Zum Hauptinhalt springen

Showing 1–40 of 40 results for author: Kantarcioglu, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.13713  [pdf, other

    cs.LG cs.AI cs.CG

    EMP: Effective Multidimensional Persistence for Graph Representation Learning

    Authors: Ignacio Segovia-Dominguez, Yuzhou Chen, Cuneyt G. Akcora, Zhiwei Zhen, Murat Kantarcioglu, Yulia R. Gel, Baris Coskunuzer

    Abstract: Topological data analysis (TDA) is gaining prominence across a wide spectrum of machine learning tasks that spans from manifold learning to graph classification. A pivotal technique within TDA is persistent homology (PH), which furnishes an exclusive topological imprint of data by tracing the evolution of latent structures as a scale parameter changes. Present PH tools are confined to analyzing da… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

    Comments: arXiv admin note: text overlap with arXiv:2401.13157

    Journal ref: LoG 2023

  2. arXiv:2309.10852  [pdf, other

    cs.AI cs.HC

    Using AI Uncertainty Quantification to Improve Human Decision-Making

    Authors: Laura R. Marusich, Jonathan Z. Bakdash, Yan Zhou, Murat Kantarcioglu

    Abstract: AI Uncertainty Quantification (UQ) has the potential to improve human decision-making beyond AI predictions alone by providing additional probabilistic information to users. The majority of past research on AI and human decision-making has concentrated on model explainability and interpretability, with little focus on understanding the potential impact of UQ on human decision-making. We evaluated… ▽ More

    Submitted 6 February, 2024; v1 submitted 19 September, 2023; originally announced September 2023.

    Comments: 12 pages and 7 figures

  3. arXiv:2309.01281  [pdf, other

    cs.CR cs.DC cs.GT

    Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions

    Authors: Mustafa Abdallah, Saurabh Bagchi, Shaunak D. Bopardikar, Kevin Chan, Xing Gao, Murat Kantarcioglu, Congmiao Li, Peng Liu, Quanyan Zhu

    Abstract: Many of our critical infrastructure systems and personal computing systems have a distributed computing systems structure. The incentives to attack them have been growing rapidly as has their attack surface due to increasing levels of connectedness. Therefore, we feel it is time to bring in rigorous reasoning to secure such systems. The distributed system security and the game theory technical com… ▽ More

    Submitted 28 May, 2024; v1 submitted 3 September, 2023; originally announced September 2023.

    Comments: Accepted to appear at the IEEE Security & Privacy Magazine

  4. arXiv:2306.07974  [pdf, other

    cs.CR cs.LG

    Chainlet Orbits: Topological Address Embedding for the Bitcoin Blockchain

    Authors: Poupak Azad, Baris Coskunuzer, Murat Kantarcioglu, Cuneyt Gurcan Akcora

    Abstract: The rise of cryptocurrencies like Bitcoin, which enable transactions with a degree of pseudonymity, has led to a surge in various illicit activities, including ransomware payments and transactions on darknet markets. These illegal activities often utilize Bitcoin as the preferred payment method. However, current tools for detecting illicit behavior either rely on a few heuristics and laborious dat… ▽ More

    Submitted 18 May, 2023; originally announced June 2023.

  5. arXiv:2306.00934  [pdf, other

    cs.CR cs.LG

    Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features

    Authors: Kunal Mukherjee, Joshua Wiedemeier, Tianhao Wang, Muhyun Kim, Feng Chen, Murat Kantarcioglu, Kangkook Jee

    Abstract: The black-box nature of complex Neural Network (NN)-based models has hindered their widespread adoption in security domains due to the lack of logical explanations and actionable follow-ups for their predictions. To enhance the transparency and accountability of Graph Neural Network (GNN) security models used in system provenance analysis, we propose PROVEXPLAINER, a framework for projecting abstr… ▽ More

    Submitted 6 June, 2023; v1 submitted 1 June, 2023; originally announced June 2023.

