Melek Önen

ORCID: 0000-0003-0269-9495
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Adversarial Robustness in Machine Learning
  • Internet Traffic Analysis and Secure E-voting
  • Privacy, Security, and Data Protection
  • Caching and Content Delivery
  • Mobile Ad Hoc Networks
  • Complexity and Algorithms in Graphs
  • Security in Wireless Sensor Networks
  • Opportunistic and Delay-Tolerant Networks
  • Chaos-based Image/Signal Encryption
  • Access Control and Trust
  • User Authentication and Security Systems
  • Stochastic Gradient Optimization Techniques
  • Blockchain Technology Applications and Security
  • Advanced Steganography and Watermarking Techniques
  • Peer-to-Peer Network Technologies
  • Cooperative Communication and Network Coding
  • Advanced Data Storage Technologies
  • Quantum-Dot Cellular Automata
  • Biometric Identification and Security
  • Wireless Communication Security Techniques
  • Speech Recognition and Synthesis
  • Quantum Information and Cryptography

EURECOM
2016-2025

Laboratoire Traitement et Communication de l’Information
2005

With the continuous and exponential increase of number users size their data, data deduplication becomes more a necessity for cloud storage providers. By storing unique copy duplicate providers greatly reduce transfer costs. The advantages unfortunately come with high cost in terms new security privacy challenges. We propose ClouDedup, secure efficient service which assures block-level confidentiality at same time. Although based on convergent encryption, ClouDedup remains thanks to...

10.1109/cloudcom.2013.54 article EN 2013-12-01

Secure aggregation consists of computing the sum data collected from multiple sources without disclosing these individual inputs. has been found useful for various applications ranging electronic voting to smart grid measurements. Recently, federated learning emerged as a new collaborative machine technology train models. In this work, we study suitability secure based on cryptographic schemes learning. We first provide formal definition problem and suggest systematic categorization existing...

10.56553/popets-2023-0009 article EN cc-by Proceedings on Privacy Enhancing Technologies 2023-01-01

With the advent of cloud computing, individuals and companies alike are looking for opportunities to leverage resources not only storage but also computation. Nevertheless, reliance on perform computation raises unavoidable challenge how assure correctness delegated In this regard, we introduce two cryptographic protocols publicly verifiable that allow a lightweight client securely outsource server evaluation high-degree univariate polynomials multiplication large matrices. Similarly...

10.1145/2897845.2897910 article EN 2016-05-27

EVA1 is describing a new class of emotion-aware autonomous systems delivering intelligent personal assistant functionalities. EVA requires multi-disciplinary approach, combining number critical building blocks into cybernetics systems/software architecture: emotion aware and algorithms, multimodal interaction design, cognitive modelling, decision making recommender systems, sensing as feedback for learning, distributed (edge) computing services.

10.1145/3194085.3194094 article EN 2018-05-28

Online Social Network (OSN) applications and services such as picture sharing, wall posting, the like, nowadays have a strong impact on way users interact with each other. Catering for broad range of all ages, vast difference in social, educational, national background, these allow even limited technical skills to share wide personal information theoretically unlimited number partners. This advantage comes at cost increased security privacy exposures two main reasons: first all, tend...

10.1109/wowmom.2011.5986118 article EN 2011-06-01

Recent technological developments in cloud computing and the ensuing commercial appeal have encouraged companies individuals to outsource their storage computations powerful servers. However, challenge when outsourcing data computation is ensure that servers comply with advertised policies. In this paper, we focus particular on scenario where a owner wishes (i) its public database server; (ii) enable anyone submit multi-keyword search queries outsourced database; (iii) can verify correctness...

10.1109/cns.2015.7346876 article EN 2015-09-01

Abstract Searchable Encryption (SE) allows a user to upload data the cloud and search it in remote fashion while preserving privacy of both queries. Recent research results describe attacks on SE schemes using access pattern, denoting ids documents matching queries, which most reveal during query processing. However usually leak more than just this extra leakage can lead (much) harmful ones basic pattern only. We remark that special case Multi-User (MUSE), where many users cloud-based...

10.1515/popets-2017-0034 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2017-07-01

Abstract Confidence in information and communication technology services systems is crucial for the digital society which we live in, but this confidence not possible without privacy-enhancing tools technologies, nor risks management frameworks that guarantee privacy, data protection, secure identities. This paper provides on ongoing recent developments area European Union (EU) space. We start by providing an overview of EU’s General Data Protection Regulation (GDPR) proceed identifying...

10.1007/s42979-020-00218-8 article EN cc-by SN Computer Science 2020-06-27

Clustering is an unsupervised machine learning technique that outputs clusters containing similar data items. In this work, we investigate privacy-preserving density-based clustering which is, for example, used in financial analytics and medical diagnosis. When (multiple) owners collaborate or outsource the computation, privacy concerns arise. To address problem, design, implement, evaluate first practical fully private scheme based on secure two-party computation. Our protocol privately...

10.1145/3433210.3453104 article EN 2021-05-24

Image registration is a key task in medical imaging applications, allowing to represent images common spatial reference frame. Current approaches image are generally based on the assumption that content of usually accessible clear form, from which transformation subsequently estimated. This may not be met practical since sensitive nature ultimately require their analysis under privacy constraints, preventing openly share content. In this work, we formulate problem preserving regime, where...

10.1016/j.media.2024.103129 article EN publisher-specific-oa Medical Image Analysis 2024-03-01

10.1016/j.comcom.2014.04.007 article EN Computer Communications 2014-04-19
Coming Soon ...