"At last man is to know truth about everything. It suffices that he should not lose heart at
the complexity of the problems, and that he should allow no passion to cloud his mind."
-- Jose Ortega y Gasset --

Gabriel Ghinita

Assistant Professor
Department of Computer Science
University of Massachusetts at Boston


Office: Science Building, 3rd Floor, Room 88 (S-3-88)
Phone: (617) 287-6479
Email: Gabriel.Ghinita at umb.edu

  1. Bio
  2. Publications
  3. Research

I am an Assistant Professor with the Department of Computer Science at University of Massachussets, Boston. Prior to joining UMB in Fall 2011, I was a Research Associate affiliated with Purdue Cyber Center and Purdue Center for Education and Research in Information Assurance and Security (CERIAS). My main research interests lie in the area of databases, with focus on information security and privacy. I am also interested in spatio-temporal databases and data management in large-scale distributed environments.


Research Interests


Teaching


Professional Activities


Education


My main research interests lie in the area of data security and privacy:

Books and Book Chapters

  1. G. Ghinita, "Privacy for Location-based Services", Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013

  2. E. Bertino, G. Ghinita and A. Kamra, "Access Control for Databases - Concepts and Systems", In Foundations and Trends in Databases, NOW Publishing, 2011

  3. P. Kalnis and G. Ghinita, "Spatial Anonymity", In Encyclopedia of Database Systems, Springer 2009

  4. P. Kalnis and G. Ghinita, "OLAP Results, Distributed Caching", In Encyclopedia of GIS, Springer 2008


Journal Articles

  1. H. To, G. Ghinita, L. Fan, C. Shahabi, "Differentially Private Location Protection for Worker Datasets in Spatial Crowdsourcing" IEEE Transactions on Mobile Computing (IEEE TMC), to appear

  2. G. Ghinita, M.L. Damiani, C. Silvestri, E. Bertino, "Protecting Against Velocity-based, Proximity-based and External Event Attacks in Location-Centric Social Networks" ACM Transactions on Spatial Algorithms and Systems (ACM TSAS), 2016

  3. S. Sultana, G. Ghinita, E. Bertino, M. Shehab, "A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks" IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2015

  4. E. Bertino, G. Ghinita, M. Kantarcioglu, D. Nguyen, J. Park, R. S. Sandhu, S. Sultana, B. M. Thuraisingham, S. Xu, "A roadmap for privacy-enhanced secure data provenance" Journal of Intelligent Information Systems (JIIS), 2014

  5. S. Choi, G. Ghinita, H.-S. Lim, E. Bertino, "Secure kNN Query Processing in Untrusted Cloud Environments" IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE), 2014

  6. H. To, G. Ghinita, C. Shahabi, "A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing" Proceedings of Very Large Data Bases (PVLDB), 2014

  7. M. Kirkpatrick, G. Ghinita, E. Bertino, "Privacy-preserving Enforcement of Spatially Aware RBAC" IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Special Issue on Data and Application Security, 9(5), 627-640, 2012

  8. A. Inan, M. Kantarcioglu, G. Ghinita, E. Bertino, "A Hybrid Approach to Private Record Matching" IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 9(5), 684-698, 2012

  9. M. Kirkpatrick, G. Ghinita, E. Bertino, "Resilient Authenticated Execution of Critical Applications in Untrusted Environments" IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 9(4), 595-607, 2012

  10. G. Ghinita, P. Kalnis, Y. Tao, "Anonymous Publication of Sensitive Transactional Data" IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE), 23(2), 161-174, 2011

  11. G. Ghinita, P. Kalnis, M. Kantarcioglu, E. Bertino, "Approximate and Exact Hybrid Algorithms for Private Nearest-Neighbor Queries with Database Protection" Geoinformatica 15(4), 699-726, 2011

  12. G. Ghinita, K. Zhao, D. Papadias, P. Kalnis, "A Reciprocal Framework for Spatial k-Anonymity" Information Systems Journal (IS), 35(3), 299-314, 2010

  13. M.L. Yiu, G. Ghinita, C. Jensen, P. Kalnis, "Enabling Search Services on Outsourced Private Spatial Data" Very Large Data Bases Journal (VLDBJ), 19(3), 363-384, 2010

  14. G. Ghinita, P. Karras, P. Kalnis, N. Mamoulis, "A Framework for Efficient Data Anonymization under Privacy and Accuracy Constraints" ACM Transactions on Database Systems (TODS), 34(2), 2009

  15. G. Ghinita, "Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy" Transactions on Data Privacy (TDP), 2(1), 3-19, 2009

  16. P. Kalnis, G. Ghinita, K. Mouratidis, D. Papadias, "Preventing Location-Based Identity Inference in Anonymous Spatial Queries", IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE), 19(12), 1719-1733, 2007


