this limitation. SGB...
There has been significant interest in the development of anonymization schemes for publishing graph data. However, privacy is a major concern dealing with In this paper, an integrated framework ensuring presence authorization mechanism proposed. Access control mechanisms provide additional safeguard against data breaches and ensure that only authorized information available to end-users based on their assigned roles. The highlights tradeoff between privileges. To attain pre-specified level,...
Graphs are used for representing and understanding objects their relationships numerous applications such as social networks, semantic webs, biological networks. Integrity assurance of data query results graph databases is an essential security requirement. In this paper, we propose two efficient integrity verification schemes - HMACs graphs (gHMAC) two-party sharing, redactable (rgHMAC) third-party a cloud-based database service. The proposed have linear complexity in terms the number...