Devesh Jinwala

Devesh Jinwala
Sardar Vallabhbhai National Institute of Technology | SVNIT · Department Of Computer Engineering

PhD Computer Engineering

About

152
Publications
37,855
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,596
Citations
Citations since 2016
59 Research Items
1209 Citations
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200
Additional affiliations
January 1991 - present
Sardar Vallabhbhai National Institute of Technology
Position
  • Professor (Full)

Publications

Publications (152)
Chapter
The demand for data privacy is rapidly increasing with the growing volume of personal and sensitive information shared to compute mathematical functions. Some of the traditional data encryption techniques provide data privacy but fail in hassle-free sharing. Therefore, the third-party users can not perform mathematical computations over the data to...
Chapter
E-health is a cloud-based system to store and share medical data with the stakeholders. From a security perspective, the stored data are in encrypted form that could further be searched by the stakeholders through searchable encryption (SE). Practically, an e-health system with support of multiple stakeholders (that may work as either data owner [w...
Article
Full-text available
Internet of Things (IoT) is an internet of smart objects where smart objects communicate with each other. IoT objects are deployed in open medium with dynamic topology. Due lack of infrastructure and centralized management, IoT present serious vulnerabilities to security attacks. Therefore, security is an essential prerequisite for the real‐world d...
Chapter
E-health is a cloud-based system to store and share medical data with the stakeholders. From a security perspective, the stored data are in encrypted form that could further be searched by the stakeholders through searchable encryption (SE). Practically, an e-health system with support of multiple stakeholders (that may work as either data owner [w...
Article
The Wireless Sensor Networks (WSNs) used for the monitoring applications like pipelines carrying oil, water, and gas; perimeter surveillance; border monitoring; and subway tunnel monitoring form linear WSNs. Here, the infrastructure being monitored inherently forms linearity (straight line through the placement of sensor nodes). Therefore, such WSN...
Article
Internet of things (IoT) offers communication between user-to-machine and machine-to-machine. Due to their inherent characteristics of open medium, very dynamic topology, lack of infrastructure and lack of centralized management authority, IoT present serious vulnerabilities to security attacks. The routing protocol for low-power and lossy networks...
Article
Full-text available
When specifying user requirements, not only is it critical to ensure correct and unambiguous specification of functional requirements, but also that of Non-Functional Requirements (NFRs). A critical success factor in Requirements Engineering (RE) involves recognizing conflicts among NFRs specified by multiple stakeholders having differing concerns,...
Article
A blockchain is a decentralized, distributed, and often public, digital ledger system consisting of records called blocks, used to record transactions across many computers so that any involved block cannot be altered retroactively, without the alteration of all subsequent blocks. In literature, Blockchain is used as a medium to achieve trust betwe...
Chapter
With searchable encryption (SE), the user is allowed to extract partial data from stored ciphertexts from the storage server, based on a chosen query of keywords. A majority of the existing SE schemes support SQL search query, i.e. 'Select * where (list of keywords).' However, applications for encrypted data analysis often need to count data matche...
Article
Full-text available
The existing Key Aggregate Searchable Encryption (KASE) schemes allow searches on the encrypted dataset using a single query trapdoor, with a feature to delegate the search rights of multiple files using a constant size key. However, the operations required to generate the ciphertext and decrypt it in these schemes incur higher computational costs,...
Article
Full-text available
Delegation is a technique that allows a subject receiving a delegation (the delegatee) to act on behalf of the delegating subject (the delegator). Although the existing Key Aggregate Searchable Encryption (KASE) schemes support delegation of search rights over any set of ciphertexts using a key of constant-size, two critical issues still should be...
Article
In traditional public key searchable encryption (PKSE), a data owner (writer) utilizes data user’s (reader) public key to build ciphertexts. Thus, to share D data items (W keywords per item) with R readers, a writer suffers from \(O(R \cdot D \cdot W)\) computational overhead. Researchers then offer numerous schemes supporting multiple readers with...
