"At last man is to know truth about everything. It suffices that he should not lose heart at
the complexity of the problems, and that he should allow no passion to cloud his mind."
-- Jose Ortega y Gasset --

Gabriel Ghinita

Assistant Professor
Department of Computer Science
University of Massachusetts at Boston


Office: Science Building, 3rd Floor, Room 88 (S-3-88)
Phone: (617) 287-6479
Email: Gabriel.Ghinita at umb.edu

  1. Bio
  2. Publications
  3. Talks

I am an Assistant Professor with the Department of Computer Science at University of Massachussets, Boston. Prior to joining UMB in Fall 2011, I was a Research Associate affiliated with Purdue Cyber Center and Purdue Center for Education and Research in Information Assurance and Security (CERIAS). My main research interests lie in the area of databases, with focus on information security and privacy. I am also interested in spatio-temporal databases and data management in large-scale distributed environments.


Research Interests


Teaching


Professional Activities


Education


My main research interests lie in the area of data security and privacy:

Books and Book Chapters

  1. G. Ghinita, "Privacy for Location-based Services", Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013

  2. E. Bertino, G. Ghinita and A. Kamra, "Access Control for Databases - Concepts and Systems", In Foundations and Trends in Databases, NOW Publishing, 2011

  3. P. Kalnis and G. Ghinita, "Spatial Anonymity", In Encyclopedia of Database Systems, Springer 2009

  4. P. Kalnis and G. Ghinita, "OLAP Results, Distributed Caching", In Encyclopedia of GIS, Springer 2008


Journal Articles

  1. S. Choi, G. Ghinita, H.-S. Lim, E. Bertino, "Secure kNN Query Processing in Untrusted Cloud Environments" IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE), to appear, 2014

  2. S. Sultana, G. Ghinita, E. Bertino, M. Shehab, "A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks" IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), to appear, 2014

  3. M. Kirkpatrick, G. Ghinita, E. Bertino, "Privacy-preserving Enforcement of Spatially Aware RBAC" IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Special Issue on Data and Application Security, 9(5), 627-640, 2012

  4. A. Inan, M. Kantarcioglu, G. Ghinita, E. Bertino, "A Hybrid Approach to Private Record Matching" IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 9(5), 684-698, 2012

  5. M. Kirkpatrick, G. Ghinita, E. Bertino, "Resilient Authenticated Execution of Critical Applications in Untrusted Environments" IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 9(4), 595-607, 2012

  6. G. Ghinita, P. Kalnis, Y. Tao, "Anonymous Publication of Sensitive Transactional Data" IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE), 23(2), 161-174, 2011

  7. G. Ghinita, P. Kalnis, M. Kantarcioglu, E. Bertino, "Approximate and Exact Hybrid Algorithms for Private Nearest-Neighbor Queries with Database Protection" Geoinformatica 15(4), 699-726, 2011

  8. G. Ghinita, K. Zhao, D. Papadias, P. Kalnis, "A Reciprocal Framework for Spatial k-Anonymity" Information Systems Journal (IS), 35(3), 299-314, 2010

  9. M.L. Yiu, G. Ghinita, C. Jensen, P. Kalnis, "Enabling Search Services on Outsourced Private Spatial Data" Very Large Data Bases Journal (VLDBJ), 19(3), 363-384, 2010

  10. G. Ghinita, P. Karras, P. Kalnis, N. Mamoulis, "A Framework for Efficient Data Anonymization under Privacy and Accuracy Constraints" ACM Transactions on Database Systems (TODS), 34(2), 2009 (pdf)

  11. G. Ghinita, "Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy" Transactions on Data Privacy (TDP), 2(1), 3-19, 2009

  12. P. Kalnis, G. Ghinita, K. Mouratidis, D. Papadias, "Preventing Location-Based Identity Inference in Anonymous Spatial Queries", IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE), 19(12), 1719-1733, 2007 (pdf)


Conference Papers

  1. W. Lin, X. Xiao, G. Ghinita, "Large-Scale Frequent Subgraph Mining in MapReduce" In Proceedings of International Conference on Data Engineering (ICDE), April 2014

  2. G. Ghinita, R. Rughinis, "An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical" (Outstanding Paper Award) In Proceedings of ACM Conference on Data and Applications Security (CODASPY), March 2014

  3. M. Maruseac, G. Ghinita, R. Rughinis, "Privacy-preserving publication of provenance workflows" In Proceedings of ACM Conference on Data and Applications Security (CODASPY), March 2014

