Research & Projects

  • Homomorphic encryption (HE) allows functions (often represented as arithmetic circuits) to be computed on ciphertexts without decryption. Technically, any function that can be represented by a low-degree polynomial with addition, subtraction, and multiplication can be supported by HE. For instance, arithmetic operations on encrypted vectors or matrices can be supported easily. With HE user data is protected by strong encryption, hence it can be outsourced and stored safely on an untrusted evaluator (e.g., public or private cloud). Upon receiving a request, the evaluator performs computations on ciphertexts. The results from the computation will be also encrypted.

    Status: Active | Tags: Homomorphic Encryption, Security, Privacy, Crypto, Research
  • Internet-of-Things (IoT) is transforming our lives with augmented everyday objects that have various levels of sensing, computing, actuating and networking capabilities. Currently, many IoT devices do not interact or exchange data with each other, they only offer limited information and services to users through specific mobile apps. Integration of services is mostly achieved in an ad-hoc manner using vendor-specific cloud APIs. Hence, many IoT services rely heavily on the cloud, which creates dependency on network connectivity and potentially increases latency for event-driven adaptations. Lastly, the lack of control and clarity on system adaptations often frustrate users.

    Status: Active | Tags: Cloud, BigData
  • Driven by the proliferation of mobile devices there has been an increase in the provisioning of location-aware services to users. Location data of users is collected to construct trajectories that reveal mobility patterns. These patterns are utilized by organizations to serve a variety of purposes, including infrastructure and resource planning, environment protection, study of infectious disease dynamics, speedy evacuations during crises, and many others. However, exposure of mobility patterns is harmful to user privacy. Thus, there exists a conflict between service providers who wish to utilize users' location data for value added services and end users who prefer to have control over the handling of their location data.

    Status: Past | Tags: Privacy, Modeling, Prediction