Article
With searchable encryption (SE), the user is allowed to extract partial data from stored ciphertexts from the storage server, based on a chosen query of keywords. A majority of the existing SE schemes support SQL search query, i.e. 'Select * where (list of keywords).' However, applications for encrypted data analysis often need to count data matche...
Chapter
Full-text available
[Context and Motivation] A critical success factor in Requirements Engineering (RE) involves recognizing conflicts in Quality Requirements (QRs). Nowadays, Quality Attributes Relationship Matrix (QARM) is utilized to identify the conflicts in QRs. The static QARM represents how one Quality Attribute (QA) undermines or supports to achieve other QAs....
Article
The Key Aggregate Searchable Encryption (KASE) schemes serve the advantages of both, searching over the encrypted dataset and delegating search rights using a constant size key, opening up many possible applications that require both these features. In particular, searchable group data sharing in the cloud is a prime example. However, when the exis...
Article
The existing Key Aggregate Searchable Encryption (KASE) schemes allow searches on the encrypted dataset using a single query trapdoor, with a feature to delegate the search rights of multiple files using a constant size key. However, the limitation of the existing KASE schemes is, they only support the exact keyword match $ (Keyword = Value)$ searc...
Article
Full-text available
A critical success factor in requirements engineering involves recognizing conflicts in Non-functional requirements (NFRs). The recent approaches use Quality attributes relationship matrix (QARM) to identify conflicts in NFRs that represents how one quality attribute undermine (-) or support (+) achieving other types of quality attributes. However,...
Article
Access control mechanisms are a primary security requirement in Internet of Things applications. Traditional access control mechanisms are inefficient while applying directly to IoT applications. Various proposals have been made to adapt traditional access control models for IoT applications. These proposals are either centralized or distributed ap...
Article
Full-text available
Grid based sensor networks are significant for applications such as monitoring goods in a warehouse, studying traffic level of city streets, monitoring energy consumptions through smart meters deployed in a colony of houses. We propose a novel Key Predistribution Scheme (KPS) for networks where objects being monitored form a square grid. The confid...
Conference Paper
It is a usual practice for a user to narrate the Non-Functional Requirements (NFRs) in natural language and the requirements engineers manually try to express the same, using semi-formal or formal language notations. However, inaccurate and the laborious manual approach may fail to detect all potential NFRs and conflicts among them. Existing soluti...
Article
Nowadays, peer-to-peer (P2P) networks are widely accepted in multidimensional applications like social networking, multiplayer games, P2P e-learning, P2P mobile ad-hoc networks, etc. Various P2P overlay networks combining multidimensional indexing (MI) methods are preferable for efficient multidimensional point or range search in a distributed envi...
Chapter
In this article, the authors propose an approach for privacy preserving distributed clustering that assumes malicious model. In the literature, there do exist, numerous approaches that assume a semi honest model. However, such an assumption is, at best, reasonable in experimentations; rarely true in real world. Hence, it is essential to investigate...
Book
This book constitutes the refereed proceedings of the Second International Conference on Security and Privacy, ISEA-ISAP 2018, held in Jaipur, India, in January 2019. The conference was originally planned to be held in 2018 which is why the acronym contains "2018". The 21 revised full papers presented were carefully reviewed and selected from 87 su...
Article
Peer-to-Peer (P2P) applications such as content distribution and sharing (like file, audio, video), multiuser communication (games, desktop sharing, e-learning) have emerged as a new paradigm over a last decade. However, scalability requirements remain a major concern and hence, the distribution and effective search of multidimensional data have be...
Article
Recent attempts at Key Aggregate Searchable Encryption (KASE) combine the advantages of searching encrypted data with support for data owners to share an aggregate searchable key with a user delegating search rights to a set of data. A user, in turn, is required to submit only one single aggregate trapdoor to the cloud to perform a keyword search a...
