Publications ›› Papers ›› Data Privacy
A-Contributory-Public-Event-img

A Contributory Public-Event Recording and Querying System

Authors: Arun Joseph, Nikita Yadav, Vinod Ganapathy, Dushyant Behl Know more CCTV (Closed-Circuit Television) systems are commonly used for security and surveillance. They provide a visual record of events, which can be used to monitor criminal activity, support investigations, and improve public safety. Many cities have implemented a number of cameras for surveillance, with Delhi, […]

Integrating-Crypto-Based-Payment-img

Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy

Authors: V. Walunj, V. Rajaraman, J. Dutta, A. Sharma Know more Data exchanges as Digital Public Infrastructures drive data-driven economies by enhancing efficiency, enabling revenue streams, and facilitating data monetization. This work explores integrating crypto-based payments into platforms like IUDX and ADeX, offering benefits such as enhanced security, lower fees, and decentralized control. Key focus […]

What-makes-consent-meaningful-img

What makes consent meaningful?

Authors: Asilata Know more This paper seeks to examine the concept of meaningfulness of consent with a focus on consent in digital transactions. To that end, it proposes a “consent matrix”, depicting the structure of consent transactions across two dimensions- the realm of consent-objects and the modes of obtaining consent. The matrix maps the two […]

Consent Service Architecture for Policy-Based Consent Management in Data Trusts

Authors: Balambiga, Rohith, Srinath, Santosh, Srinivas Know more Data trusts handle data in a fiduciary capacity for data owners, allowing them to process, aggregate and share data with other stakeholders within an overarching legal and ethical framework. One of the primary challenges of data trusts is consent management. This paper characterizes the problem of consent […]

Extensible Consent Management Architectures for Data Trusts

Authors: Balambiga, Srinath, Rohith, Jayati Know more Sensitive personal information of individuals and non-personal information of organizations or communities often needs to be legitimately exchanged among different stakeholders, to provide services, maintain public health, law and order, and so on. While such exchanges are necessary, they also impose enormous privacy and security challenges. Data protection […]

Graphiti: Secure Graph Computation Made More Scalable

Authors: Koti, N., Kukkala, V. B., Patra, A., & Raj Gopal, B. Know more Privacy-preserving graph analysis allows performing computations on graphs that store sensitive information, while ensuring all the information about the topology of the graph as well as data associated with the nodes and edges remains hidden. The current work addresses this problem […]

Ruffle: Rapid 3-party shuffle protocols

Authors: Koti, N., Kukkala, V. B., Patra, A., Gopal, B. R., & Sangal, S Know more Secure shuffle is an important primitive that finds use in several applications such as secure electronic voting, oblivious RAMs, secure sorting, to name a few. For time-sensitive shuffle-based applications that demand a fast response time, it is essential to […]

Vogue: Faster computation of private heavy hitters

Authors: Jangir, P., Koti, N., Kukkala, V. B., Patra, A., Gopal, B. R., & Sangal, S Know more Consider the problem of securely identifying τ -heavy hitters, where given a set of client inputs, the goal is to identify those inputs which are held by at least τ clients in a privacy-preserving manner. Towards this, […]

Shield: Secure Allegation Escrow System with Stronger Guarantees

Authors: Koti, N., Kukkala, V. B., Patra, A., & Gopal, B. R Know more The rising issues of harassment, exploitation, corruption, and other forms of abuse have led victims to seek comfort by acting in unison against common perpetrators (e.g., #MeToo movement). One way to curb these issues is to install allegation escrow systems that […]

Find thy neighbourhood: Privacy-preserving local clustering.

Authors: Koti, Nishat, Varsha Bhat Kukkala, Arpita Patra, and Bhavish Raj Gopal Know more Identifying a cluster around a seed node in a graph, termed local clustering, finds use in several applications, including fraud detection, targeted advertising, community detection, etc. However, performing local clustering is challenging when the graph is distributed among multiple data owners, […]

Pentagod: Stepping beyond traditional god with five parties

Authors: Koti, N., Kukkala, V. B., Patra, A., & Raj Gopal, B. Know more Secure multiparty computation (MPC) is increasingly being used to address privacy issues in various applications. The recent work of Alon et al. (CRYPTO’20) identified the shortcomings of traditional MPC and defined a Friends-and-Foes (FaF) security notion to address the same. We […]