Conference Papers

  1. M. Maruseac, G. Ghinita, "Differentially-Private Mining of Representative Travel Patterns" In Proceedings of IEEE International Conference on Mobile Data Management (IEEE MDM), June 2016

  2. M. Maruseac, G. Ghinita, "Privacy-Preserving Mining of Sequential Association Rules from Provenance Workflows" In Proceedings of ACM Conference on Data and Applications Security (ACM CODASPY), March 2016

  3. M. Maruseac, G. Ghinita, B. Avci, G. Trajcevski, P. Scheuermann, "Privacy-Preserving Detection of Anomalous Phenomena in Crowdsourced Environmental Sensing" In Proceedings of International Symposium on Spatial and Temporal Databases (SSTD), August 2015

  4. M. Maruseac, G. Ghinita, M. Ouyang, R. Rughinis, "Hardware acceleration of Private Information Retrieval protocols using GPUs" In Proceedings of IEEE International Conference on Application-specific Systems, Architectures and Processors (IEEE ASAP), July 2015

  5. H. To, G. Ghinita, C. Shahabi, "PrivGeoCrowd: A toolbox for studying private spatial Crowdsourcing" In Proceedings of IEEE International Conference on Data Engineering (IEEE ICDE), April 2015

  6. M. Maruseac, G. Ghinita, "Differentially-Private Mining of Moderately-Frequent High-Confidence Association Rules" In Proceedings of ACM Conference on Data and Applications Security (ACM CODASPY), March 2015

  7. S. Choi, G. Ghinita, E. Bertino, "Secure Mutual Proximity Zone Enclosure Evaluation" In Proceedings of ACM International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS), November 2014

  8. M. Maruseac, G. Ghinita, M. Ouyang, R. Rughinis, "Towards Efficient Private Spatial Information Retrieval Using GPUs" In Proceedings of ACM International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS), November 2014

  9. J. Zhang, G. Ghinita, C.-Y. Chow, "Differentially Private Location Recommendations in Geosocial Networks" In Proceedings of International Conference on Mobile Data Management (MDM), July 2014

  10. W. Lin, X. Xiao, G. Ghinita, "Large-Scale Frequent Subgraph Mining in MapReduce" In Proceedings of International Conference on Data Engineering (ICDE), April 2014

  11. G. Ghinita, R. Rughinis, "An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical" (Outstanding Paper Award) In Proceedings of ACM Conference on Data and Applications Security (CODASPY), March 2014

  12. M. Maruseac, G. Ghinita, R. Rughinis, "Privacy-preserving publication of provenance workflows" In Proceedings of ACM Conference on Data and Applications Security (CODASPY), March 2014

  13. G. Ghinita, R. Rughinis, "A privacy-preserving location-based alert system" In Proceedings of International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS), November 2013

  14. J. Cao, Q. Xiao, G. Ghinita, N. Li, E. Bertino, K.-L. Tan, "Efficient and accurate strategies for differentially-private sliding window queries" In Proceedings of International Conference on Extending Database Technology (EDBT), March 2013

  15. H. Lo, G. Ghinita, "Authenticating spatial skyline queries with low communication overhead" In Proceedings of ACM Conference on Data and Applications Security (CODASPY), February 2013

  16. S. Sultana, G. Ghinita, E. Bertino "A Lightweight Secure Provenance Scheme for Wireless Sensor Networks" In Proceedings of IEEE International Conference on Parallel and Distributed Systems (ICPADS), December 2012

  17. S. Choi, G. Ghinita, E. Bertino "Secure Sensor Network SUM Aggregation with Detection of Malicious Nodes" (best-paper award runner-up) In Proceedings of IEEE Conference on Local Computer Networks (LCN), October 2012

  18. H.-S. Lim, G. Ghinita, E. Bertino, M. Kantarcioglu "A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks" In Proceedings of International Conference on Data Engineering (ICDE), April 2012

  19. C. Dai, F.-Y. Rao, G. Ghinita, E. Bertino, "Privacy-Preserving Assessment of Location Data Trustworthiness" In Proceedings of International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS), November 2011

  20. E. Bertino, G. Ghinita, "Towards Mechanisms for Detection and Prevention of Data Exfiltration by Insiders" In Proceedings of ACM Conference on Computer and Communications Security (ASIACCS) (invited paper), March 2011

  21. K. Brancik, G. Ghinita "The optimization of situational awareness for insider threat detection" In Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY), February 2011

  22. G. Ghinita, C. R. Vicente, N. Shang, E. Bertino, "Privacy-Preserving Matching of Spatial Datasets with Protection against Background Knowledge" In Proceedings of International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS), November 2010

  23. S. Choi, G. Ghinita, E. Bertino, "A Privacy-Enhancing Content-Based Publish/Subscribe System using Scalar Product Preserving Transformations" In Proceedings of International Conference on Database and Expert Systems Applications (DEXA), August 2010

