Oscar Bautista, Kemal Akkaya, Soamar Homsi
Outsourcing Secure MPC to Untrusted Cloud Environments with Correctness Verification Proceedings Article
In: 2021 IEEE 46th Conference on Local Computer Networks (LCN), pp. 178–184, IEEE, 2021.
Abstract | Links | BibTeX | Tags: Secure Computation
@inproceedings{nokey,
title = {Outsourcing Secure MPC to Untrusted Cloud Environments with Correctness Verification},
author = {Oscar Bautista and Kemal Akkaya and Soamar Homsi},
url = {https://ieeexplore.ieee.org/abstract/document/9524971/},
year = {2021},
date = {2021-10-04},
booktitle = {2021 IEEE 46th Conference on Local Computer Networks (LCN)},
pages = {178–184},
publisher = {IEEE},
school = {Florida International University},
abstract = {With the increasing interest in Secure Multi-Party Computation protocols (MPC), there have been several works such as the SPDZ 1 protocol that tackled this problem under a malicious security with dishonest majority attack model. However, most of these MPC efforts assume that the nodes running the computations are also supplying the inputs, which is not a realistic assumption for many real-life applications. In this paper, we extend the SPDZ protocol to enable clients outsource data and computation to the clouds while ensuring the correctness of the results, in addition to integrity and confidentiality of the input and output. We guarantee that the computation among nodes is done correctly by verifying their outputs Message Authentication Codes (MACs) at the end. Specifically, we delegate this task to an honest server. Our approach strives to minimize the burden on clients while enabling cheating detection even},
keywords = {Secure Computation},
pubstate = {published},
tppubtype = {inproceedings}
}
Andrew Quijano, Kemal Akkaya
Server-side Fingerprint-Based Indoor Localization Using Encrypted Sorting Proceedings Article
In: 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW), pp. 53–57, IEEE, 2019.
Abstract | Links | BibTeX | Tags: Secure Computation
@inproceedings{nokey,
title = {Server-side Fingerprint-Based Indoor Localization Using Encrypted Sorting},
author = {Andrew Quijano and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/9059316/},
year = {2019},
date = {2019-11-04},
booktitle = {2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW)},
pages = {53–57},
publisher = {IEEE},
school = {Florida International University},
abstract = {GPS signals, the main origin of navigation, are not functional in indoor environments. Therefore, Wi-Fi access points have started to be increasingly used for localization and tracking inside the buildings by relying on fingerprint-based approach. However, with these types of approaches, several concerns regarding the privacy of the users have arisen. Malicious individuals can determine a clients daily habits and activities by simply analyzing their wireless signals. While there are already efforts to incorporate privacy to the existing fingerprint-based approaches, they are limited to the characteristics of the homo-morphic cryptographic schemes they employed. In this paper, we propose to enhance the performance of these approaches by exploiting another homomorphic algorithm, namely DGK, with its unique encrypted sorting capability and thus pushing most of the computations to the server side. We developed an},
keywords = {Secure Computation},
pubstate = {published},
tppubtype = {inproceedings}
}
Samet Tonyali, Kemal Akkaya, Nico Saputro, A Selcuk Uluagac
A reliable data aggregation mechanism with homomorphic encryption in smart grid ami networks Proceedings Article
In: 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 550–555, IEEE, 2016.
Abstract | Links | BibTeX | Tags: Secure Computation
@inproceedings{nokey,
title = {A reliable data aggregation mechanism with homomorphic encryption in smart grid ami networks},
author = {Samet Tonyali and Kemal Akkaya and Nico Saputro and A Selcuk Uluagac},
url = {https://ieeexplore.ieee.org/abstract/document/7444839/},
year = {2016},
date = {2016-01-09},
booktitle = {2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)},
pages = {550–555},
publisher = {IEEE},
school = {Florida International University},
abstract = {One of the most common methods to preserve consumers' private data is using secure in-network data aggregation. The security can be provided through the emerging fully (FHE) or partial (PHE) homomorphic encryption techniques. However, an FHE aggregation scheme generates significantly big-size data when compared to traditional encryption methods. The overhead is compounded in hierarchical networks such as Smart Grid Advanced Metering Infrastructure (AMI) as data packets are routed towards the core of the AMI networking infrastructure from the smart meters. In this paper, we first investigate the feasibility and performance of FHE aggregation in AMI networks utilizing the reliable data transport protocol, TCP. Then, we introduce the packet reassembly problem. To address this challenge, we propose a novel packet reassembly mechanism for TCP. We evaluated the effectiveness of our proposed},
keywords = {Secure Computation},
pubstate = {published},
tppubtype = {inproceedings}
}
Samet Tonyali, Nico Saputro, Kemal Akkaya, Selcuk Uluagac
A reliable data aggregation mechanism with fully homomorphic encryption in smart grid AMI networks Journal Article
In: 2016.
