Post Job Free
Sign in

Assistant Project

Location:
Goleta, CA
Posted:
November 11, 2012

Contact this candidate

Resume:

Krishna P. N. Puttaswamy

*** ****** ****, *** *** Email: ********@**.****.***

Goleta, CA 93117 Phone: 805-***-****

http://www.cs.ucsb.edu/~krishnap

Security and privacy, cloud computing, distributed systems and applications, Internet

Research

measurement.

Interests

Ph.D. in Computer Science, Sept. 2005 - Present

Education

Department of Computer Science, University of California at Santa Barbara

Bachelor of Engineering (Computer Engineering), May 2003

National Institute of Technology Karnataka, Surathkal, Karnataka, India

Research Toward Con dentiality in Third-Party Compute Clouds

By o ering high availability and elastic access to resources, third-party cloud infrastruc-

Experience

tures such as Amazon AWS and Microsoft Azure are revolutionizing the way today s

businesses operate. However, data con dentiality concerns are hindering cloud adap-

tion by many businesses. In this project, we have developed a novel approach for

businesses to obtain elasticity from the cloud while also obtaining data con dential-

ity guarantees. We are now building developer tools to enable businesses to adapt

our approach automatically into their deployed applications with very little developer

support.

Collaborative Editing of Fidelity Reduced Documents on Mobile Devices

In this project, we are building a new framework to support editing shared documents

on mobile devices. Three high-level requirements in uenced its design. Namely, a) the

need to adapt content, especially textual content, on the y according to the quality of

the network connection and the form factor of each device. b) Support for concurrent,

uncoordinated editing on di erent devices, whose e ects will later be merged on all

devices in a convergent and consistent manner without sacri cing the semantics of

the edits. And c) exible replication that accommodates both device-to-device and

cloud-mediated synchronization. The framework supports on-the-go editing for XML

documents, such as documents in Microsoft Word and other commonly used formats.

Anonymity-Preserving Data Aggregation

Data aggregation is a key aspect in many distributed applications. In these appli-

cations, user anonymity is a key concern of the participants. In the absence of an

assurance of anonymity, users may be reluctant to participate. In this project, we

developed novel aggregation techniques to perform data aggregation while preserving

user anonymity. In addition, we bound the data pollution caused by malicious users

behind the cloak of anonymity, while maintaining overall system scalability using a

novel multi-tree data structure for aggregation.

Privacy Protection for Social Content-Sharing Applications

Online social network applications are popular means for interaction, communication

and collaboration between friends. While sharing content promotes the overall utility

of these applications, many users are wary of being associated with their sensitive data.

In this project, we identi ed the key attacks possible due to compromised third-party

application servers or due to compromised user accounts (by botnets, for example)

that weaken user privacy, proposed techniques to defend against these attacks, and

validated the techniques using datasets from several social networks and applications.

Flexible and Robust Anonymous Communication

Deployed anonymous systems such as Tor use static end-to-end paths for communica-

tion. These static paths are brittle and must be rebuilt following a failure of any node

on the path. This is costly in terms of resource overhead and also leaks information

to various attacks leading to signi cant degradation of anonymity over long sessions.

In this project, we developed a new abstraction for building anonymous systems called

hooks. We showed that hooks can build robust anonymous paths, and provide orders

of magnitude stronger anonymity compared to existing systems.

Improving Rare Object Search in Unstructured Overlays

Existing peer-to-peer search protocols are e ective in locating highly popular objects,

but they fail to locate a signi cant portion of the rare objects existing in the network.

High recall for these rare objects would drastically improve the user experience, and

make these networks the ideal distribution infrastructure for user-generated content

such as home videos and photo albums. In this work, we developed simple techniques

that can improve search recall for rare objects while minimizing the overhead incurred

by participating peers. We proposed several multihop index replication strategies that

improve the performance of peer-to-peer overlays by orders of magnitude in both lookup

success and lookup overhead.

Securing Structured Overlays Against Identity Attacks

To support applications such as global-scale storage, structured peer-to-peer (P2P)

overlay networks use key-based routing (KBR) to choose servers and perform application

tasks. KBR, however, is vulnerable to identity attack. By hijacking and responding to

KBR messages, malicious peers can usurp application connections, and thus severely

disrupt overlay applications. Attackers can assume arbitrary application roles such as

storage server for a speci c le or root of a speci c multicast tree through this attack.

The impact is ampli ed when this attack is launched by colluding peers following a

Sybil or Eclipse attack. In this work, we studied these identity attacks, analyze the costs

to perform them, and proposed lightweight mechanisms to detect and evade attackers.

Krishna P. N. Puttaswamy, Ranjita Bhagwan and Venkat Padmanabhan Anonymity-

Publications

Preserving Data Aggregation using Anonygator To Appear: ACM/IFIP/USENIX

11th International Middleware Conference (Middleware 2010) Bangalore, India. Novem-

ber 2010

Krishna P. N. Puttaswamy, Cathy Marshall, Venugopalan Ramasubramanian, Patrick

Stuedi, Douglas B. Terry and Ted Wobber Docx2Go: Collaborative Editing of Fidelity

Reduced Documents on Mobile Devices To Appear: 8th Annual International Con-

ference on Mobile Systems, Applications and Services (MobiSys 2010) San Francisco,