  6. arXiv:2305.00925  [pdf, other

    cs.CR cs.LG

    IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception

    Authors: Joseph Bao, Murat Kantarcioglu, Yevgeniy Vorobeychik, Charles Kamhoua

    Abstract: Over the years, honeypots emerged as an important security tool to understand attacker intent and deceive attackers to spend time and resources. Recently, honeypots are being deployed for Internet of things (IoT) devices to lure attackers, and learn their behavior. However, most of the existing IoT honeypots, even the high interaction ones, are easily detected by an attacker who can observe honeyp… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

    Comments: FLAIRS-36

  7. arXiv:2211.13708  [pdf, other

    cs.LG cs.CG math.AT

    Reduction Algorithms for Persistence Diagrams of Networks: CoralTDA and PrunIT

    Authors: Cuneyt Gurcan Akcora, Murat Kantarcioglu, Yulia R. Gel, Baris Coskunuzer

    Abstract: Topological data analysis (TDA) delivers invaluable and complementary information on the intrinsic properties of data inaccessible to conventional methods. However, high computational costs remain the primary roadblock hindering the successful application of TDA in real-world studies, particularly with machine learning on large complex networks. Indeed, most modern networks such as citation, blo… ▽ More

    Submitted 24 November, 2022; originally announced November 2022.

    Comments: Spotlight paper at NeurIPS 2022

    MSC Class: 68T09; 55N31; 62R40 ACM Class: F.2.2

  8. arXiv:2112.01274  [pdf, other

    cs.LG cs.AI

    The Impact of Data Distribution on Fairness and Robustness in Federated Learning

    Authors: Mustafa Safa Ozdayi, Murat Kantarcioglu

    Abstract: Federated Learning (FL) is a distributed machine learning protocol that allows a set of agents to collaboratively train a model without sharing their datasets. This makes FL particularly suitable for settings where data privacy is desired. However, it has been observed that the performance of FL is closely related to the similarity of the local data distributions of agents. Particularly, as the da… ▽ More

    Submitted 29 November, 2021; originally announced December 2021.

    Comments: Published at The Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications. arXiv admin note: text overlap with arXiv:2010.07427, arXiv:2007.03767

  9. arXiv:2110.10287  [pdf, other

    cs.LG cs.AI cs.CR math.OC stat.ML

    Multi-concept adversarial attacks

    Authors: Vibha Belavadi, Yan Zhou, Murat Kantarcioglu, Bhavani M. Thuraisingham

    Abstract: As machine learning (ML) techniques are being increasingly used in many applications, their vulnerability to adversarial attacks becomes well-known. Test time attacks, usually launched by adding adversarial noise to test instances, have been shown effective against the deployed ML models. In practice, one test input may be leveraged by different ML models. Test time attacks targeting a single ML m… ▽ More

    Submitted 19 October, 2021; originally announced October 2021.

    Comments: 20 pages, 28 figures, 9 tables

  10. arXiv:2109.11637  [pdf, ps, other

    cs.GT cs.AI cs.CR cs.LG

    Learning Generative Deception Strategies in Combinatorial Masking Games

    Authors: Junlin Wu, Charles Kamhoua, Murat Kantarcioglu, Yevgeniy Vorobeychik

    Abstract: Deception is a crucial tool in the cyberdefence repertoire, enabling defenders to leverage their informational advantage to reduce the likelihood of successful attacks. One way deception can be employed is through obscuring, or masking, some of the information about how systems are configured, increasing attacker's uncertainty about their targets. We present a novel game-theoretic model of the res… ▽ More

    Submitted 17 June, 2022; v1 submitted 23 September, 2021; originally announced September 2021.

    Comments: GameSec 2021

  11. Dynamically Adjusting Case Reporting Policy to Maximize Privacy and Utility in the Face of a Pandemic

    Authors: J. Thomas Brown, Chao Yan, Weiyi Xia, Zhijun Yin, Zhiyu Wan, Aris Gkoulalas-Divanis, Murat Kantarcioglu, Bradley A. Malin

    Abstract: Supporting public health research and the public's situational awareness during a pandemic requires continuous dissemination of infectious disease surveillance data. Legislation, such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and recent state-level regulations, permits sharing de-identified person-level data; however, current de-identification approaches are limite… ▽ More

    Submitted 25 February, 2022; v1 submitted 21 June, 2021; originally announced June 2021.

