James B. D. Joshi

James B. D. Joshi
University of Pittsburgh | Pitt · School of Computing and Information

PhD, Purdue University

About

223
Publications
94,952
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,412
Citations
Additional affiliations
August 2008 - December 2015
University of Pittsburgh
Position
  • Professor (Associate)
January 2004 - December 2008
University of Pittsburgh
August 1998 - July 2003
Purdue University
Education
August 1989 - August 1993
Motilal Nehru National Institute of Technology
Field of study
  • Computer Science and Engineering

Publications

Publications (223)
Preprint
Full-text available
Machine learning (ML) is increasingly being adopted in a wide variety of application domains. Usually, a well-performing ML model, especially, emerging deep neural network model, relies on a large volume of training data and high-powered computational resources. The need for a vast volume of available data raises serious privacy concerns because of...
Preprint
With rapid advances in computing systems, there is an increasing demand for more effective and efficient access control (AC) approaches. Recently, Attribute Based Access Control (ABAC) approaches have been shown to be promising in fulfilling the AC needs of such emerging complex computing environments. An ABAC model grants access to a requester bas...
Article
Full-text available
Training a machine learning model over an encrypted dataset is an existing promising approach to address the privacy-preserving machine learning task, however, it is extremely challenging to efficiently train a deep neural network (DNN) model over encrypted data for two reasons: first, it requires large-scale computation over huge datasets; second,...
Preprint
Full-text available
Federated learning (FL) has been proposed to allow collaborative training of machine learning (ML) models among multiple parties where each party can keep its data private. In this paradigm, only model updates, such as model weights or gradients, are shared. Many existing approaches have focused on horizontal FL, where each party has the entire fea...
Preprint
Full-text available
Increasingly, information systems rely on computational, storage, and network resources deployed in third-party facilities or are supported by service providers. Such an approach further exacerbates cybersecurity concerns constantly raised by numerous incidents of security and privacy attacks resulting in data leakage and identity theft, among othe...
Article
With the rapid advances in computing and information technologies, traditional access control models have become inadequate in terms of capturing fine-grained, and expressive security requirements of newly emerging applications. An attribute-based access control (ABAC) model provides a more flexible approach to addressing the authorization needs of...
Preprint
Full-text available
Training a machine learning model over an encrypted dataset is an existing promising approach to address the privacy-preserving machine learning task, however, it is extremely challenging to efficiently train a deep neural network (DNN) model over encrypted data for two reasons: first, it requires large-scale computation over huge datasets; second,...
Preprint
Full-text available
Increasing incidents of security compromises and privacy leakage have raised serious privacy concerns related to cyberspace. Such privacy concerns have been instrumental in the creation of several regulations and acts to restrict the availability and use of privacy-sensitive data. The secure computation problem, initially and formally introduced as...
Chapter
Full-text available
As the world population grows along with an increase in urbanization, cities are getting more and more populated and increasing demands on various natural and man-made resources. Making cities smart through the appropriate application of the plethora of innovative new technologies and paradigms would help mollify potential environmental problems/co...
Article
Full-text available
Recent advances in cryptographic approaches, such as Functional Encryption and Attribute-based Encryption and their variants, have shown significant promise for enabling public clouds to provide secure computation and storage services for users’ sensitive data. A crucial component of these approaches is a third-party authority (TPA) that must be tr...
Article
Full-text available
Cyber-physical systems (CPSs) integrate cyber components and physical processes. This integration enhances the capabilities of physical systems by incorporating intelligence into objects and services. On the other hand, the integration of cyber and physical components and the interaction between them introduce new security threats. Since CPSs are m...
Preprint
With the rapid advances in computing and information technologies, traditional access control models have become inadequate in terms of capturing fine-grained, and expressive security requirements of newly emerging applications. An attribute-based access control (ABAC) model provides a more flexible approach for addressing the authorization needs o...
Article
Individuals, organizations, and government agencies are increasingly relying on Internet-enabled collaboration among distributed teams of humans, computer applications, and autonomous entities such as robots to develop products and deliver services. Technology trends in areas such as networking, data analytics, and distributed systems have signific...
Article
Full-text available
Recent advances in information technologies have facilitated applications to generate, collect or process large amounts of sensitive personal data. Emerging cloud storage services provide a better paradigm to support the needs of such applications. Such cloud based solutions introduce additional security and privacy challenges when dealing with out...
Preprint
Full-text available
Emerging neural networks based machine learning techniques such as deep learning and its variants have shown tremendous potential in many application domains. However, they raise serious privacy concerns due to the risk of leakage of highly privacy-sensitive data when data collected from users is used to train neural network models to support predi...
Book
This book constitutes the refereed proceedings of the Second International Conference on Blockchain, ICBC 2019, held as part of the Services Conference Federation, SCF 2019, in San Diego, CA, USA, in June 2019. The 13 full papers and 2 short papers presented were carefully reviewed and selected from 29 submissions. The papers cover a wide range of...
Article
Cloaking-based location privacy preserving mechanisms have been widely proposed to protect users’ location privacy when using location-based services. A fundamental limitation of such mechanisms is that users and their location information in the system are inherently trusted by the Anonymization Server without any verification. In this paper, we s...