Article
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are serious threats to the Internet. The frequency of DoS and DDoS attacks is increasing day by day. Automated tools are also available that enable non-technical people to implement such attacks easily. Hence, it is not only important to prevent such attacks, but also need to...
Article
The grid-based networks are formed by applications where objects being monitored form a square grid. These applications often demand critical security concerns as the compromise to the data yields adverse effects. There are indeed, several lightweight data aggregation schemes proposed in the literature that aims to minimize the resource overhead, a...
Article
IP traceback approaches have an important role to play in mitigating the attacks based on IP spoofing like Denial of service/Distributed denial of service attacks. Due to the obvious significance of such attacks, numerous approaches have been proposed in the literature. However, as per our observations, there is still a scope to improve the IP trac...
Conference Paper
The linear and grid based Wireless Sensor Networks (WSN) are formed by applications where objects being monitored are either placed in linear or grid based form. E.g. monitoring oil, water or gas pipelines; perimeter surveillance; monitoring traffic level of city streets, goods warehouse monitoring. The security of data is a critical issue for all...
Chapter
In recent years, there is an increase in the geographical and logical spread of data. Even the organizations competing with each other normally, increasingly collaborate with each other to exploit the distributed data and collaboratively undertake data mining therein. However, the increased sharing of data gives rise to privacy concerns as the coll...
Chapter
Deployments in hostile & unattended environments and non-replenishable energy supply have influenced the protocol design in wireless sensor networks. In-network processing of sensor readings helps in reducing the redundant reverse multicast traffic, communicated from leaf nodes to the base station. However, hostile deployments and in-network proces...
Chapter
A tremendous amount of personal data of an individual is being collected and analyzed using data mining techniques. Such collected data, however, may also contain sensitive data about an individual. Thus, when analyzing such data, individual privacy can be breached. Therefore, to preserve individual privacy, one can find numerous approaches propose...
Article
Full-text available
A Multiuser Searchable Encryption (MUSE) can be defined with the notion of Functional Encryption (FE) where a user constructs a search token from a search key issued by an Enterprise Trusted Authority (ETA). In such scheme, a user possessing search key constructs search token at any time and consequently requests the server to search over encrypted...
Article
Full-text available
There is a set of applications in wireless sensor networks that forms a particular topology through specific placements of sensor nodes. This set is known as linear infrastructure or one dimensional network. Applications of such networks are subway tunnel or pipeline monitoring and perimeter surveillance. These applications often demand critical se...
Chapter
It is imperative to address the issue of secure routing in mobile ad-hoc networks (MANETs) where the nodes seek for cooperative and trusted behaviour from the peer nodes in the absence of well-established infrastructure and centralized authority. Due to the inherent absence of security considerations in the traditional ad-hoc routing protocols, pro...
Article
Full-text available
Implementation of a P2P (Peer-to-Peer) overlay network directly on the realistic network environments is not a feasible initiative as scalability is a major challenge for P2P. The implementation of newly created P2P networks must be analyzed, well tested and evaluated through experiments by researchers and organizations. Various simulators have bee...
Article
Attribute Based Encryption is a technique that associates user's attributes with keys. Data is encrypted using a specific policy and only those keys whose attributes satisfy that policy are allowed to decrypt it. In this paper, we propose a secure communication model based on Cipher-text Policy Attribute Based Encryption (CP-ABE). This model allows...
Conference Paper
Internet Engineering Task Force (IETF) is working on 6LoW-PAN standard which allows smart devices to be connected to Internet using large address space of IPV6. 6LoWPAN acts as a bridge between resource constrained devices and the Internet. The entire IoT space is vulnerable to local threats as well as the threats from the Internet. Due to the rand...
Article
In CRYPTO'13, Gentry et al. proposed the first homomorphic encryption (HE) scheme for the attribute-based encryption (ABE). However, Gentry's scheme requires the same index for encryption of each ciphertext and supports only the key-policy ABE. Indeed, in SECRYPT'13, Clear et al. left an open problem in the Gentry et al. scheme viz. a scheme that r...