CA, USA. June 2010

Venugopalan Ramasubramanian, Kaushik Veeraraghavan, Krishna P. N. Puttaswamy,

Thomas L. Rodehe er, Douglas B. Terry and Ted Wobber Fidelity-Aware Replication

for Mobile Devices IEEE Transactions on Mobile Computing (TMC), 2010

Krishna P. N. Puttaswamy and Ben Y. Zhao Preserving Privacy in Location-based

Mobile Social Applications 11th Workshop on Mobile Computing Systems and Appli-

cations (ACM HotMobile) Annapolis, MD, February 2010

Krishna P. N. Puttaswamy, Alessandra Sala, and Ben Y. Zhao StarClique: Guaran-

teeing User Privacy in Social Networks Against Intersection Attacks ACM Conference

on emerging Networking EXperiments and Technologies (CoNEXT 2009) Rome, Italy,

December 2009

Christo Wilson, Bryce Boe, Alessandra Sala, Krishna Puttaswamy and Ben Y. Zhao

User Interactions in Social Networks and their Implications ACM EuroSys 2009,

Nuremburg, Germany, April 2009

Krishna P. N. Puttaswamy, Alessandra Sala, Omer Egecioglu, and Ben Y. Zhao

Rome: Performance and Anonymity using Route Meshes IEEE INFOCOM 2009

Minisymposium, Rio de Janeiro, Brazil, April 2009

Krishna P. N. Puttaswamy, Alessandra Sala, and Ben Y. Zhao

Improving Anonymity using Social Links IEEE Workshop on Secure Network Pro-

tocols (NPSec 2008), Orlando, FL, October 2008

Krishna P. N. Puttaswamy, Alessandra Sala, Christo Wilson, and Ben Y. Zhao

Defending Anonymity against Predecessor Attacks in Bluemoon IEEE International

Conference on Network Protocols (ICNP 2008), Orlando, FL, October 2008

Krishna P. N. Puttaswamy, Ben Y. Zhao and Haitao Zheng,

Securing Structured Overlays Against Identity Attacks, IEEE Transactions on Par-

allel and Distributed Systems (TPDS), 2008

Krishna P. N. Puttaswamy, Alessandra Sala and Ben Y. Zhao,

Searching for Rare Objects using Index Replication Proceeding of 27th IEEE Inter-

national Conference on Computer Communications (INFOCOM 2008), Phoenix, AZ,

April 2008

Krishna P. N. Puttaswamy and Ben Y. Zhao,

A Case for Unstructured Distributed Hash Tables Proceedings of IEEE Global Inter-

net Symposium (GI 2007), Anchorage, AK, May 2007

Krishna P. N. Puttaswamy, Christopher Kruegel and Ben Y. Zhao Silverline: Toward

Papers in

Con dentiality in Third-Party Clouds

Submission

Krishna P. N. Puttaswamy, Christopher Kruegel and Ben Y. Zhao Silverline: To-

Posters

ward Con dentiality in Third-Party Clouds Poster at the 7th USENIX Symposium

on Network Design and Implementation (NSDI 2010) San Jose, CA, April 2010

Krishna P. N. Puttaswamy, Christopher Kruegel and Ben Y. Zhao Protecting Private

Data in Third-Party Compute Clouds Poster at the 11th Workshop on Mobile Com-

puting Systems and Applications (ACM HotMobile) Annapolis, MD, February 2010

Professional University of California at Santa Barbara

Research Assistant Sept. 2006 - Present

Experience

Advisor: Ben Y. Zhao

Microsoft Research, India

Research Intern May 2010 - July 2010

Research Intern and June 2008 - Sept 2008

Mentors: Ranjita Bhagwan and Venkat Padmanabhan

Microsoft Research, Silicon Valley

Research Intern June 2009 - Sept 2009

Mentor: Venugopalan Rama Ramasubramanian

HP Laboratories

Research Intern June 2006 - Sept. 2006

Mentor: Rick McGeer

University of California at Santa Barbara

Teaching Assistant Sept. 2005 - June 2006

Microsoft India R&D Center

Software Design Engineer April 2004 - Aug. 2005

D.E.Shaw Software India Pvt. Ltd.

Member - Information Technology Aug. 2003 - April 2004

Fall 2005 Teaching Assistant, UCSB

Teaching

Undergraduate Operating Systems (CS170), Taught by: Ben Y. Zhao

Experience

Winter 2006 Teaching Assistant, UCSB

Introduction to Computer Programming (CS10), Taught by: C. Michael Costanzo

Spring 2006 Teaching Assistant, UCSB

Network Computing (CS176C), Taught by: Ben Y. Zhao

Reviewer for ICDCS 2006, DSN 2007, Concurrency and Computation: Practice and

Professional

Experience 2007, Journal for Advances in Multimedia 2007, IH 2008, ICDE 2009,

Service

PPOPP 2009, INFOCOM 2009, SIGCOMM CCR 2009, IEEE Transactions on Wire-

less Communications 2009, SecureComm 2009, P2P 2009, SRDS 2009, Euro-Par 2009,

INFOCOM 2010, and IPDPS 2010.

Awarded student travel grant to attend OSDI 2006, NSDI 2010, and MobiSys 2010.

Awards And

Ranked 12th (out of 100,000) in the state level engineering entrance exam, 1999.

Honors

Ranked among the top 2% of all students in IIT-JEE, 1999.

Recipient of Best Outgoing Student Award among 400 students, Sarvodaya Pre-

University College, Tumkur.



Contact this candidate