9 results on '"Snehkumar Shahani"'
Search Results
2. Selection and Verification of Privacy Parameters for Local Differentially Private Data Aggregation.
- Author
-
Snehkumar Shahani, Jibi Abraham, and R. Venkateswaran
- Published
- 2021
- Full Text
- View/download PDF
3. Cost-based recommendation of parameters for local differentially private data aggregation.
- Author
-
Snehkumar Shahani, R. Venkateswaran, and Jibi Abraham
- Published
- 2021
- Full Text
- View/download PDF
4. Selection and Verification of Privacy Parameters for Local Differentially Private Data Aggregation
- Author
-
R. Venkateswaran, Snehkumar Shahani, and Jibi Abraham
- Subjects
Data collection ,Computer science ,media_common.quotation_subject ,computer.software_genre ,Variety (cybernetics) ,Data aggregator ,Negotiation ,Data acquisition ,Domain knowledge ,Data mining ,Value (mathematics) ,computer ,Selection (genetic algorithm) ,media_common - Abstract
Acquiring and aggregating data from a group of individuals is crucial for studying their general behavior. Differentially Private (DP) techniques, characterized by the parameter ϵ, help to protect Individually Identifiable Data (IID) of individuals participating in such data collection. However, such techniques affect the usefulness of the data leading to a trade-off between usefulness and privacy, thereby making the selection of ϵ an important problem before data acquisition. In this work, we use a mathematical formalism to estimate usefulness and privacy for sum query as aggregate analysis for the local model of privacy. The mathematical relation enables the application of a variety of optimization techniques, discussed in the work, to select an optimal value of ϵ. Existing methods for selecting ϵ are based on financial parameters, but they heavily rely on past data and domain knowledge which may not be available in many cases. To address this, we have provided Knee-point based recommendations along with a selection criterion to choose the method of recommendation depending on the availability of information. This allows analysts to take enlightened decisions while negotiating the value of ϵ. Our experiments on synthetic and real-world datasets unambiguously demonstrate the strength of the mathematical model and the recommended values
- Published
- 2021
- Full Text
- View/download PDF
5. Validation and Feasibility of Differentially Private Local Aggregation of Real-Time Data Streams from Resource-Constrained Healthcare IoT Edge Devices
- Author
-
Niramay Vaidya, Snehkumar Shahani, Jibi Abraham, and Srishti Shelke
- Subjects
Scheme (programming language) ,Fitness Trackers ,Resource (project management) ,Edge device ,Computer science ,Distributed computing ,Differential privacy ,Real-time data ,computer ,Aggregate function ,computer.programming_language ,Domain (software engineering) - Abstract
Differential privacy (DP) techniques provide important mathematical guarantees of privacy and in particular local DP mechanisms used to protect individual privacy without needing to trust any external entity. However, validation of these techniques is usually carried out using static datasets since IoT devices generating real-time streaming data pose additional difficulties. Hence, current work aims to validate the effectiveness of one such scheme, Privacy-Preserving Endpoint Aggregation (PPEA), on real-time private data obtained from resource-constrained edge devices by measuring utility metrics for the average operation aggregate function. This paper aims to study the feasibility of implementing PPEA for periodic real-time heart rate collection from fitness trackers, which are pervasive IoT devices within the personal healthcare domain capable of recording individual's private data, by considering factors like memory consumption, execution time, and power consumption. We address challenges concerning resource limitations on edge devices regarding lacking out-of-the-box provisions for implementing randomization techniques to achieve DP on streaming data.
- Published
- 2021
- Full Text
- View/download PDF
6. Automation Framework for testing Dynamic Configurable tool
- Author
-
Atul Pawar, Kalyani Bhase, Alka Choudhary, Snehkumar Shahani, Sharvari Kulkarni, and Simran Bandwal
- Subjects
010302 applied physics ,Unit testing ,business.industry ,Computer science ,Human error ,02 engineering and technology ,01 natural sciences ,Automation ,Software ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Test suite ,Web application ,020201 artificial intelligence & image processing ,Software system ,Literature survey ,business ,Software engineering - Abstract
For the success of any software system thorough testing and verification is very important. The acceptance of the software by the users and the term for usage depends on how well it works. For this purpose testing is an essential step. However, testing to find defects or bugs is time- consuming, expensive and has a high possibility of human error. In Automated testing, software tools are used to run detailed, repetitive, and data-intensive tests automatically. In this work we focus on identifying best tool for testing a Dynamic and Configurable web app. We provide a thorough literature survey of the various testing tools available for testing MEAN (Mongo Express Angular Node) applications. As a part of this work an Automation Test Suite is developed to test Dynamic and Configurable MEAN application.
