Welcome to RAID Lab Homepage
People | Projects | Publications
| Funding | Presentations
Current Graduate Students
related to Peer-to-Peer Systems
Xu, M. Hefeeda, S. Hambrush, B. Bhargava, On
Peer-to-Peer Media Streaming, In Proc. of International
Conference on Distributed Computing Systems (ICDCS'02), Vienna,
Austria, July 2002 .
Hefeeda, B. Bhargava On-Demand
Media Streaming Over the Internet, CERIAS TR
2002-20, Purdue University, June 2002. (Submitted to Inernational
Workshop on Future Trends of Distributed Computing Systems (FTDCS'03).)
Monitoring and Security
related to Security Issues in Mobile Systems and Ad Hoc Networks
- Experiments in Adaptability and Security in Multimedia Systems, in Lecture Notes in Computer Science, Vol. ,
in proceedings of 10thDEXA'99, Florence, Italy, pp. 1096- 1011
- Adaptability and Security in Multimedia Systems, B. Bhargava, in Proceedings of the IEEE
International Conference on Database Expert Systems (DEXA-99), Florence, 1999, pp. 1-5
- An Adaptable Network Architecture for Multi-media Traffic
Management and Control, S. Wang
and B. Bhargava, in Proceedings of the IEEEInternational Conference on
Multimedia System, New York, August 2000,pp 670-675
- Secure Mobile Networks,
B. Bhargava, in Proceedings of Conference on Dependable Computing, Los Angeles, Dec. 2000.
- Achieving Flexibility and Scalability: A New Architecture for
Wireless Network, Y. Lu and B.
Bhargava, in Proceedings of IC'2001, Las Vegas, Jun. 2001.
- An Architecture for Secure Wireless Networking, Y. Lu and B. Bhargava, in IEEE Workshop on
"Reliable and Secure Application in Mobile Environemnt, New
related to Multimedia over Mobile Wireless Networks
Papers related to Quality of Service
Papers related to Security in Web DataManagement
- Data Organization Issues in Location-dependent Query Processingin
Mobile Computing, S. Madria, B. Bhargava, E. Pitoura and V.Kumar, in Proceeding of International
Conference, ADBIS-DASFAA 2000, Prague, Sept. 2000.
- Web Schema in WHOWEDA, S.Sourav,W.
Ne and S. Madria, in Proceedings of ACM workshop on DOLAP, Washington DC, Nov.2000.
- Secured Web Access, M.
Mohania, V. Kumar, Y. Kambayashi and B. Bhargava, in International
Conference on Digital Libraries: Research and Practice, Nov 13-16, Kyoto, Japan
- Security in DataWarehousing,
B. Bhargava, in International Conference on Data Warehouse&
Knowledge Discover, DaWak-2000, Sept. 2000, London, UK
Papers related to Trust Management and
related to Sensor Networks
Proposals Funded/Submitted to Funding Agencies
in Adaptable Distributed Systems, funded by NSF.
Mobile Systems, funded by NSF.
in Security and QoS in Mobile Systems, funded by NSF.
Evidence and Trust for User Authorization, funded by NSF.
Scalable Edge Router for Differentiated Services Networks, funded by
Analysis and Threat Assessment/Avoidance, funded by NSF.
- ITR: Peer
to Peer Data Distribution, in process of funding by NSF.
Based Coordination of Network Embedded Nodes, funded by DARPA.
Communications Software for Differential QoS , funded by IBM.
Secure Shadow Networking for Scientific Research Collaboration, submitted to Cisco.
Cellular Assisted Mobile Ad hoc (CAMA) Networks
, funded by Motorola.
Routing and Intruder Identification in Ad Hoc Networks, funded by
CERIAS security center.
Heterogeneous Wireless Technologies: Cellular-aided Mobile Ad Hoc Networks,
submitted to NSF.
- Mid ITR: Collaborative Information Sharing
, submitted to NSF.
