Skip to main content

Showing 1–13 of 13 results for author: Asghar, M R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.05590  [pdf, other

    cs.CR

    Zero-Knowledge Proof-based Practical Federated Learning on Blockchain

    Authors: Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar

    Abstract: Since the concern of privacy leakage extremely discourages user participation in sharing data, federated learning has gradually become a promising technique for both academia and industry for achieving collaborative learning without leaking information about the local data. Unfortunately, most federated learning solutions cannot efficiently verify the execution of each participant's local machine… ▽ More

    Submitted 24 April, 2023; v1 submitted 11 April, 2023; originally announced April 2023.

  2. arXiv:2011.02607  [pdf, ps, other

    cs.CR

    Towards a Theory of Special-purpose Program Obfuscation

    Authors: Muhammad Rizwan Asghar, Steven Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig

    Abstract: Most recent theoretical literature on program obfuscation is based on notions like Virtual Black Box (VBB) obfuscation and indistinguishability Obfuscation (iO). These notions are very strong and are hard to satisfy. Further, they offer far more protection than is typically required in practical applications. On the other hand, the security notions introduced by software security researchers are s… ▽ More

    Submitted 4 November, 2020; originally announced November 2020.

    Comments: A full version of our TrustCom 2020 work

  3. arXiv:1909.11624  [pdf, other

    cs.CR

    Privacy-preserving Searchable Databases with Controllable Leakage

    Authors: Shujie Cui, Xiangfu Song, Muhammad Rizwan Asghar, Steven D Galbraith, Giovanni Russello

    Abstract: Searchable Encryption (SE) is a technique that allows Cloud Service Providers (CSPs) to search over encrypted datasets without learning the content of queries and records. In recent years, many SE schemes have been proposed to protect outsourced data from CSPs. Unfortunately, most of them leak sensitive information, from which the CSPs could still infer the content of queries and records by mounti… ▽ More

    Submitted 26 September, 2019; v1 submitted 25 September, 2019; originally announced September 2019.

    Comments: 16 pages, 6 figures, Journal

  4. arXiv:1905.07273  [pdf, other

    cs.CR cs.AI cs.CV

    Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection

    Authors: Aditya Kuppa, Slawomir Grzonkowski, Muhammad Rizwan Asghar, Nhien-An Le-Khac

    Abstract: Advanced attack campaigns span across multiple stages and stay stealthy for long time periods. There is a growing trend of attackers using off-the-shelf tools and pre-installed system applications (such as \emph{powershell} and \emph{wmic}) to evade the detection because the same tools are also used by system administrators and security analysts for legitimate purposes for their routine tasks. To… ▽ More

    Submitted 20 May, 2019; v1 submitted 16 May, 2019; originally announced May 2019.

    Comments: Preprint: Modified, Extended Version will be presented at TrustCom 2019

  5. arXiv:1805.05033  [pdf, other

    cs.CR

    AuthStore: Password-based Authentication and Encrypted Data Storage in Untrusted Environments

    Authors: Clemens Zeidler, Muhammad Rizwan Asghar

    Abstract: Passwords are widely used for client to server authentication as well as for encrypting data stored in untrusted environments, such as cloud storage. Both, authentication and encrypted cloud storage, are usually discussed in isolation. In this work, we propose AuthStore, a flexible authentication framework that allows users to securely reuse passwords for authentication as well as for encrypted cl… ▽ More

    Submitted 14 May, 2018; originally announced May 2018.

    Comments: 8 pages, 3 figures, 1 table

  6. arXiv:1711.00546  [pdf, other

    cs.CY

    A Review of Privacy and Consent Management in Healthcare: A Focus on Emerging Data Sources

    Authors: Muhammad Rizwan Asghar, TzeHowe Lee, Mirza Mansoor Baig, Ehsan Ullah, Giovanni Russello, Gillian Dobbie

    Abstract: The emergence of New Data Sources (NDS) in healthcare is revolutionising traditional electronic health records in terms of data availability, storage, and access. Increasingly, clinicians are using NDS to build a virtual holistic image of a patient's health condition. This research is focused on a review and analysis of the current legislation and privacy rules available for healthcare professiona… ▽ More

    Submitted 1 November, 2017; originally announced November 2017.