Abstract | Links | BibTeX | Tags: Secure Computation
@article{nokey,
title = {A reliable data aggregation mechanism with fully homomorphic encryption in smart grid AMI networks},
author = {Samet Tonyali and Nico Saputro and Kemal Akkaya and Selcuk Uluagac},
url = {https://repository.unpar.ac.id/handle/123456789/14758},
year = {2016},
date = {2016-00-00},
publisher = {2016},
school = {Florida International University},
abstract = {One of the most common methods to preserve consumers private data is using secure in-network data aggregation. The security can be provided through the emerging fully (FHE) or partial (PHE) homomorphic encryption techniques. However, an FHE aggregation scheme generates significantly big-size data when compared to traditional encryption methods. The overhead is compounded in hierarchical networks such as Smart Grid Advanced Metering Infrastructure (AMI) as data packets are routed towards the core of the AMI networking infrastructure from the smart meters. In this paper, we first investigate the feasibility and performance of FHE aggregation in AMI networks utilizing the reliable data transport protocol, TCP. Then, we introduce the packet reassembly problem. To address this challenge, we propose a novel packet reassembly mechanism for TCP. We evaluated the effectiveness of our proposed mechanism using both PHE and FHE-based aggregation approaches in AMI in terms throughput and end-to-end delay on an 802.11s-based wireless mesh network by using the ns-3 network simulator. The results indicate significant gains in terms of delay and bandwidth usage with the proposed mechanism.},
keywords = {Secure Computation},
pubstate = {published},
tppubtype = {article}
}
Patrick Armengol, Rachelle Tobkes, Kemal Akkaya, Bekir S Çiftler, Ismail Güvenç
Efficient privacy-preserving fingerprint-based indoor localization using crowdsourcing Proceedings Article
In: 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems, pp. 549–554, IEEE, 2015.
Abstract | Links | BibTeX | Tags: Secure Computation
@inproceedings{nokey,
title = {Efficient privacy-preserving fingerprint-based indoor localization using crowdsourcing},
author = {Patrick Armengol and Rachelle Tobkes and Kemal Akkaya and Bekir S Çiftler and Ismail Güvenç},
url = {https://ieeexplore.ieee.org/abstract/document/7366991/},
year = {2015},
date = {2015-10-19},
booktitle = {2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems},
pages = {549–554},
publisher = {IEEE},
school = {Florida International University},
abstract = {Indoor localization has been widely studied due to the inability of GPS to function indoors. Numerous approaches have been proposed in the past and a number of these approaches are currently being used commercially. However, little attention was paid to the privacy of the users especially in the commercial products. Malicious individuals can determine a client's daily habits and activities by simply analyzing their WiFi signals and tracking information. In this paper, we implemented a privacy-preserving indoor localization scheme that is based on a fingerprinting approach to analyze the performance issues in terms of accuracy, complexity, scalability and privacy. We developed an Android app and collected a large number of data on the third floor of the FIU Engineering Center. The analysis of data provided excellent opportunities for performance improvement which have been incorporated to the privacy},
keywords = {Secure Computation},
pubstate = {published},
tppubtype = {inproceedings}
}
Samet Tonyali, Nico Saputro, Kemal Akkaya
Assessing the feasibility of fully homomorphic encryption for smart grid ami networks Proceedings Article
In: 2015 Seventh International Conference on Ubiquitous and Future Networks, pp. 591–596, IEEE, 2015.