Research
Full-text available
High spatial resolution (better than 5 m) images of earth's surface acquired by a space-borne sensor are a valuable resource for various applications in the field of cartography, urban planning, disaster management and change detection. The images are acquired by specially designed imaging systems onboard a remote sensing satellite, having specific...
Conference Paper
We propose an aggregation scheme that provides expansiveness as well as confidentiality of data and a lightweight key pre-distribution for linear Wireless Sensor Networks (WSNs). Applications of linear WSNs are pipeline monitoring, subway tunnel monitoring, perimeter surveillance and border monitoring. For such applications, how connectivity plays...
Article
The objectives of concealed data aggregation are end-to-end privacy preservation and en route aggregation of reverse multicast traffic in wireless sensor networks. Privacy homomorphism has been used to realize these objectives together. Although privacy homomorphism helps in achieving conflicting objectives, namely, privacy and data aggregation, it...
Article
Full-text available
Software Engineering provides a standard way to develop and maintain a complex software. Industry uses software development Life Cycles (SDLC) to develop a software. SDLC plays an important role as it helps to define the software requirements, model the software component, reduce development and maintenance cost and finally provides manageable soft...
Article
In privacy preserving data mining, anonymization based approaches have been used to preserve the privacy of an individual. Existing literature addresses various anonymization based approaches for preserving the sensitive private information of an individual. The k-anonymity model is one of the widely used anonymization based approach. However, the...
Article
A tremendous amount of personal data of an individual is being collected and analyzed using data mining techniques. Such collected data, however, may also contain sensitive data about an individual. Thus, when analyzing such data, individual privacy can be breached. Therefore, to preserve individual privacy, one can find numerous approaches propose...
Conference Paper
Full-text available
In Internet of Things (IoT), several smart devices (accompanied with sensors) integrate real world information at central server. Providing security and privacy, the collected information can be used for various analytical tasks like mining of data, taking intelligent decision to control machines, issuing alerts/ notifications etc. In this paper, w...
Article
Privacy preservation while undertaking collaborative data mining is a significant research problem. The vertically partitioned data model is an important data partition model and has varied applications. The vertically partitioned data model necessitates a non-collusive scheme and an efficient scheme for the problem of privacy-preserving distribute...
Article
Full-text available
Requirements engineering activity often starts with the vaguely defined requirements. Hence, it is essential that when the requirements are analysed, the ambiguities are resolved to the extent possible. One of the attractive alternatives in resolving ambiguities is to convert the informal natural language requirements (NLRs) into their formal or se...
Conference Paper
Secure data aggregation aims at combining security and data aggregation together to meet the requirements of data-centric networks such as wireless sensor network. Secure data aggregation protocols provide either hop-by-hop security or end-to-end security. However, hop-by-hop secure data aggregation is vulnerable to attackers at intermediate nodes...
Article
Full-text available
Requirements Engineering is one of the most vital activities in the entire Software Development Life Cycle. The success of the software is largely dependent on how well the users' requirements have been understood and converted into appropriate functionalities in the software. Typically, the users convey their requirements in natural language state...
Article
Full-text available
Phishing is the process of acquiring sensitive information by masquerading as a sensitive entity. Such attacks in turn make it possible for an adversary to orchestrate Denial of Service (DOS) attacks or have sensitive data leaked from an application. With increasing reliance of people on internet based transactions, phishing attacks have also becom...
Article
The objective of concealed data aggregation is to achieve the privacy preservation at intermediate nodes while supporting in-network data aggregation. The need for privacy preservation at intermediate nodes and the need for data aggregation at intermediate nodes can be simultaneously realized using privacy homomorphism. Privacy homomorphism process...
Article
Full-text available
In this paper, we propose an approach that illustrates the application of Elliptic Curve Cryptography (ECC) in Privacy-preserving distributed K-Means Clustering over horizontally partitioned dataset. We believe that the conventional cryptographic approaches and secret sharing schemes for privacy-preserving distributed K-Means clustering, are not sc...
