Muhammad Umer Arshad - Purdue University
Students: Spring 2022, unless noted otherwise, sessions will be virtual on Zoom.
Trust Management for Publishing Graph Data
Nov 20, 2013Download: MP4 Video Size: 182.2MB
Watch on YouTube
AbstractUse of graph-structured data models is on the rise -- in graph databases, in representing biological and healthcare data as well as geographical data.
In order to secure graph-structured data, and develop cryptographically secure schemes for graph databases, it is essential to formally define and develop suitable collision resistant one-way hashing schemes and show them they are efficient. The widely used Merkle hash technique is not suitable, because graphs may be directed acyclic ones or cyclic ones.
In this talk, we will address this problem. In particular, we:
(1) discuss the practical and formal security model of hashing schemes for graphs,
(2) present the formal security model of perfectly secure hashing schemes,
(3) describe constructions of hashing and perfectly secure hashing of graphs,
and (4) present performance results for the constructions.
We use graph traversal techniques, which are highly efficient for hashing, redaction, and verification of hashes graphs. We have implemented the proposed schemes. Performance analysis on both real and synthetic graph data sets support the viability of our approach.
About the Speaker
Umer received his MS and BS degrees in ECE from University of Engineering and Technology, Lahore, Pakistan in 2005 and 2002 respectively. Currently he is doctoral student in the School of ECE, Purdue University. His research interests are in the area of distributed systems and information security.