    Comments: Updated to peer-reviewed version. Main text only without figures. Complete version is available in the Journal of the American Medical Informatics Association at https://doi.org/10.1093/jamia/ocac011

  12. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms

    Authors: Fahad Shaon, Sazzadur Rahaman, Murat Kantarcioglu

    Abstract: Distributed data analytics platforms (i.e., Apache Spark, Hadoop) provide high-level APIs to programmatically write analytics tasks that are run distributedly in multiple computing nodes. The design of these frameworks was primarily motivated by performance and usability. Thus, the security takes a back seat. Consequently, they do not inherently support fine-grained access control or offer any plu… ▽ More

    Submitted 3 December, 2023; v1 submitted 24 June, 2021; originally announced June 2021.

  13. arXiv:2106.04757  [pdf, other

    cs.LG cs.CY

    Fair Machine Learning under Limited Demographically Labeled Data

    Authors: Mustafa Safa Ozdayi, Murat Kantarcioglu, Rishabh Iyer

    Abstract: Research has shown that, machine learning models might inherit and propagate undesired social biases encoded in the data. To address this problem, fair training algorithms are developed. However, most algorithms assume we know demographic/sensitive data features such as gender and race. This assumption falls short in scenarios where collecting demographic information is not feasible due to privacy… ▽ More

    Submitted 10 April, 2022; v1 submitted 3 June, 2021; originally announced June 2021.

    Comments: Will appear at ICLR 2022 Socially Responsible Machine Learning (SRML) Workshop

  14. arXiv:2106.01806  [pdf, other

    cs.CR math.AT stat.AP

    Topological Anomaly Detection in Dynamic Multilayer Blockchain Networks

    Authors: Dorcas Ofori-Boateng, Ignacio Segovia Dominguez, Murat Kantarcioglu, Cuneyt G. Akcora, Yulia R. Gel

    Abstract: Motivated by the recent surge of criminal activities with cross-cryptocurrency trades, we introduce a new topological perspective to structural anomaly detection in dynamic multilayer networks. We postulate that anomalies in the underlying blockchain transaction graph that are composed of multiple layers are likely to also be manifested in anomalous patterns of the network shape properties. As suc… ▽ More

    Submitted 6 July, 2021; v1 submitted 3 June, 2021; originally announced June 2021.

    Comments: 26 pages, 6 figures, 7 tables

  15. arXiv:2105.04534  [pdf, other

    cs.LG cs.AI cs.CY

    Improving Fairness of AI Systems with Lossless De-biasing

    Authors: Yan Zhou, Murat Kantarcioglu, Chris Clifton

    Abstract: In today's society, AI systems are increasingly used to make critical decisions such as credit scoring and patient triage. However, great convenience brought by AI systems comes with troubling prevalence of bias against underrepresented groups. Mitigating bias in AI systems to increase overall fairness has emerged as an important challenge. Existing studies on mitigating bias in AI systems focus o… ▽ More

    Submitted 10 May, 2021; originally announced May 2021.

    Comments: 8 pages, 19 figures

  16. arXiv:2104.04787  [pdf, other

    cs.LG

    Smart Vectorizations for Single and Multiparameter Persistence

    Authors: Baris Coskunuzer, CUneyt Gurcan Akcora, Ignacio Segovia Dominguez, Zhiwei Zhen, Murat Kantarcioglu, Yulia R. Gel

    Abstract: The machinery of topological data analysis becomes increasingly popular in a broad range of machine learning tasks, ranging from anomaly detection and manifold learning to graph classification. Persistent homology is one of the key approaches here, allowing us to systematically assess the evolution of various hidden patterns in the data as we vary a scale parameter. The extracted patterns, or homo… ▽ More

    Submitted 10 April, 2021; originally announced April 2021.

