Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mummoorthy Murugesan is active.

Publication


Featured researches published by Mummoorthy Murugesan.


very large data bases | 2010

Efficient privacy-preserving similar document detection

Mummoorthy Murugesan; Wei Jiang; Chris Clifton; Luo Si; Jiadeep Vaidya

Similar document detection plays important roles in many applications, such as file management, copyright protection, plagiarism prevention, and duplicate submission detection. The state of the art protocols assume that the contents of files stored on a server (or multiple servers) are directly accessible. However, this makes such protocols unsuitable for any environment where the documents themselves are sensitive and cannot be openly read. Essentially, this assumption limits more practical applications, e.g., detecting plagiarized documents between two conferences, where submissions are confidential. We propose novel protocols to detect similar documents between two entities where documents cannot be openly shared with each other. The similarity measure used can be a simple cosine similarity on entire documents or on document fragments, enabling detection of partial copying. We conduct extensive experiments to show the practical value of the proposed protocols. While the proposed base protocols are much more efficient than the general secure multiparty computation based solutions, they are still slow for large document sets. We then investigate a clustering based approach that significantly reduces the running time and achieves over 90% of accuracy in our experiments. This makes secure similar document detection both practical and feasible.


international conference on data engineering | 2008

Similar Document Detection with Limited Information Disclosure

Wei Jiang; Mummoorthy Murugesan; Chris Clifton; Luo Si

Similar document detection plays important roles in many applications, such as file management, copyright protection, and plagiarism prevention. Existing protocols assume that the contents of files stored on a server (or multiple servers) are directly accessible. This assumption limits more practical applications, e.g., detecting plagiarized documents between two conferences, where submissions are confidential. We propose novel protocols to detect similar documents between two entities where documents cannot be openly shared with each other. We also conduct experiments to show the practical value of the proposed protocols.


conference on data and application security and privacy | 2011

k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equations

Mummoorthy Murugesan; Wei Jiang; Ahmet Erhan Nergiz; Serkan Uzunbaz

Oblivious Transfer (OT) is an important cryptographic tool, which has found its usage in many crypto protocols, such as Secure Multiparty Computations, Certified E-mail and Simultaneous Contract Signing . In this paper, we propose three k-out-of-n OT (OT_k^n) protocols based on additive homomorphic encryption. Two of these protocols prohibit malicious behaviors from a receiver. We also achieve efficient communication complexity bounded by O(l* n) in bits, where l is the size of the encryption key. The computational complexity is comparable to the most efficient existing protocols. Due to the semantic security property, the sender cannot get receivers selection. When the receiver tries to retrieve more than k values, the receiver is caught cheating with 1-(1/m) probability (Protocol II) or the receiver is unable to get any value at all (Protocol III). We introduce a novel technique based on the solvability of linear equations, which could find its way into other applications. We also provide an experimental analysis to compare the efficiency of the protocols.


international conference on data engineering | 2007

Secure Content Validation

Mummoorthy Murugesan; Wei Jiang

Information dissemination in electronic form has improved drastically over the past few years. New technologies in Web feeds allow the uses to get notified automatically when new contents are available. Tliough the speedy availability of information is a positive trend, theres also the concern about the validity of information. Let us consider a content producer, who creates and publishes an article based on information from confidential sources. When any of these confidential sources becomes invalid, it is imperative that the end-user who relies on the content of the article be informed. As time passes, the article would have reached many who are often non-traceable to be informed. Given this selling, we develop models for ensuring the confidentiality and secrecy of sources, and also allow the end-user to perform certain operations in reasoning about the validity of articles. We present three types of models, and protocols that solve this problem efficiently.


siam international conference on data mining | 2009

Providing Privacy through Plausibly Deniable Search.

Mummoorthy Murugesan; Chris Clifton


computational science and engineering | 2009

t-Plausibility: Semantic Preserving Text Sanitization

Wei Jiang; Mummoorthy Murugesan; Chris Clifton; Luo Si


Transactions on Data Privacy | 2012

t-Plausibility: Generalizing Words to Desensitize Text

Balamurugan Anandan; Chris Clifton; Wei Jiang; Mummoorthy Murugesan; Pedro Pastrana-Camacho; Luo Si


Archive | 2008

Plausibly Deniable Search

Mummoorthy Murugesan; W. Lafayette; Chris Clifton


Privacy through deniable search | 2010

Privacy through deniable search

Chris Clifton; Mummoorthy Murugesan


annual information security symposium | 2008

Secure similar document detection

Wei Jiang; Mummoorthy Murugesan; Chris Clifton; Luo Si

Collaboration


Dive into the Mummoorthy Murugesan's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wei Jiang

Missouri University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge