Bharath K. Samanthula

ORCID: 0009-0002-2198-8428
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Cloud Data Security Solutions
  • Privacy, Security, and Data Protection
  • Complexity and Algorithms in Graphs
  • Blockchain Technology Applications and Security
  • Security in Wireless Sensor Networks
  • Anomaly Detection Techniques and Applications
  • Software Engineering Research
  • Spam and Phishing Detection
  • Software Reliability and Analysis Research
  • Teaching and Learning Programming
  • Smart Grid Security and Resilience
  • Data Mining Algorithms and Applications
  • Information and Cyber Security
  • Energy Efficient Wireless Sensor Networks
  • Advanced Malware Detection Techniques
  • Adversarial Robustness in Machine Learning
  • Digital Media Forensic Detection
  • Digital and Cyber Forensics
  • Educational Research and Pedagogy
  • Vehicular Ad Hoc Networks (VANETs)
  • Cryptography and Residue Arithmetic

Montclair State University
2017-2024

Purdue University West Lafayette
2014-2015

Missouri University of Science and Technology
2011-2014

For the past decade, query processing on relational data has been studied extensively, and many theoretical practical solutions to have proposed under various scenarios. With recent popularity of cloud computing, users now opportunity outsource their as well management tasks cloud. However, due rise privacy issues, sensitive (e.g., medical records) need be encrypted before outsourcing In addition, should handled by cloud; otherwise, there would no point at first place. To process queries...

10.1109/icde.2014.6816690 article EN 2014-03-01

Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks data mining applications. For past decade, due to rise various privacy issues, theoretical practical solutions classification problem have been proposed under different security models. However, with recent popularity cloud computing, users now opportunity outsource their data, encrypted form, well cloud. Since on...

10.1109/tkde.2014.2364027 article EN IEEE Transactions on Knowledge and Data Engineering 2014-10-20

Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Such techniques, however, usually incur heavy computational and communication cost on participating parties thus entities with limited resources may to refrain from in PPDM process. To address this issue, one promising solution is outsource tasks cloud environment. In paper, we propose a novel efficient outsourced distributed clustering (PPODC) multiple users based k-means algorithm. The...

10.1109/cic.2015.20 preprint EN 2015-10-01

Many secure data analysis tasks, such as clustering and classification, require efficient mechanisms to convert the intermediate encrypted integers into corresponding encryptions of bits. The existing bit-decomposition algorithms either do not offer sufficient security or are computationally inefficient. In order provide better well improve efficiency, we propose a novel probabilistic-based protocol for values using public key additive homomorphic encryption schemes. proposed guarantees per...

10.1145/2484313.2484386 article EN 2013-05-08

Due to cost-efficiency and less hands-on management, data owners are outsourcing their the cloud which can provide access as a service. However, by cloud, lose control over provider becomes third party. At first, encrypting owner then exporting it seems be good approach. there is potential efficiency problem with outsourced encrypted when revokes some of users' privileges. An existing solution this based on symmetric key encryption scheme so not secure revoked user rejoins system different...

10.1145/2347673.2347681 article EN 2012-08-31

The Jaccard Coefficient, as an information similarity measure, has wide variety of applications, such cluster analysis and image segmentation. Due to the concerns personal privacy, Coefficient cannot be computed directly between two independently owned datasets. problem, secure computation for multisets (SJCM), considers situation where parties want securely compute random shares their multisets. During process, content each party's multiset is not disclosed other party also value should...

10.1109/tdsc.2015.2415482 article EN publisher-specific-oa IEEE Transactions on Dependable and Secure Computing 2015-03-23

The popularity of online social networks (OSNs) is on constant rise due to various advantages, including communication and sharing information interest among friends. It often that users want make new friends expand their connections as well obtain from a broad range people. Friend recommendation very important application in many OSNs has been studied extensively the recent past. However,with growing concerns about user privacy, there strong need develop privacy-preserving friend methods...

10.5555/2870559.2870562 article EN Transactions on data privacy 2015-08-01

The proliferation of digital technologies and the ubiquitous nature data connectivity has dramatically increased landscape cyberattacks over past decade. Ransomware attacks have become a global incidence most destructive cyber menace. As popular example cryptovirology, ransomware typically encrypt files on target computer threaten to publish or permanently prevent access victim's unless ransom is paid. In general, demands are often made in cryptocurrency obscure transactions maintain...

10.1109/ccwc57344.2023.10099169 article EN 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) 2023-03-08

With the growing popularity of data and service outsourcing, where resides on remote servers in encrypted form, there remain open questions about what kind query operations can be performed data. In this paper, we focus one such important operation, namely range query. One basic security primitive that used to evaluate queries is secure comparison integers. However, existing protocols strongly rely bit-wise representations rather than pure Therefore, first propose an efficient method for...