    Comments: 27 pages, 7 figures 5 tables

  17. arXiv:2103.08712  [pdf, other

    cs.CR

    Blockchain Networks: Data Structures of Bitcoin, Monero, Zcash, Ethereum, Ripple and Iota

    Authors: Cuneyt Gurcan Akcora, Murat Kantarcioglu, Yulia R. Gel

    Abstract: Blockchain is an emerging technology that has enabled many applications, from cryptocurrencies to digital asset management and supply chains. Due to this surge of popularity, analyzing the data stored on blockchains poses a new critical challenge in data science. To assist data scientists in various analytic tasks on a blockchain, in this tutorial, we provide a systematic and comprehensive overv… ▽ More

    Submitted 29 September, 2021; v1 submitted 15 March, 2021; originally announced March 2021.

    Comments: 27 figures, 8 tables, 42 pages

  18. arXiv:2010.15582  [pdf, ps, other

    cs.LG cs.AI cs.DC

    Improving Accuracy of Federated Learning in Non-IID Settings

    Authors: Mustafa Safa Ozdayi, Murat Kantarcioglu, Rishabh Iyer

    Abstract: Federated Learning (FL) is a decentralized machine learning protocol that allows a set of participating agents to collaboratively train a model without sharing their data. This makes FL particularly suitable for settings where data privacy is desired. However, it has been observed that the performance of FL is closely tied with the local data distributions of agents. Particularly, in settings wher… ▽ More

    Submitted 14 October, 2020; originally announced October 2020.

  19. arXiv:2010.15082  [pdf, other

    cs.CR cs.AI

    How to Not Get Caught When You Launder Money on Blockchain?

    Authors: Cuneyt G. Akcora, Sudhanva Purusotham, Yulia R. Gel, Mitchell Krawiec-Thayer, Murat Kantarcioglu

    Abstract: The number of blockchain users has tremendously grown in recent years. As an unintended consequence, e-crime transactions on blockchains has been on the rise. Consequently, public blockchains have become a hotbed of research for developing AI tools to detect and trace users and transactions that are related to e-crime. We argue that following a few select strategies can make money laundering on… ▽ More

    Submitted 21 September, 2020; originally announced October 2020.

  20. arXiv:2010.08855  [pdf, other

    cs.CR cs.LG

    GOAT: GPU Outsourcing of Deep Learning Training With Asynchronous Probabilistic Integrity Verification Inside Trusted Execution Environment

    Authors: Aref Asvadishirehjini, Murat Kantarcioglu, Bradley Malin

    Abstract: Machine learning models based on Deep Neural Networks (DNNs) are increasingly deployed in a wide range of applications ranging from self-driving cars to COVID-19 treatment discovery. To support the computational power necessary to learn a DNN, cloud environments with dedicated hardware support have emerged as critical infrastructure. However, there are many integrity challenges associated with out… ▽ More

    Submitted 17 October, 2020; originally announced October 2020.

  21. arXiv:2010.07427  [pdf, other

    cs.CR cs.DC cs.LG

    BlockFLA: Accountable Federated Learning via Hybrid Blockchain Architecture

    Authors: Harsh Bimal Desai, Mustafa Safa Ozdayi, Murat Kantarcioglu

    Abstract: Federated Learning (FL) is a distributed, and decentralized machine learning protocol. By executing FL, a set of agents can jointly train a model without sharing their datasets with each other, or a third-party. This makes FL particularly suitable for settings where data privacy is desired. At the same time, concealing training data gives attackers an opportunity to inject backdoors into the tra… ▽ More

    Submitted 14 October, 2020; originally announced October 2020.

  22. arXiv:2008.05286  [pdf, other

    cs.CR cs.DB

    Secure IoT Data Analytics in Cloud via Intel SGX

    Authors: Md Shihabul Islam, Mustafa Safa Ozdayi, Latifur Khan, Murat Kantarcioglu

    Abstract: The growing adoption of IoT devices in our daily life is engendering a data deluge, mostly private information that needs careful maintenance and secure storage system to ensure data integrity and protection. Also, the prodigious IoT ecosystem has provided users with opportunities to automate systems by interconnecting their devices and other services with rule-based programs. The cloud services t… ▽ More

    Submitted 10 August, 2020; originally announced August 2020.