  4. G. Ghinita, R. Rughinis, "A privacy-preserving location-based alert system" In Proceedings of International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS), November 2013

  5. J. Cao, Q. Xiao, G. Ghinita, N. Li, E. Bertino, K.-L. Tan, "Efficient and accurate strategies for differentially-private sliding window queries" In Proceedings of International Conference on Extending Database Technology (EDBT), March 2013

  6. H. Lo, G. Ghinita, "Authenticating spatial skyline queries with low communication overhead" In Proceedings of ACM Conference on Data and Applications Security (CODASPY), February 2013

  7. S. Sultana, G. Ghinita, E. Bertino "A Lightweight Secure Provenance Scheme for Wireless Sensor Networks" In Proceedings of IEEE International Conference on Parallel and Distributed Systems (ICPADS), December 2012

  8. S. Choi, G. Ghinita, E. Bertino "Secure Sensor Network SUM Aggregation with Detection of Malicious Nodes" (best-paper award runner-up) In Proceedings of IEEE Conference on Local Computer Networks (LCN), October 2012

  9. H.-S. Lim, G. Ghinita, E. Bertino, M. Kantarcioglu "A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks" In Proceedings of International Conference on Data Engineering (ICDE), April 2012

  10. C. Dai, F.-Y. Rao, G. Ghinita, E. Bertino, "Privacy-Preserving Assessment of Location Data Trustworthiness" In Proceedings of International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS), November 2011

  11. E. Bertino, G. Ghinita, "Towards Mechanisms for Detection and Prevention of Data Exfiltration by Insiders" In Proceedings of ACM Conference on Computer and Communications Security (ASIACCS) (invited paper), March 2011

  12. K. Brancik, G. Ghinita "The optimization of situational awareness for insider threat detection" In Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY), February 2011

  13. G. Ghinita, C. R. Vicente, N. Shang, E. Bertino, "Privacy-Preserving Matching of Spatial Datasets with Protection against Background Knowledge" In Proceedings of International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS), November 2010

  14. S. Choi, G. Ghinita, E. Bertino, "A Privacy-Enhancing Content-Based Publish/Subscribe System using Scalar Product Preserving Transformations" In Proceedings of International Conference on Database and Expert Systems Applications (DEXA), August 2010

  15. G. Ghinita, M. Azarmi, E. Bertino, "Privacy-aware Location-Aided Routing in Mobile Ad-hoc Networks" In Proceedings of International Conference on Mobile Data Management (MDM), May 2010

  16. A. Inan, M. Kantarcioglu, G. Ghinita, E. Bertino, "Private Record Matching Using Differential Privacy" In Proceedings of International Conference on Extending Database Technology (EDBT), March 2010

  17. N. Shang, G. Ghinita, Y. Zhou, E. Bertino, "Controlling Data Disclosure in Computational PIR Protocols" In Proceedings of ACM Conference on Computer and Communications Security (ASIACCS), April 2010

  18. G. Ghinita, M. L. Damiani, C. Silvestri, E. Bertino, "Preventing Velocity-based Linkage Attacks in Location-Aware Applications" (best-paper award runner-up) In Proceedings of International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS), November 2009

  19. C. Dai, G. Ghinita, E. Bertino, J.-W. Byun, N. Li, "TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques" In Proceedings of International Conference on Very Large Data Bases (VLDB), August 2009 (demo track)

  20. G. Ghinita, P. Kalnis, M. Kantarcioglu, E. Bertino, "A Hybrid Technique for Private Location-Based Queries with Database Protection" In Proceedings of International Symposium on Spatial and Temporal Databases (SSTD), July 2009

  21. P. Rao, G. Ghinita, E. Bertino, J. Lobo, "Visualizing Access Control Policy Analysis Results" In Proceedings of International Symposium on Policies for Distributed Systems and Networks (POLICY), July 2009

  22. G. Ghinita, M. L. Damiani, E. Bertino, C. Silvestri, "Interactive Location Cloaking with the PROBE Obfuscator" In Proceedings of International Conference on Mobile Data Management (MDM), May 2009 (demo track)

  23. M. L. Yiu, G. Ghinita, C. Jensen, P. Kalnis, "Outsourcing of Private Spatial Data for Search Services", In Proceedings of International Conference on Data Engineering (ICDE) March 2009 (pdf)

  24. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, K.-L.Tan, "Private Queries in Location Based Services: Anonymizers are not Necessary", In Proceedings of ACM SIGMOD Conference June 2008 (pdf)

