Secure Computing

Efficient Geometric Range Queries

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data Introduction : Spatial data have wide applications, e.g., location-based services, and geometric range queries (i.e., finding points inside geometric areas, e.g., circles or polygons) are one of the fundamental search functions over spatial data. The rising demand of outsourcing data is moving large-scale datasets, including large-scale …

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data Read More »

Computations in Mobile Sensing Systems

Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems

Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems Introduction : Protecting the privacy of mobile phone user participants is extremely important for mobile phone sensing applications. In this paper, we study how an aggregator can expeditiously compute the minimum value or the k-th minimum value of all users’ data without knowing …

Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems Read More »

Credibility Analysis System

A Credibility Analysis System for Assessing Information on Twitter

A Credibility Analysis System for Assessing Information on Twitter Introduction : Information credibility on Twitter has been a topic of interest among researchers in the fields of both computer and social sciences, primarily because of the recent growth of this platform as a tool for information dissemination. Twitter has made it increasingly possible to offer …

A Credibility Analysis System for Assessing Information on Twitter Read More »

Detecting Compromised Accounts

Towards Detecting Compromised Accounts on Social Networks

Towards Detecting Compromised Accounts on Social Networks Introduction : Compromising social network accounts has become a profitable course of action for cybercriminals. By hijacking control of a popular media or business account, attackers can distribute their malicious messages or disseminate fake information to a large user base. The impacts of these incidents range from a …

Towards Detecting Compromised Accounts on Social Networks Read More »

Rank Fraud and Malware Detection

Search Rank Fraud and Malware Detection in Google Play

Search Rank Fraud and Malware Detection in Google Play Introduction : Fraudulent behaviours in Google Play, the most popular Android app market, fuel search rank abuse and malware proliferation. To identify malware, previous work has focused on app executable and permission analysis. In this paper, we introduce FairPlay, a novel system that discovers and leverages …

Search Rank Fraud and Malware Detection in Google Play Read More »

ProGuard Detecting Malicious Accounts in Social-Network-Based Online Promotions

ProGuard Detecting Malicious Accounts in Social-Network-Based Online Promotions Introduction : Online social networks gradually integrate financial capabilities by enabling the usage of real and virtual currency. They serve as new platforms to host a variety of business activities such as online promotion events, where users can possibly get virtual currency as rewards by participating such …

ProGuard Detecting Malicious Accounts in Social-Network-Based Online Promotions Read More »

Privacy Preserving Selective Aggregation

Privacy Preserving Selective Aggregation of Online User Behaviour Data

Privacy Preserving Selective Aggregation of Online User Behaviour Data Introduction : Tons of online user behaviour data are being generated every day on the booming and ubiquitous Internet. Growing efforts have been devoted to mining the abundant behaviour data to extract valuable information for research purposes or business interests. However, online users’ privacy is thus …

Privacy Preserving Selective Aggregation of Online User Behaviour Data Read More »

control photo sharing

Control Photo Sharing on Online Social Networks: My Privacy My Decision

Control of Photo Sharing on Online Social Networks : My Privacy My Decision Introduction: Photo sharing is an attractive feature which popularizes Online Social Networks (OSNs). Unfortunately, it may leak users privacy if they are allowed to post, comment, and tag a photo freely. In this paper, we attempt to address this issue and study the …

Control Photo Sharing on Online Social Networks: My Privacy My Decision Read More »