10.1109/cloud.2013.65 article EN 2013-06-01

Outsourcing data and computation to the cloud is increasingly common. However, be outsourced often privacy-sensitive (e.g., geospatial data, social network Internet traffic data) thus it typically after being properly encrypted. Graph one of most common ways model represent in many applications, including geographic information systems. In this paper, we consider following problem: given a graph G, representing for example road or networks, encrypted format, user wants privately retrieve...

10.1109/iri.2015.72 article EN 2015-08-01

10.1007/s10115-013-0699-6 article EN Knowledge and Information Systems 2013-10-14

Wireless sensor networks (WSNs) have wide range of applications in military, health-monitoring, smart-home applications, and other commercial environments. The computation data aggregation functions like MIN/MAX is one the commonly used tasks many such WSN applications. However, due to privacy issues some these individual readings should be kept secret from others. That is, base station only entity who receive output function not revealed either nodes or root node for confidentiality...

10.1109/mdm.2013.18 article EN 2013-06-01

Many security incidents can be traced back to software vulnerabilities, which described as security-related defects/bugs in the code that potentially exploited by attackers perform unauthorized actions. An analysis of vulnerability data disseminated organizations such NIST' s National Vulnerability (NVD) and SANS Institute shows a majority vulnerabilities relatively small set root causes mostly related repeated mistakes programmers. That is, programmers exhibit pattern erroneous coding...

10.1109/issrew51248.2020.00036 article EN 2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) 2020-10-01

This paper discusses our work in progress aiming to explore how computer simulations can be integrated into the K-12 curriculum of Earth and Environmental science. Several interactive using Netlogo, a multi-agent modeling environment, Scratch, visual programming software are being developed with steerable parameters corresponding output plots for students manipulate interpret results, respectively. Here, we present two designed on water cycle discuss these may help learn about distribution...

10.1109/isecon.2018.8340488 article EN 2022 IEEE Integrated STEM Education Conference (ISEC) 2018-03-01

The emerging growth of online social networks have opened new doors for various business applications such as promoting a product across its customers. Besides this, friend recommendation is an important tool recommending potential candidates friends to users in order enhance the development entire network structure. Existing methods utilize structure and/or user profile information. However, these techniques can no longer be applicable if privacy taken into consideration. In this paper, we...

10.1109/asonam.2012.114 article EN 2012-08-01

Due to various advantages such as energy efficiency, reliability and self-monitoring, the smart grid technology has been emerging next-generation intelligent power system. Some of well-known telecommunication, IT industries have already adopted along their daily business operations. This paper mainly focuses on prevention outage issue in a environment. More specifically, consider utility company which sets threshold total usage households from neighbourhood. Whenever neighbourhood exceeds...

10.1080/17445760.2013.850690 article EN International Journal of Parallel Emergent and Distributed Systems 2013-11-06

Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks data mining applications. For past decade, due to rise various privacy issues, theoretical practical solutions classification problem have been proposed under different security models. However, with recent popularity cloud computing, users now opportunity outsource their data, encrypted form, well cloud. Since on...

10.48550/arxiv.1403.5001 preprint EN other-oa arXiv (Cornell University) 2014-01-01

The evolution of intelligent systems to effectively manage our energy services and mitigate climate change have made the adoption smart grids crucial for a sustainable environment economic growth. Although grid technology offers numerous benefits, such as improved reliability efficient transmission electricity, security threats remain top concern consumers utility companies. In general, confidentiality power consumption data collected by companies is an important privacy households. this...

10.1145/3579988.3585053 article EN 2023-04-13

Information analysis and communication play significant roles in decision making, especially battle grounds situations where national security is under threat. In many when information consideration sensitive/confidential, it our best interests to analyze share only needed minimize the potential of breach regarding other irrelevant but sensitive information. Thus, goal this paper investigate required methodologies propose an advanced framework that enables different entities distributed...

10.1109/passat/socialcom.2011.179 article EN 2011-10-01

For the past decade, query processing on relational data has been studied extensively, and many theoretical practical solutions to have proposed under various scenarios. With recent popularity of cloud computing, users now opportunity outsource their as well management tasks cloud. However, due rise privacy issues, sensitive (e.g., medical records) need be encrypted before outsourcing In addition, should handled by cloud; otherwise, there would no point at first place. To process queries...

10.48550/arxiv.1307.4824 preprint EN other-oa arXiv (Cornell University) 2013-01-01

Secure Similar Document Detection (SSDD) problem considers two parties, each holding a private document, who want to compute the similarity between their documents without leaking document contents one another. This is unique whose applications span across variety of domains, including medical field, military intelligence, and academia. In this paper, we aim solve SSDD by representing as multisets using Jaccard Coefficient (JC) measure. We first illustrate how computation can be reduced...

10.1109/bds/hpsc/ids18.2018.00015 article EN 2018-05-01
Coming Soon ...