  25. G. Ghinita, Y. Tao, P. Kalnis "On the Anonymization of Sparse High-Dimensional Data", In Proceedings of International Conference on Data Engineering (ICDE) April 2008 (pdf)

  26. N. Vyahhi, S. Bakiras, P. Kalnis, G. Ghinita "Tracking Moving Objects in Anonymized Trajectories", In Proceedings of International Conference on Database and Expert Systems Applications (DEXA) September 2008 (pdf)

  27. K. Bharath, G. Ghinita, P. Kalnis "Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites", In Proceedings of International Conference on Scientific and Statistical Database Management (SSDBM) July 2008 (pdf)

  28. G. Ghinita, P. Karras, P. Kalnis, N. Mamoulis, "Fast Data Anonymization with Low Information Loss", In Proceedings of International Conference on Very Large Data Bases (VLDB) September 2007 (pdf)

  29. G. Ghinita, P. Kalnis, S. Skiadopoulos, "MobiHide: A Mobile Peer-to-Peer System for Anonymous Location-Based Queries", In Proceedings of International Symposium on Spatial and Temporal Databases (SSTD) July 2007 (pdf)

  30. G. Ghinita, P. Kalnis, S. Skiadopoulos, "PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems", In Proceedings of International World Wide Web Conference (WWW) May 2007 (pdf)

  31. G. Ghinita, Y.M. Teo, "An Adaptive Stabilization Framework for Distributed Hash Tables", In Proceedings of IEEE International Parallel and Distributed Processing Symposium (IPDPS) April 2006


Workshop Papers

  1. S. Costea, G. Ghinita, D. M. Barbu, R. Rughinis, "A Comparative Evaluation of Private Information Retrieval Techniques in Location-Based Services", In Proceedings of International Workshop on Secure Internet of Things (SIOT), 2012

  2. E.-A. Cho, G. Ghinita, E. Bertino, "Privacy-Preserving Similarity Measurement for Access Control Policies", In Proceedings of ACM Workshop on Digital Identity Management (DIM), 2010

  3. C.R. Vicente, M. Kirkpatrick, G. Ghinita, E. Bertino, C. Jensen, "Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response", In Proceedings of SIGSPATIAL ACM GIS International Workshop on Security and Privacy in GIS and LBS (SPRINGL), 2009

  4. G. Ghinita, "Understanding the Privacy-Efficiency Trade-off in Location Based Queries", In Proceedings of SIGSPATIAL ACM GIS International Workshop on Security and Privacy in GIS and LBS (SPRINGL), 2008 (invited paper - keynote)


  1. "Efficient and accurate strategies for differentially-private sliding window queries", University of Massachusetts, Amherst, November 2013

  2. "Efficient and accurate strategies for differentially-private sliding window queries", University of Massachusetts, Lowell, November 2013

  3. "Efficient and accurate strategies for differentially-private sliding window queries", Hong Kong University, June 2013

  4. "Efficient and accurate strategies for differentially-private sliding window queries", Hong Kong University of Science and Technology, June 2013

  5. "A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks", Boston University, March 2012

  6. "Geometric and Cryptographic Transformations for Private Matching of Spatial Datasets", University of Pittsburgh, October 2011

  7. "Geometric and Cryptographic Transformations for Private Matching of Spatial Datasets", University of Massachusetts at Dartmouth, October 2011

  8. "Spatial Cloaking vs Cryptographic Protocols: Alternatives for Privacy in Location-based Services", University of Texas at Dallas, May 2009

  9. "Private Queries in Location Based Services: Anonymizers are not Necessary", DAIS Seminar, University of Illinois at Urbana-Champaign (UIUC), April 2009

  10. KEYNOTE: "Understanding the Privacy-Efficiency Trade-off in Location-Based Queries", ACM SIGSPATIAL GIS Workshop on Security and Privacy in GIS and LBS (SPRINGL), November 2008

  11. "Private Queries in Location Based Services: Anonymizers are not Necessary" Center for Education and Research in Information Assurance and Security (CERIAS), September 2008

  12. "Private Queries in Location Based Services: Anonymizers are not Necessary", Database Group Colloquium, University of California at San Diego (UCSD), April 2008

  13. "Private Queries in Location Based Services: Anonymizers are not Necessary", InfoLab Seminar, University of Southern California (USC), March 2009

  14. "Privacy-Preserving Spatial Queries in Location Based Services", Database Seminar, University of Hong Kong (HKU), December 2006

  15. "Privacy-Preserving Spatial Queries in Location Based Services", Database Seminar, Hong Kong University of Science and Technology (HKUST), November 2006