Muhammad Umer Arshad - Purdue University

Nov 20, 2013

Size: 182.2MB

Download: Video Icon MP4 Video  
Watch in your Browser   Watch on Youtube Watch on YouTube

"Trust Management for Publishing Graph Data"

Abstract

Use of graph-structured data models is on the rise -- in graph databases, in representing biological and healthcare data as well as geographical data.
In order to secure graph-structured data, and develop cryptographically secure schemes for graph databases, it is essential to formally define and develop suitable collision resistant one-way hashing schemes and show them they are efficient. The widely used Merkle hash technique is not suitable, because graphs may be directed acyclic ones or cyclic ones.
In this talk, we will address this problem. In particular, we:
(1) discuss the practical and formal security model of hashing schemes for graphs,
(2) present the formal security model of perfectly secure hashing schemes,
(3) describe constructions of hashing and perfectly secure hashing of graphs,
and (4) present performance results for the constructions.
We use graph traversal techniques, which are highly efficient for hashing, redaction, and verification of hashes graphs. We have implemented the proposed schemes. Performance analysis on both real and synthetic graph data sets support the viability of our approach.

About the Speaker

Umer received his MS and BS degrees in ECE from University of Engineering and Technology, Lahore, Pakistan in 2005 and 2002 respectively. Currently he is doctoral student in the School of ECE, Purdue University. His research interests are in the area of distributed systems and information security.

Unless otherwise noted, the security seminar is held on Wednesdays at 4:30P.M. STEW G52 (Suite 050B), West Lafayette Campus. More information...

Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information