    Comments: 5 pages, The 13th IEEE International Conference on eScience - Safe Data Workshop

  7. arXiv:1612.01787  [pdf, ps, other

    cs.CR

    PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale

    Authors: Muhammad Rizwan Asghar, Michael Backes, Milivoj Simeonovski

    Abstract: The management of identities on the Internet has evolved from the traditional approach (where each service provider stores and manages identities) to a federated identity management system (where the identity management is delegated to a set of identity providers). On the one hand, federated identity ensures usability and provides economic benefits to service providers. On the other hand, it poses… ▽ More

    Submitted 6 December, 2016; originally announced December 2016.

  8. arXiv:1608.05538  [pdf, ps, other

    cs.CR

    A Survey on Routing in Anonymous Communication Protocols

    Authors: Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar, Michael Backes, Claudia Diaz

    Abstract: The Internet has undergone dramatic changes in the past 15 years, and now forms a global communication platform that billions of users rely on for their daily activities. While this transformation has brought tremendous benefits to society, it has also created new threats to online privacy, ranging from profiling of users for monetizing personal information to nearly omnipotent governmental survei… ▽ More

    Submitted 19 August, 2016; originally announced August 2016.

    Comments: 24 pages, 4 tables, 4 figures

  9. arXiv:1506.06033  [pdf, ps, other

    cs.CR cs.CY cs.IR

    Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

    Authors: Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel

    Abstract: Search engines are the prevalently used tools to collect information about individuals on the Internet. Search results typically comprise a variety of sources that contain personal information -- either intentionally released by the person herself, or unintentionally leaked or published by third parties, often with detrimental effects on the individual's privacy. To grant individuals the ability t… ▽ More

    Submitted 19 June, 2015; originally announced June 2015.

  10. arXiv:1312.6393  [pdf, ps, other

    cs.CR

    Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments

    Authors: Muhammad Rizwan Asghar

    Abstract: The enforcement of sensitive policies in untrusted environments is still an open challenge for policy-based systems. On the one hand, taking any appropriate security decision requires access to these policies. On the other hand, if such access is allowed in an untrusted environment then confidential information might be leaked by the policies. The key challenge is how to enforce sensitive policies… ▽ More

    Submitted 22 December, 2013; originally announced December 2013.

    Comments: Ph.D. Dissertation. http://eprints-phd.biblio.unitn.it/1124/

  11. arXiv:1309.2869  [pdf, other

    cs.CY

    ACTORS: A Goal-driven Approach for Capturing and Managing Consent in e-Health Systems

    Authors: Muhammad Rizwan Asghar, Giovanni Russello

    Abstract: The notion of patient's consent plays a major role in granting access to medical data. In typical healthcare systems, consent is captured by a form that the patient has to fill in and sign. In e-Health systems, the paper-form consent is being replaced by the integration of the notion of consent in the mechanisms that regulate the access to the medical data. This helps in empowering the patient wit… ▽ More

    Submitted 11 September, 2013; originally announced September 2013.

    Comments: The final version of this paper has been published at POLICY 2012

  12. arXiv:1308.3489  [pdf, other

    cs.CR

    ESPOON$_{ERBAC}$: Enforcing Security Policies In Outsourced Environments

    Authors: Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo

    Abstract: Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of service than in-house solutions. Despite all its benefits, data outsourcing raises serious security concerns for preserving data confidentiality. Th… ▽ More

    Submitted 15 August, 2013; originally announced August 2013.

    Comments: The final version of this paper has been accepted for publication in Elsevier Computers & Security 2013. arXiv admin note: text overlap with arXiv:1306.4828

  13. arXiv:1306.4828  [pdf, other

    cs.CR

    ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments

    Authors: Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo

    Abstract: The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies. However, if such access is allowed in an untrusted environment then confidential information might be leaked by the policies. Current solutions are based on cryptographic operations that embed… ▽ More

    Submitted 20 June, 2013; originally announced June 2013.

    Comments: The final version of this paper has been published at ARES 2011