  23. arXiv:2007.03767  [pdf, other

    cs.LG cs.CR stat.ML

    Defending against Backdoors in Federated Learning with Robust Learning Rate

    Authors: Mustafa Safa Ozdayi, Murat Kantarcioglu, Yulia R. Gel

    Abstract: Federated learning (FL) allows a set of agents to collaboratively train a model without sharing their potentially sensitive data. This makes FL suitable for privacy-preserving applications. At the same time, FL is susceptible to adversarial attacks due to decentralized and unvetted data. One important line of attacks against FL is the backdoor attacks. In a backdoor attack, an adversary tries to e… ▽ More

    Submitted 29 July, 2021; v1 submitted 7 July, 2020; originally announced July 2020.

    Comments: Published at AAAI 2021

  24. arXiv:2006.11194  [pdf, other

    cs.LG stat.ML

    Does Explainable Artificial Intelligence Improve Human Decision-Making?

    Authors: Yasmeen Alufaisan, Laura R. Marusich, Jonathan Z. Bakdash, Yan Zhou, Murat Kantarcioglu

    Abstract: Explainable AI provides insight into the "why" for model predictions, offering potential for users to better understand and trust a model, and to recognize and correct AI predictions that are incorrect. Prior research on human and explainable AI interactions has focused on measures such as interpretability, trust, and usability of the explanation. Whether explainable AI can improve actual human de… ▽ More

    Submitted 19 June, 2020; originally announced June 2020.

  25. arXiv:2001.08529  [pdf, other

    cs.DB cs.CR cs.DC

    Leveraging Blockchain for Immutable Logging and Querying Across Multiple Sites

    Authors: Mustafa Safa Ozdayi, Murat Kantarcioglu, Bradley Malin

    Abstract: Blockchain has emerged as a decentralized and distributed framework that enables tamper-resilience and, thus, practical immutability for stored data. This immutability property is important in scenarios where auditability is desired, such as in maintaining access logs for sensitive healthcare and biomedical data.However, the underlying data structure of blockchain, by default, does not provide cap… ▽ More

    Submitted 5 March, 2020; v1 submitted 13 January, 2020; originally announced January 2020.

  26. arXiv:1912.10105  [pdf, other

    cs.SI cs.LG q-fin.ST

    Dissecting Ethereum Blockchain Analytics: What We Learn from Topology and Geometry of Ethereum Graph

    Authors: Yitao Li, Umar Islambekov, Cuneyt Akcora, Ekaterina Smirnova, Yulia R. Gel, Murat Kantarcioglu

    Abstract: Blockchain technology and, in particular, blockchain-based cryptocurrencies offer us information that has never been seen before in the financial world. In contrast to fiat currencies, all transactions of crypto-currencies and crypto-tokens are permanently recorded on distributed ledgers and are publicly available. As a result, this allows us to construct a transaction graph and to assess not only… ▽ More

    Submitted 20 December, 2019; originally announced December 2019.

    Comments: Will appear in SIAM International Conference on Data Mining (SDM20). May 7 - 9, 2020. Cincinnati, Ohio, U.S

  27. arXiv:1908.06971  [pdf, other

    cs.LG q-fin.ST stat.ML

    ChainNet: Learning on Blockchain Graphs with Topological Features

    Authors: Nazmiye Ceren Abay, Cuneyt Gurcan Akcora, Yulia R. Gel, Umar D. Islambekov, Murat Kantarcioglu, Yahui Tian, Bhavani Thuraisingham

    Abstract: With emergence of blockchain technologies and the associated cryptocurrencies, such as Bitcoin, understanding network dynamics behind Blockchain graphs has become a rapidly evolving research direction. Unlike other financial networks, such as stock and currency trading, blockchain based cryptocurrencies have the entire transaction graph accessible to the public (i.e., all transactions can be downl… ▽ More

    Submitted 18 August, 2019; originally announced August 2019.

    Comments: To Appear in the 2019 IEEE International Conference on Data Mining (ICDM)

  28. arXiv:1906.07852  [pdf, other

    cs.CR cs.DC

    BitcoinHeist: Topological Data Analysis for Ransomware Detection on the Bitcoin Blockchain

    Authors: Cuneyt Gurcan Akcora, Yitao Li, Yulia R. Gel, Murat Kantarcioglu

    Abstract: Proliferation of cryptocurrencies (e.g., Bitcoin) that allow pseudo-anonymous transactions, has made it easier for ransomware developers to demand ransom by encrypting sensitive user data. The recently revealed strikes of ransomware attacks have already resulted in significant economic losses and societal harm across different sectors, ranging from local governments to health care. Most modern r… ▽ More

    Submitted 18 June, 2019; originally announced June 2019.