SENSORS: Self-configuration and Data Aggregation in Microsensor Systems
, submitted to NSF.
- 10th International Database and Expert SystemsApplications
(DEXA'99), Florence, Italy, Sept. 1999
- Workshop at University of California at Irvine, Oct. 1999.
- APICS (Atlantic Province Information and Computing Society) conference, Canada, Nov. 1999
- Experimentsin Adaptable and Secure Multimedia Database Systems, Florence, Italy, Sept.1999
- Key note speaker, MobileDistributed Database Conference
- Fault-Tolerant Authenticationand Group Key Management in Mobile
Computing, Advances in Security inInternet Computing, Las Vegas, June 2000
- Key note speaker, "Secure Mobile System" in Workshop on Mobile Distributed Data Systems, London, UK, Sep. 2000
- Invited speaker, "Security in Data Warehousing" in
Workshop on DaWak-2000 (Data Warehouse & Knowledge Discovery, London, UK, Sep. 2000
- "Secured Web Access" Kyoto International Conference on Digital Libraries:
Research and Practice,
Japan, Nov. 2000
- TRW, July 2000
- Cambridge University, Sep. 2000
- University of Cincinnati, Nov. 2000
- University of Kentucky, Nov. 2000
- Northwestern University, Nov. 2000
Mobile Systems (Funded by NSF, IBM)
and secure communications are essential in a mobile computing environment. We
propose to conduct a series of experiments that will lead to the development of
new authentication and key management techniques for wireless communications.
We study the implementation of various authentication schemes on the overall
system performance. We propose a technique to achieve fault-tolerant mobile
node authentication in an efficient way. We will evaluate how various secure
group communication and access control techniques fit into the wireless world
by conducting scientific experiments in a systematic way.
Students: Yi Lu,
Security and Quality of Service (QoS) (Funded by ITR NSF, CERIAS, IBM)
are doing research on monitoring network domains to ensure that the domain is
not under attack by injecting execssive traffic or by violating service level agreements.
The objective of this research is make a domain safe and provide quality of
service to the users as it is agreed upon with the provider. For scalable
network monitoring, our focus is to develop monitoring schemes that do not
involve core routers in any measurement or poll the core routers for delay,
loss, or bandwidth parameters. The misbehaving flows are detected and
controlled by activating filters and shapers. Security is treated as a Quality
of Service (QoS) parameter. Traffic Conditioner (TC) is an important part of
Differentiated Services (DiffServ) networks. TC marks packets as IN or OUT
profile or set the drop precedence. Based on this core routers give services to
packets. There are several techniques for conditioning. TCP is a very conservative
protocol and we can utilize some of it's features to develop a good TC. TC also
should consider the current measured rate and target rate of an aggregated flow
to set drop precedence. We explore several ideas to improve the performance of
Habib, Maleq Khan, Mohamed Hefeeda
and Data Warehousing Security (Funded by CERIAS)
warehouse is an integrated repository derived from multiple source (operational
and legacy) databases. The data warehouse is created by either replicating the
different source data or transforming them to new representation. This process
involves reading, cleaning, aggregating and storing the data in the warehouse
model. The software tools are used to access the warehouse for strategic
analysis, decision-making, marketing types of applications. It can be used for
inventory control of shelf stock in many departmental stores.
We focus on the
following ideas that can contribute towards warehouse security:
1. Replication control
2. Aggregation and Generalization
3. Exaggeration and Misleading
5. User Profile Based Security
This project aims at
developing and implementing efficient authorization and access control mechanisms
for web document and content of the document so that the legitimate users can
access the right data. We plan to investigate user identification,
authentication and access control as important security issue. Mechanisms
will be developed and implemented for both static and dynamic security.
Students: Yuhui Zhong, Malika Guerni
This research is supported in part by the National Science
Foundation CCR-001712 and CCR-001788, CERIAS, IBM SUR grant.
Questions and comments: email@example.com