Conference Paper
Full-text available
WiFi networks often seek to reduce interference through network planning, macroscopic self-organization (e.g. channel switching) or network management. In this paper, we explore the use of historical data to automatically predict traffic bottlenecks and make rapid decisions in a wireless (WiFi-like) network on a smaller scale. This is now possible...
Article
Full-text available
WiFi networks are often planned to reduce interference through planning, macroscopic self-organization (e.g. channel switching) or network management. In this paper, we explore the use of historical data to automatically predict traffic bottlenecks and make rapid decisions in a wireless (WiFi-like) network on a smaller scale. This is now possible w...
Article
The transition from response to recovery in Nepal following the 25 April and 12 May 2015 earthquakes represents an unusual set of tensions among political, economic, geographic, social, technical, and physical constraints. We examine this set of tensions in interorganizational, interjurisdictional decision making to assess how interlocking constrai...
Preprint
BACKGROUND The widespread application of technologies such as electronic health record systems, mobile health apps, and telemedicine platforms, has made it easy for health care providers to collect relevant data and deliver health care regimens. While efficacious, these new technologies also pose serious security and privacy challenges. OBJECTIVE...
Article
Insider attacks are among the most dangerous and costly attacks to organizations. These attacks are carried out by individuals who are legitimately authorized to access the system. Preventing insider attacks is a daunting task. The recent proliferation of social media and mobile devices offer new opportunities to collect geo-social information that...
Article
Presents the introductory editorial for this issue of the publication.
Conference Paper
Full-text available
Recent advances in IT have enabled many applications that generate/collect huge amounts of personal data. While these advances have made many personalized applications such as personalized user-centric healthcare possible there are significant system maintenance cost related to data management, and security and privacy issues that need to be first...
Article
A new paradigm, which is at the early stage of inception, is reshaping global healthcare services with emphasis shifting from sporadic acute health care to continuous and integrated health care-an approach being further perfected as anywhere, anytime healthcare services. Recent advances in e-health informatics, digital transformation and remote dat...
Article
Full-text available
Intimate partner violence (IPV) is a public health problem. The purpose of this study was to compare the effectiveness of the HELPP (Health, Education on Safety, and Legal Support and Resources in IPV Participant Preferred) intervention among IPV survivors. A sequential, transformative mixed-methods design was used. Participants were randomly assig...
Chapter
Mobile cloud computing has grown out of two hot technology trends, mobility and cloud. The emergence of cloud computing and its extension into the mobile domain creates the potential for a global, interconnected mobile cloud computing environment that will allow the entire mobile ecosystem to enrich their services across multiple networks. We can u...
Article
Cloaking-based location privacy preserving mechanisms have been widely adopted to protect users’ location privacy while traveling on road networks. However, a fundamental limitation of such mecha- nisms is that users in the system are inherently trusted and assumed to always report their true locations. Such vulnerability can lead to a new class of...
Article
In a social network system, a friendship relation between two users is usually represented by an undirected link and it is visible in both users' friend lists. Such a dual visibility of a friendship link may raise privacy threats. This is because both the users of a friendship link can separately control its visibility to other users and their pref...
Article
Full-text available
IntroductionGiven the emerging global Information-centric IT landscape that has tremendous social and economic implications, effectively processing and integrating huge volumes of information from diverse sources to enable effective decision making and knowledge generation have become one of the most significant challenges of current times. This sp...
Article
The User Authorization Query (UAQ) Problem for RBAC is to determine whether there exists an optimum set of roles to be activated to provide a particular set of permissions requested by a user. It is a key issue related to efficiently handling users’ access requests. Previous definitions of the UAQ problem have considered only the optimization objec...
Conference Paper
Full-text available
The ubiquity of low-cost GPS-enabled mobile devices and the proliferation of online social networks have enabled the collection of rich geo-social information that includes the whereabouts of the users and their social connections. This information can be used to provide a rich set of access control policies that ensure that resources are utilized...
Conference Paper
Full-text available
The success in detecting Distributed Denial of Service (DDoS) flooding attacks is highly dependent on the quality and quantity of the covered flows by the traffic monitoring mechanism that is employed in any DDoS defense mechanism. In this paper, we propose DiCoTraM, a DDoS flooding attack tailored distributed and coordinated traffic monitoring mec...
Article
Full-text available
Destructive relationship behavior directed from one party to another in domestic relationships, both physical and emotional, is a common problem. When the behavior occurs in intimate relationships this is called intimate partner violence (IPV). There are many resources available to survivors of IPV in getting out of abusive situations, but the info...
Data
Full-text available
The inter-operation among heterogeneous wireless networks is crucial to support ubiquitous mobility and seamless roaming. Handoffs across wireless networks in separate administrative domains should ensure uninterrupted service and authenticity of the entities involved. However, the re-authentication of a mobile node (MN) during a handoff across adm...
Article
Analysis of users’ check-ins in location-based social networks (LBSNs, also called GeoSocial Networks), such as Foursquare and Yelp, is essential to understand users’ mobility patterns and behaviors. However, most empirical results of users’ mobility patterns reported in the current literature are based on users’ sampled and nonconsecutive public c...