    Comments: 15 pages, 11 tables, 12 figures

  29. arXiv:1806.06881  [pdf, other

    cs.CR

    CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects

    Authors: Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Fahad Shaon, Ke Tian, Miles Frantz, Danfeng, Yao, Murat Kantarcioglu

    Abstract: Cryptographic API misuses, such as exposed secrets, predictable random numbers, and vulnerable certificate verification, seriously threaten software security. The vision of automatically screening cryptographic API calls in massive-sized (e.g., millions of LoC) Java programs is not new. However, hindered by the practical difficulty of reducing false positives without compromising analysis quality,… ▽ More

    Submitted 27 March, 2019; v1 submitted 18 June, 2018; originally announced June 2018.

  30. arXiv:1805.04613  [pdf, other

    cs.CR cs.LG

    Breaking Transferability of Adversarial Samples with Randomness

    Authors: Yan Zhou, Murat Kantarcioglu, Bowei Xi

    Abstract: We investigate the role of transferability of adversarial attacks in the observed vulnerabilities of Deep Neural Networks (DNNs). We demonstrate that introducing randomness to the DNN models is sufficient to defeat adversarial attacks, given that the adversary does not have an unlimited attack budget. Instead of making one specific DNN model robust to perfect knowledge attacks (a.k.a, white box at… ▽ More

    Submitted 17 June, 2018; v1 submitted 11 May, 2018; originally announced May 2018.

    Comments: 19 pages, 17 figures

  31. arXiv:1804.10645  [pdf, other

    cs.CY cs.CR

    Enforceable Data Sharing Agreements Using Smart Contracts

    Authors: Kevin Liu, Harsh Desai, Lalana Kagal, Murat Kantarcioglu

    Abstract: As more and more data is collected for various reasons, the sharing of such data becomes paramount to increasing its value. Many applications ranging from smart cities to personalized health care require individuals and organizations to share data at an unprecedented scale. Data sharing is crucial in today's world, but due to privacy reasons, security concerns and regulation issues, the conditions… ▽ More

    Submitted 27 April, 2018; originally announced April 2018.

    Comments: 8 pages

  32. arXiv:1804.04780  [pdf, other

    stat.ML cs.LG

    Adversarial Clustering: A Grid Based Clustering Algorithm Against Active Adversaries

    Authors: Wutao Wei, Bowei Xi, Murat Kantarcioglu

    Abstract: Nowadays more and more data are gathered for detecting and preventing cyber attacks. In cyber security applications, data analytics techniques have to deal with active adversaries that try to deceive the data analytics models and avoid being detected. The existence of such adversarial behavior motivates the development of robust and resilient adversarial learning techniques for various tasks. Most… ▽ More

    Submitted 13 April, 2018; originally announced April 2018.

  33. arXiv:1803.00497  [pdf, ps, other

    cs.DB

    Graph Based Proactive Secure Decomposition Algorithm for Context Dependent Attribute Based Inference Control Problem

    Authors: Ugur Turan, Ismail H. Toroslu, Murat Kantarcioglu

    Abstract: Relational DBMSs continue to dominate the database market, and inference problem on external schema of relational DBMS's is still an important issue in terms of data privacy.Especially for the last 10 years, external schema construction for application-specific database usage has increased its independency from the conceptual schema, as the definitions and implementations of views and procedures h… ▽ More

    Submitted 1 March, 2018; originally announced March 2018.

  34. arXiv:1709.10000  [pdf, other

    cs.CR

    Using Blockchain and smart contracts for secure data provenance management

    Authors: Aravind Ramachandran, Dr. Murat Kantarcioglu

    Abstract: Blockchain technology has evolved from being an immutable ledger of transactions for cryptocurrencies to a programmable interactive the environment for building distributed reliable applications. Although, blockchain technology has been used to address various challenges, to our knowledge none of the previous work focused on using blockchain to develop a secure and immutable scientific data proven… ▽ More

    Submitted 28 September, 2017; originally announced September 2017.