- Published
- 2019
- Full Text
- View/download PDF
7. Cost-based recommendation of parameters for local differentially private data aggregation
- Author
-
Jibi Abraham, R. Venkateswaran, and Snehkumar Shahani
- Subjects
General Computer Science ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,Task (project management) ,Data aggregator ,Set (abstract data type) ,Data acquisition ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Data mining ,Focus (optics) ,Law ,computer - Abstract
The ability to analyze personal data for a group of individuals without compromising their respective privacy has been a focus of significant research in recent years. For such analyses, data analysts need to acquire data from individuals without revealing their Individually Identifiable Data (IID). Well established Differentially Private techniques, characterized by privacy parameters ( ϵ , δ ) , transform the data to protect the IID. However, such transformations adversely affect the usefulness of data leading to a trade-off between usefulness and privacy. Therefore, negotiating appropriate values of privacy parameters before data acquisition is a challenging task for data analysts. Most of the work, in selecting values of privacy parameters, is either based on constraining all other parameters or they provide a set of acceptable values. Here also the problem of selecting the best value from the set of acceptable values is left to the analyst. A major contribution of this paper is the method of identifying the best value of privacy parameters in a trade-off between usefulness and privacy by introducing a cost-based model, thereby addressing the issue. To enable estimation of usefulness and its cost before data acquisition, we have mathematically modeled utility in terms of data and privacy parameters. We have considered standard statistical aggregates such as Sum, Mean and Standard Deviation as compared to most of the existing works that consider only Count query as aggregate analysis. The correctness of our mathematical estimation has been validated on a diverse set of synthetic and real-world datasets spanning popular data distributions.
- Published
- 2021
- Full Text
- View/download PDF
8. Privacy Preserving Data Aggregation on Secure Cloud
- Author
-
Snehkumar Shahani, Shubham Shah, Saket Komawar, Jibi Abraham, and Mayur Batwal
- Subjects
business.industry ,Computer science ,Data_MISCELLANEOUS ,Homomorphic encryption ,Cloud computing ,Plaintext ,02 engineering and technology ,Encryption ,Computer security ,computer.software_genre ,01 natural sciences ,Data aggregator ,010104 statistics & probability ,Transformation (function) ,020204 information systems ,Computer data storage ,0202 electrical engineering, electronic engineering, information engineering ,Differential privacy ,0101 mathematics ,business ,computer - Abstract
Secure Cloud is a cloud based data storage and computation service that works on Encrypted data without inferring any knowledge out of it. However on such secure cloud in order to perform Privacy Preserving analysis it is necessary to decrypt that data and then perform Privacy Preserving transformation. The proposed solution provides a way to perform Privacy Preserving transform on secure cloud without decrypting it. This is done by applying appropriate Differential Privacy techniques along with Homomorphic transform. The experimentation results done over the encrypted data are consistent with the utility-privacy trade-off in Differential Privacy approach on plaintext which states that the utility of data decreases as the privacy increases.
- Published
- 2018
- Full Text
- View/download PDF
9. Privacy preserving vehicular trajectory prediction
- Author
-
Aartee Kasliwal, Jibi Abraham, Purwa Gaikwad, Tejaswi Kale, and Snehkumar Shahani
- Subjects
050210 logistics & transportation ,Information privacy ,Privacy software ,Computer science ,End user ,05 social sciences ,Service provider ,computer.software_genre ,0502 economics and business ,Location-based service ,ComputingMilieux_COMPUTERSANDSOCIETY ,Differential privacy ,Data mining ,Personally identifiable information ,computer ,Structured systems analysis and design method - Abstract
Location based services (LBS) provide many valuable and important services for end users but reveal information about personal location to potentially untrustworthy service providers which could pose privacy concerns. The information about exact path followed by a person is highly personal and can be used to uniquely identify a person. Such information is known as personally identifiable information (PII). Disclosing such information can be considered as breach of privacy. Data needs to be transformed in such a way that either PII is removed or cannot be inferred preserving the accuracy of inferences at the same time. Differential Privacy [1] is a widely used techniques for removing PII from the data. It aims to provide means to maximize the accuracy of queries from statistical databases while minimizing the chances of identifying its records. This work aims at studying the impact of transforming the data on its utility. We have used two differentially privacy techniques Laplace perturbation and sliding moving average noise reduction on trajectories of taxi [2]. This dataset is used to predict the final destination (latitude and longitude) of taxi trips. These differential privacy techniques maintain the utility of this dataset along with the preservation of the trajectory privacy of individuals.
- Published
- 2016
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.