Abstract | Links | BibTeX | Tags: Secure Computation
@inproceedings{nokey,
title = {Assessing the feasibility of fully homomorphic encryption for smart grid ami networks},
author = {Samet Tonyali and Nico Saputro and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/7182613/},
year = {2015},
date = {2015-07-07},
booktitle = {2015 Seventh International Conference on Ubiquitous and Future Networks},
pages = {591–596},
publisher = {IEEE},
school = {Florida International University},
abstract = {Despite the potential benefits of smart meters as part of the Smart Grid initiative, the deployment of smart meters has aroused several concerns on consumer privacy. To address such concerns, various solutions are proposed in recent years under a variety of assumptions. Nonetheless, all of these solutions require a trust relationship between the consumers and utilities or third-party service providers which still does not convince some of the consumers for using smart meters. An ultimate solution is to hide the data from utilities or third-parties by using fully homomorphic encryption (FHE) systems while still allowing them to do processing on the encrypted data for their needs. However, the FHE systems are recently started to be realized and their wider deployment for certain applications has not been explored yet. In this paper, we investigate the feasibility of using FHE systems on an IEEE 802.11s-based Advanced},
keywords = {Secure Computation},
pubstate = {published},
tppubtype = {inproceedings}
}
Sriram Krishnamachari, Mehrdad Nojoumian, Kemal Akkaya
Implementation and analysis of Dutch-style sealed-bid auctions computational vs unconditional security Proceedings Article
In: 2015 International Conference on Information Systems Security and Privacy (ICISSP), pp. 1–8, IEEE, 2015.
Abstract | Links | BibTeX | Tags: Secure Computation
@inproceedings{nokey,
title = {Implementation and analysis of Dutch-style sealed-bid auctions computational vs unconditional security},
author = {Sriram Krishnamachari and Mehrdad Nojoumian and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/7509936/},
year = {2015},
date = {2015-02-09},
booktitle = {2015 International Conference on Information Systems Security and Privacy (ICISSP)},
pages = {1–8},
publisher = {IEEE},
school = {Florida International University},
abstract = {Designing a sealed-bid auction protocol is a challenging problem in the field of applied cryptography. In the last couple of decades, numerous protocols have been proposed in the literature where each one has its own property in terms of the security model, communication and computation complexities. To the best of our knowledge, there has been no study to implement and compare a similar class of sealed-bid auction protocols. This paper therefore implements and evaluates five different Dutch-style sealed-bid auction protocols, of which three protocols are computationally secure and two protocols are unconditionally secure. It mainly focuses on the computational cost of the initialization and verification phases of these privacy-preserving protocols.},
keywords = {Secure Computation},
pubstate = {published},
tppubtype = {inproceedings}
}
Nico Saputro, Kemal Akkaya
Performance evaluation of smart grid data aggregation via homomorphic encryption Proceedings Article
In: 2012 IEEE Wireless Communications and Networking Conference (WCNC), pp. 2945–2950, IEEE, 2012.
Abstract | Links | BibTeX | Tags: Secure Computation
@inproceedings{nokey,
title = {Performance evaluation of smart grid data aggregation via homomorphic encryption},
author = {Nico Saputro and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/6214307/},
year = {2012},
date = {2012-04-01},
booktitle = {2012 IEEE Wireless Communications and Networking Conference (WCNC)},
pages = {2945–2950},
publisher = {IEEE},
school = {Florida International University},
abstract = {Homomorphic encryption allows arithmetic operations to be performed on ciphertext and gives the same result as if the same arithmetic operation is done on the plaintext. Homomorphic encryption has been touted as one of the promising methods to be employed in Smart Grid (SG) to provide data privacy which is one of the main security concerns in SG. In addition to data privacy, real-time data flow is crucial in SG to provide on-time detection and recovery of possible failures. In this paper, we investigate the overhead of using homomorphic encryption in SG in terms of bandwidth and end-to-end data delay when providing data privacy. Specifically, we compare the latency and data size of end-to-end (ETE) and hop-by-hop (HBH) homomorphic encryption within a network of Smart Meters (SMs). In HBH encryption, at each intermediate node, the received encrypted data from downstream nodes are decrypted first},
keywords = {Secure Computation},
pubstate = {published},
tppubtype = {inproceedings}
}
Citations: 18671
h-index: 54
i10-index: 162