scispace - formally typeset
M

Mohammad Saiful Islam

Researcher at University of Texas at Dallas

Publications -  10
Citations -  995

Mohammad Saiful Islam is an academic researcher from University of Texas at Dallas. The author has contributed to research in topics: Encryption & Cloud computing. The author has an hindex of 7, co-authored 10 publications receiving 870 citations. Previous affiliations of Mohammad Saiful Islam include University of Tennessee.

Papers
More filters
Proceedings Article

Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.

TL;DR: A novel attack that exploits data access pattern leakage to disclose significant amount of sensitive information using a modicum of prior knowledge is introduced and is able to disclose sensitive information with a very high accuracy.
Proceedings ArticleDOI

Efficient Similarity Search over Encrypted Data

TL;DR: This paper proposes an efficient scheme for similarity search over encrypted data and utilizes a state-of-the-art algorithm for fast near neighbor search in high dimensional spaces called locality sensitive hashing to ensure the confidentiality of the sensitive data.
Proceedings ArticleDOI

Inference attack against encrypted range queries on outsourced databases

TL;DR: A general attack on PQPs based on access pattern disclosure in the context of secure range queries is introduced and it is demonstrated that a slight variation of such an attack can be used on imprecise protocols (e.g., bucketization) to disclose significant amount of sensitive information.
Proceedings ArticleDOI

Efficient privacy-aware search over encrypted databases

TL;DR: A novel construction for practical and privacy-aware selective record retrieval over encrypted databases that leaks obfuscated access pattern to enable efficient retrieval while ensuring individual privacy is introduced.
Proceedings ArticleDOI

Distributed Search over Encrypted Big Data

TL;DR: This study proposes a provably secure distributed index along with a parallelizable retrieval technique that can easily scale to big data and integrates authorization into the search scheme to limit the information leakage in multi-user setting.