• A ciphertext-policy attribute-based encryption scheme with optimized ciphertext size and fast decryption 

      Malluhi, Qutaibah M.; Shikfa, Abdullatif; Trinh, Viet Cuong ( Association for Computing Machinery, Inc , 2017 , Conference Paper)
      We address the problem of ciphertext-policy attribute-based encryption with fine access control, a cryptographic primitive which has many concrete application scenarios such as Pay-TV, e-Health, Cloud Storage and so on. ...
    • A Domain Specific Language for Secure Outsourcing of Computation to the Cloud 

      Nassar, Mohamed; Erradi, Abdelkarim; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Secure outsourcing of computation has gained importance with the proliferation of cloud services. However, existing outsourcing protocol specification languages are mainly suitable for secure multi-party computation. They ...
    • A model driven framework for secure outsourcing of computation to the cloud 

      Nassar, Mohamed; Erradi, Abdelkarim; Sabry, Farida; Malluhi, Qutaibah M. ( IEEE Computer Society , 2014 , Conference Paper)
      This paper presents a model driven approach to define then coordinate the execution of protocols for secure outsourcing of computation of large datasets in cloud computing environments. First we present our Outsourcing ...
    • A scalable solution for finding overlaps between sequences using map-reduce 

      Haj Rachid, Maan; Malluhi, Qutaibah M. ( The International Society for Computers and Their Applications (ISCA) , 2016 , Conference Paper)
      The overlap stage of a string graph-based assembler is considered one of the most time- and space-consuming stages in any de novo overlap-based assembler. This is due to the huge output of the next-generation sequencing ...
    • An efficient instance hiding scheme 

      Malluhi, Qutaibah M.; Shikfa, Abdullatif; Trinh, Viet Cuong ( Association for Computing Machinery , 2016 , Conference Paper)
      Delegating computation, which is applicable to many practical contexts such as cloud computing or pay-TV system, concerns the task where a computationally weak client wants to securely compute a very complex function f on ...
    • Automatic generation of optimized workflow for distributed computations on large-scale matrices 

      Sabry, Farida; Erradi, Abdelkarim; Nassar, Mohamed; Malluhi, Qutaibah M. ( Springer Verlag , 2014 , Conference Paper)
      Efficient evaluation of distributed computation on large-scale data is prominent in modern scientific computation; especially analysis of big data, image processing and data mining applications. This problem is particularly ...
    • Breaking HK17 in Practice 

      Li, Haoyu; Liu, Renzhang; Malluhi, Qutaibah M.; Pan, Yanbin; Wang, Yongge; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      In November 2017, Hecht and Kamlofsky submitted HK17, a quaternion(octonion)-based Diffie-Hellman key exchange protocol, to NIST post-quantum cryptography project, and thought that at least O(p8) arithmetic operations are ...
    • CloudFlow: A data-aware programming model for cloud workflow applications on modern HPC systems 

      Zhang, Fan; Malluhi, Qutaibah M.; Elsayed, Tamer; Khan, Samee U.; Li, Keqin; ... more authors ( Elsevier , 2015 , Article)
      Traditional High-Performance Computing (HPC) based big-data applications are usually constrained by having to move large amount of data to compute facilities for real-time processing purpose. Modern HPC systems, represented ...
    • Enabling Efficient Secure Multiparty Computation Development in ANSI C 

      Musleh, Ahmad; Hussein, Soha; Khan, Khaled M.; Malluhi, Qutaibah M. ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Secure Multi-Party Computation (SMPC) enables parties to compute a pub- lic function over private inputs. A classical example is the millionaires problem, where two millionaires want to figure out who is wealthier without ...
    • Energy Theft Detection Using the Wasserstein Distance on Residuals 

      Altamimi, Emran; Al-Ali, Abdulaziz; Malluhi, Qutaibah M.; Al-Ali, Abdulla K. ( IEEE Explore , 2023 , Conference Paper)
      Detection of electricity theft improves the sustainability of the smart grid, helps electrical utilities mitigate their financial risks, and improves the overall management of resources. In this work, we utilize an LSTM ...
    • Garbled computation in cloud 

      Wang, Yongge; Malluhi, Qutaibah M.; Khancb, Khaled MD ( Elsevier , 2016 , Article)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • In-memory distributed matrix computation processing & optimization 

      Yu, Yongyang; Tang, Mingjie; Aref, Walid G.; Malluhi, Qutaibah M.; Abbas, Mostafa M.; ... more authors ( IEEE Computer Society , 2017 , Conference Paper)
      The use of large-scale machine learning and data mining methods is becoming ubiquitous in many application domains ranging from business intelligence and bioinformatics to self-driving cars. These methods heavily rely on ...
    • LPPDA: A Light-Weight Privacy-Preserving Data Aggregation Protocol for Smart Grids 

      Kamal, Naheel Faisal; Al-Ali, Abdulla Khalid; Al-Ali, Abdulaziz; Bayhan, Sertac; Malluhi, Qutaibah M. ( IEEE Explore , 2023 , Article)
      Smart meters are continuously being deployed in several countries as a step in the direction of modernizing the power grid. Smart meters allow for automatic electricity consumption reporting to energy providers to facilitate ...
    • Paillier's encryption: Implementation and cloud applications 

      Nassar, Mohamed; Erradi, Abdelkarim; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Paillier's additive homomorphic encryption is increasingly used in recent research in the field of cloud secure outsourcing and privacy-preserving computation in addition to other cryptographic tools such as garbled circuits. ...
    • Practical and secure outsourcing of matrix computations to the cloud 

      Nassar, Mohamed; Erradi, Abdelkarim; Malluhi, Qutaibah M. ( IEEE , 2013 , Conference Paper)
      Cloud computing enables a cost effective outsourcing of storage and resource-intensive computations. Secure outsourcing of data and computation is challenging in this emerging computing model. In particular, outsourcing ...
    • Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes 

      Wang, Yongge; Malluhi, Qutaibah M. ( Springer Verlag , 2016 , Conference Paper)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • Reusable garbled turing machines without FHE 

      Wang, Yongge; Malluhi, Qutaibah M. ( Springer Verlag , 2019 , Conference Paper)
      Since Yao introduced the garbled circuit concept in 1980s, it has been an open problem to design efficient reusable garbled Turing machines/circuits. Recently, Goldwasser et al. and Garg et al. answered this question ...
    • SafeDrive: A Reliable and Secure Distributed Cloud Storage 

      Mansour, Watheq Ahmad; Malluhi, Qutaibah M. ( Qatar University Press , 2020 , Poster)
      SafeDrive is an efficient, reliable, and secure multi-cloudfile storage system that keeps data safe and accessible even if you do not fully trust the service provider, whose systems can be compromised or become unavailable. ...
    • Similarity Group-by Operators for Multi-Dimensional Relational Data 

      Tang, Mingjie; Tahboub, Ruby Y.; Aref, Walid G.; Atallah, Mikhail J.; Malluhi, Qutaibah M.; ... more authors ( IEEE Computer Society , 2016 , Conference Paper)
      The SQL group-by operator plays an important role in summarizing and aggregating large datasets in a data analytics stack. While the standard group-by operator, which is based on equality, is useful in several applications, ...
    • Skyline Discovery and Composition of Multi-Cloud Mashup Services 

      Zhang, Fan; Hwang, Kai; Khan, Samee U.; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers , 2016 , Article)
      A cloud mashup is composed of multiple services with shared datasets and integrated functionalities. For example, the elastic compute cloud (EC2) provided by Amazon Web Service (AWS), the authentication and authorization ...