  35. arXiv:1708.08749  [pdf, other

    cs.CY

    Blockchain: A Graph Primer

    Authors: Cuneyt Gurcan Akcora, Yulia R. Gel, Murat Kantarcioglu

    Abstract: Bitcoin and its underlying technology, blockchain, have gained significant popularity in recent years. Satoshi Nakamoto designed Bitcoin to enable a secure, distributed platform without the need for central authorities, and blockchain has been hailed as a paradigm that will be as impactful as Big Data, Cloud Computing, and Machine Learning. Blockchain incorporates innovative ideas from various f… ▽ More

    Submitted 11 December, 2022; v1 submitted 10 August, 2017; originally announced August 2017.

    Comments: 19 pages, 5 figures

  36. arXiv:1605.00300  [pdf, ps, other

    cs.CR

    CheapSMC: A Framework to Minimize SMC Cost in Cloud

    Authors: Erman Pattuk, Murat Kantarcioglu, Huseyin Ulusoy, Bradley Malin

    Abstract: Secure multi-party computation (SMC) techniques are increasingly becoming more efficient and practical thanks to many recent novel improvements. The recent work have shown that different protocols that are implemented using different sharing mechanisms (e.g., boolean, arithmetic sharings, etc.) may have different computational and communication costs. Although there are some works that automatical… ▽ More

    Submitted 1 May, 2016; originally announced May 2016.

  37. arXiv:1408.5539  [pdf, ps, other

    cs.CR

    A Distributed Framework for Scalable Search over Encrypted Documents

    Authors: Mehmet Kuzu, Mohammad Saiful Islam, Murat Kantarcioglu

    Abstract: Nowadays, huge amount of documents are increasingly transferred to the remote servers due to the appealing features of cloud computing. On the other hand, privacy and security of the sensitive information in untrusted cloud environment is a big concern. To alleviate such concerns, encryption of sensitive data before its transfer to the cloud has become an important risk mitigation option. Encrypte… ▽ More

    Submitted 23 August, 2014; originally announced August 2014.

  38. arXiv:1305.5176  [pdf

    cs.GT cs.CY

    Experiments in Information Sharing

    Authors: Nathan Berg, Chunyu Chen, Murat Kantarcioglu

    Abstract: This paper reports experimental data describing the dynamics of three key information-sharing outcomes: quantity of information shared, falsification and accuracy. The experimental design follows a formal model predicting that cooperative incentives are needed to motivate subsidiaries of large organizations to share information. Empirical reaction functions reveal how lagged values of information-… ▽ More

    Submitted 22 May, 2013; originally announced May 2013.

  39. arXiv:1202.1567  [pdf, other

    cs.GT cs.DC

    Efficient Query Verification on Outsourced Data: A Game-Theoretic Approach

    Authors: Robert Nix, Murat Kantarcioglu

    Abstract: To save time and money, businesses and individuals have begun outsourcing their data and computations to cloud computing services. These entities would, however, like to ensure that the queries they request from the cloud services are being computed correctly. In this paper, we use the principles of economics and competition to vastly reduce the complexity of query verification on outsourced data.… ▽ More

    Submitted 7 February, 2012; originally announced February 2012.

    Comments: 13 pages, 8 figures, pre-publication

  40. arXiv:1105.1982  [pdf, ps, other

    cs.DC

    Secure Data Processing in a Hybrid Cloud

    Authors: Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham, Sharad Mehrotra

    Abstract: Cloud computing has made it possible for a user to be able to select a computing service precisely when needed. However, certain factors such as security of data and regulatory issues will impact a user's choice of using such a service. A solution to these problems is the use of a hybrid cloud that combines a user's local computing capabilities (for mission- or organization-critical tasks) with a… ▽ More

    Submitted 10 May, 2011; originally announced May 2011.

    Comments: 16 pages (13 pages + 3 page appendix), 5 figures

    ACM Class: D.4.6; H.3.3; H.3.4