  24. G. Ghinita, M. Azarmi, E. Bertino, "Privacy-aware Location-Aided Routing in Mobile Ad-hoc Networks" In Proceedings of International Conference on Mobile Data Management (MDM), May 2010

  25. A. Inan, M. Kantarcioglu, G. Ghinita, E. Bertino, "Private Record Matching Using Differential Privacy" In Proceedings of International Conference on Extending Database Technology (EDBT), March 2010

  26. N. Shang, G. Ghinita, Y. Zhou, E. Bertino, "Controlling Data Disclosure in Computational PIR Protocols" In Proceedings of ACM Conference on Computer and Communications Security (ASIACCS), April 2010

  27. G. Ghinita, M. L. Damiani, C. Silvestri, E. Bertino, "Preventing Velocity-based Linkage Attacks in Location-Aware Applications" (best-paper award runner-up) In Proceedings of International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS), November 2009

  28. C. Dai, G. Ghinita, E. Bertino, J.-W. Byun, N. Li, "TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques" In Proceedings of International Conference on Very Large Data Bases (VLDB), August 2009 (demo track)

  29. G. Ghinita, P. Kalnis, M. Kantarcioglu, E. Bertino, "A Hybrid Technique for Private Location-Based Queries with Database Protection" In Proceedings of International Symposium on Spatial and Temporal Databases (SSTD), July 2009

  30. P. Rao, G. Ghinita, E. Bertino, J. Lobo, "Visualizing Access Control Policy Analysis Results" In Proceedings of International Symposium on Policies for Distributed Systems and Networks (POLICY), July 2009

  31. G. Ghinita, M. L. Damiani, E. Bertino, C. Silvestri, "Interactive Location Cloaking with the PROBE Obfuscator" In Proceedings of International Conference on Mobile Data Management (MDM), May 2009 (demo track)

  32. M. L. Yiu, G. Ghinita, C. Jensen, P. Kalnis, "Outsourcing of Private Spatial Data for Search Services", In Proceedings of International Conference on Data Engineering (ICDE) March 2009

  33. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, K.-L.Tan, "Private Queries in Location Based Services: Anonymizers are not Necessary", In Proceedings of ACM SIGMOD Conference June 2008

  34. G. Ghinita, Y. Tao, P. Kalnis "On the Anonymization of Sparse High-Dimensional Data", In Proceedings of International Conference on Data Engineering (ICDE) April 2008

  35. N. Vyahhi, S. Bakiras, P. Kalnis, G. Ghinita "Tracking Moving Objects in Anonymized Trajectories", In Proceedings of International Conference on Database and Expert Systems Applications (DEXA) September 2008

  36. K. Bharath, G. Ghinita, P. Kalnis "Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites", In Proceedings of International Conference on Scientific and Statistical Database Management (SSDBM) July 2008

  37. G. Ghinita, P. Karras, P. Kalnis, N. Mamoulis, "Fast Data Anonymization with Low Information Loss", In Proceedings of International Conference on Very Large Data Bases (VLDB) September 2007

  38. G. Ghinita, P. Kalnis, S. Skiadopoulos, "MobiHide: A Mobile Peer-to-Peer System for Anonymous Location-Based Queries", In Proceedings of International Symposium on Spatial and Temporal Databases (SSTD) July 2007

  39. G. Ghinita, P. Kalnis, S. Skiadopoulos, "PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems", In Proceedings of International World Wide Web Conference (WWW) May 2007

  40. G. Ghinita, Y.M. Teo, "An Adaptive Stabilization Framework for Distributed Hash Tables", In Proceedings of IEEE International Parallel and Distributed Processing Symposium (IPDPS) April 2006


Workshop Papers

  1. S. Costea, G. Ghinita, D. M. Barbu, R. Rughinis, "A Comparative Evaluation of Private Information Retrieval Techniques in Location-Based Services", In Proceedings of International Workshop on Secure Internet of Things (SIOT), 2012

  2. E.-A. Cho, G. Ghinita, E. Bertino, "Privacy-Preserving Similarity Measurement for Access Control Policies", In Proceedings of ACM Workshop on Digital Identity Management (DIM), 2010

  3. C.R. Vicente, M. Kirkpatrick, G. Ghinita, E. Bertino, C. Jensen, "Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response", In Proceedings of SIGSPATIAL ACM GIS International Workshop on Security and Privacy in GIS and LBS (SPRINGL), 2009

  4. G. Ghinita, "Understanding the Privacy-Efficiency Trade-off in Location Based Queries", In Proceedings of SIGSPATIAL ACM GIS International Workshop on Security and Privacy in GIS and LBS (SPRINGL), 2008 (invited paper - keynote)


Funded Projects