Article
Full-text available
The existing ontologies in the semantic web typically have anonymous union and intersection classes. The anonymous classes are limited in scope and may not be part of the whole inference process. The tools, namely, the pellet, the jena, and the protégé, interpret collection classes as (a) equivalent/subclasses of union class and (b) superclasses of...
Article
User satisfaction is recognized as an important contributor to the success of software applications. It is subjective and influenced by several factors that are linked to the non-functional requirements. Although non-functional requirements provide good criteria for selection of web service in Service-Oriented Architecture, specifying them during t...
Conference Paper
The Wireless Sensor Networks (WSNs) after their emergence have triggered many active research areas; not because of low-scale hardware design but also due to a wide spectrum of its potential applications being in day-to-day areas of our life. However, because of the ubiquitous and pervasive computing paradigm that the WSNs foster and because of the...
Article
Data aggregation is the most commonly used approach for extending the lifetime of the wireless sensor networks (WSNs). WSNs are exposed to events, errors and malicious activities which can cause unreliable and improper readings sent to the base station, often called as outlier values. These outlier values can indicate an emergency, for example, a r...
Article
In the structured peer-to-peer (P2P) overlay networks, multidimensional indexing (MI) methods have emerged to address principally the efficiency concerns of complex queries. As per our observations, a hybrid model that combines P2P m-ary tree overlay network with traditional MI methods is preferable as it reduces the cost of search operations from...
Article
Full-text available
In wireless sensor networks, secure data aggregation protocols target the two major objectives, namely, security and en route aggregation. Although en route aggregation of reverse multi-cast traffic improves energy efficiency, it becomes a hindrance to end-to-end security. Concealed data aggregation protocols aim to preserve the end-to-end privacy...
Conference Paper
Ciphertext policy attribute based encryption (CP-ABE) is a technique in which a user with secret key containing attributes is only able to decrypt the message if the attributes in the policy match with the attributes in secret key. Therefore, CP-ABE is suitable for some interesting applications such as cloud computing which requires both security a...
Article
Full-text available
Privacy Preservation while undertaking collaborative Distributed Frequent Itemset Mining (PPDFIM) is an important research direction. The current state-of-the-art for privacy preservation in distributed frequent itemset mining for secure sum in a horizontally partitioned data model comprises primarily of public key based homomorphic schemes which a...
Article
Privacy Preservation while undertaking collaborative Distributed Frequent Itemset Mining (PPDFIM) is an important research direction. The current state-of-the-art for privacy preservation in distributed frequent itemset mining for secure sum in a horizontally partitioned data model comprises primarily of public key based homomorphic schemes which a...
Article
In PKC 2010, Herranz et al. proposed the first fully threshold ciphertext policy attribute-based encryption (CP-ABE) scheme with constant length ciphertext. However, their scheme is selectively secure with respect to the chosen plaintext attack. They have left three open problems for CP-ABE with constant ciphertext length, that is, Security against...
Article
With digital data being abundant in today’s world, competing organizations desire to gain insights about the market, without putting the privacy of their confidential data at risk. This paper provides a new dimension to the problem of Privacy Preserving Distributed Association Rule Mining (PPDARM) by extending it to a distributed temporal setup. It...
Article
Full-text available
In privacy preserving data mining, the l -diversity and k -anonymity models are the most widely used for preserving the sensitive private information of an individual. Out of these two, l -diversity model gives better privacy and lesser information loss as compared to the k -anonymity model. In addition, we observe that numerous clustering algorith...
Article
Data aggregation based on in-network processing is useful in improving the communications overhead in Wireless Sensor Networks (WSNs) by reducing the overall number of packets communicated to the base station. However, due to the fusion of data items sourced at different nodes into a single one, the security of the aggregated data as well as that o...
Conference Paper
Concealed data aggregation protects against passive attackers and ensures privacy of sen