Dissertations
Doctor of Philosophy
Title: Oblivious Computation in Public Cloud for Privacy-aware Access Control Policies and Data Search
Keywords: Oblivious computation, Access control enforcement, Encrypted data search, Cloud storage
My doctoral dissertation was focused on privacy issues of cloud-based data sharing services. It proposed an oblivious computation to enforce access control policies within the untrusted domain of a cloud service provider. It also contributed an encrypted data search methodology, which ensures that encrypted data can be searched obliviously by using conjunctive queries. Unlike conventional methodologies, access control policies and encrypted search queries were evaluated by an untrusted cloud service provider without compromising privacy of the outsourced data and personal information of service subscribers.
Download Thesis
Keywords: Oblivious computation, Access control enforcement, Encrypted data search, Cloud storage
My doctoral dissertation was focused on privacy issues of cloud-based data sharing services. It proposed an oblivious computation to enforce access control policies within the untrusted domain of a cloud service provider. It also contributed an encrypted data search methodology, which ensures that encrypted data can be searched obliviously by using conjunctive queries. Unlike conventional methodologies, access control policies and encrypted search queries were evaluated by an untrusted cloud service provider without compromising privacy of the outsourced data and personal information of service subscribers.
Download Thesis
Master in Information Technology
Title: Semblance Based Disseminated Software Watermarking
Keywords: Software watermarking, Software piracy, Reverse Engineering
This dissertation proposed a software watermarking algorithm, which injected dummy instructions that were scattered in the entire source code. For an attacker it was non-trivial to remove watermark through reverse engineering, since it could not differentiate between watermark instructions and actual source code.
Download Thesis
Keywords: Software watermarking, Software piracy, Reverse Engineering
This dissertation proposed a software watermarking algorithm, which injected dummy instructions that were scattered in the entire source code. For an attacker it was non-trivial to remove watermark through reverse engineering, since it could not differentiate between watermark instructions and actual source code.
Download Thesis