Chapter
A computer-implemented method for authorizing a user request from a user to perform an action with respect to one of at least one of the plurality of nodes and at least one of the plurality of packages of a cluster is disclosed. The user request is received from a host coupled to communicate with the cluster. The method includes consulting an autho...
Conference Paper
Understanding users' behavior in Location-based Social Networks (LBSNs) is becoming an interesting research topic. In LBSNs, users can explore the places of interest around their current locations, check in at these locations and share such check-ins with their friends or the public. Therefore, the check-ins are valuable information for studying us...
Article
Full-text available
Distributed Denial of Service (DDoS) flooding attacks are one of the top concerns for security professionals. DDoS flooding attacks are typically explicit attempts to disrupt legitimate users’ access to services. Attackers usually gain access to a large number of computers by exploiting their vulnerabilities to set up attack armies (i.e., Botnets)....
Article
Insider Attacks are one of the most dangerous threats organizations face today. An insider attack occurs when a person authorized to perform certain actions in an organization decides to abuse the trust, and harm the organization. These attacks may negatively impact the reputation of the organization, its productivity, and may produce losses in rev...
Article
In an undirected social graph, a friendship link involves two users and the friendship is visible in both the users' friend lists. Such a dual visibility of the friendship may raise privacy threats. This is because both users can separately control the visibility of a friendship link to other users and their privacy policies for the link may not be...
Chapter
Full-text available
Mobile cloud computing has grown out of two hot technology trends, mobility and cloud. The emergence of cloud computing and its extension into the mobile domain creates the potential for a global, interconnected mobile cloud computing environment that will allow the entire mobile ecosystem to enrich their services across multiple networks. We can u...
Article
Recently, we have seen a rapid growth of social networking systems (SNSs). In most SNSs, a user can configure his privacy settings to indicate who can or cannot see his friend list. Usually, SNSs, such as LinkedInand Google Plus, also include a feature that allows a user to query mutual friends between him and any other user he can reach using the...
Article
The rapid growth of online social networks (OSNs) has brought a revolutionary change in the way geographically dispersed people interact and cooperate with each other toward achieving some common goals. Recently, new ways of ad-hoc cooperation have been demonstrated during the hurricane Irene and the earthquake in Japan. In such emergency situation...
Conference Paper
Location-Based Social Networks (LBSNs), (also called as Geo-Social Networks), has been attracting more and more users by providing services that integrate social activities with location information. LBSN systems usually provide support for indicating various Points of Interest (POIs) but there is no straightforward rating mechanism for POIs in mos...
Conference Paper
Recently, the importance of including obligations as part of access control systems for privilege management, for example, in healthcare information systems, has been well recognized. In an access control system, an a posteriori obligation states which actions need to be performed by a user after he has accessed a resource. There is no guarantee th...
Chapter
Full-text available
In this paper we outline the security requirements for any infrastructure that facilitates secure location based services over the Internet. We describe an architecture that allows the provisioning of location based services, and consider security requirements for guaranteeing privacy to end users.
Conference Paper
In this paper, we propose a framework to formally analyze what privacy-sensitive information is protected by the stated policies of a Social Networking System (SNS), based on an expression of ideal protection policies for a user. Our ontology-based framework can capture complex and fine-grained privacy-sensitive information in SNSs, and find out mi...
Article
Full-text available
The emerging vehicular networks are targeted to provide efficient communications between mobile vehicles and fixed roadside units (RSU), and support mobile multimedia applications and safety services with diverse quality of service (QoS) requirements. ...
Article
Full-text available
Geosocial networks such as Foursquare have access to users' location information, friendships, and other potentially privacy sensitive information. In this paper, we show that an attacker with access to a naively-anonymized geosocial network dataset can breach users' privacy by considering location patterns of the target users. We study the problem...
Conference Paper
Dating violence is a type of Intimate Partner Violence (IPV) which is a serious, preventable public health and social justice issue. If dating violence is left unchecked, it can bring short term and long term negative effects to survivors, especially college students who are developing emotionally. We built a mobile application called HELPP Zone (H...
Conference Paper
Recently, social media has become an increasingly important part of business and marketing. More and more businesses use social media as part of their marketing platforms. Moreover, the fast development of the 4th generation mobile network and the ubiquity of the advanced mobile devices in which GPS modules are embedded promote the location-based s...
Article
Cloud computing paradigm has recently gained tremendous momentum. It has been found very promising for significant cost reduction and the increased operating efficiencies in computing. However, security and privacy issues pose as the key roadblock to its rapid adoption. In this chapter, the authors present the security and privacy challenges in Clo...
Chapter
Cloud computing paradigm is still an evolving paradigm but has recently gained tremendous momentum due to its potential for significant cost reduction and increased operating efficiencies in computing. However, its unique aspects exacerbate security and privacy challenges that pose as the key roadblock to its fast adoption. Cloud computing has alre...
Article
Social networks are attracting significant interest from researchers in different domains, especially with the advent of social network