Enhanced ETA Predictions with T-GCN on Optimized Road Segments

Oct 2024 Enhanced ETA Predictions with T-GCN on Optimized Road Segments Authors: Shivika Sharma, Nandini Mawane, Chetan Kumar Kuraganti, Dhruthick Gowda M, Mayur Taware, Yash Chandrashekhar Dixit, Sahil Mishra, Raghu Krishnapuram and Rakshit Ramesh Accurate Estimated Time of Arrival (ETA) predictions play a critical role in improving the operational efficiency, traffic management, and reliability of services in transit systems. This …

Continue Reading

Data-Driven Solid Waste Management Optimization with Vehicle Routing and Redistribution Strategy

Oct 2024 Data-Driven Solid Waste Management Optimization with Vehicle Routing and Redistribution Strategy Authors: Chetan Kumar Kuraganti, Arun Josephraj, Saanidhya Vats, Amarthya KR, Koesha Sinha, Raghu Krishnapuram and Rakshit Ramesh This paper presents two techniques for optimizing solid waste management (SWM) systems of a city. The first technique involves planning routes for garbage collection vehicles which utilizes the Capacitated Vehicle …

Continue Reading
A-Contributory-Public-Event-img

A Contributory Public-Event Recording and Querying System

December 2023 A Contributory Public-Event Recording and Querying System Authors: Arun Joseph, Nikita Yadav, Vinod Ganapathy, Dushyant Behl CCTV (Closed-Circuit Television) systems are commonly used for security and surveillance. They provide a visual record of events, which can be used to monitor criminal activity, support investigations, and improve public safety. Many cities have implemented a number of cameras for surveillance, …

Continue Reading
Integrating-Crypto-Based-Payment-img

Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy

December 2024 Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy Authors: V. Walunj, V. Rajaraman, J. Dutta, A. Sharma Data exchanges as Digital Public Infrastructures drive data-driven economies by enhancing efficiency, enabling revenue streams, and facilitating data monetization. This work explores integrating crypto-based payments into platforms like IUDX and ADeX, offering benefits such as enhanced …

Continue Reading
What-makes-consent-meaningful-img

What makes consent meaningful?

June 2024 What makes consent meaningful? Authors: Asilata This paper seeks to examine the concept of meaningfulness of consent with a focus on consent in digital transactions. To that end, it proposes a “consent matrix”, depicting the structure of consent transactions across two dimensions- the realm of consent-objects and the modes of obtaining consent. The matrix maps the two dimensions …

Continue Reading

Consent Service Architecture for Policy-Based Consent Management in Data Trusts

Jan 2024 Consent Service Architecture for Policy-Based Consent Management in Data Trusts Authors: Balambiga, Rohith, Srinath, Santosh, Srinivas Data trusts handle data in a fiduciary capacity for data owners, allowing them to process, aggregate and share data with other stakeholders within an overarching legal and ethical framework. One of the primary challenges of data trusts is consent management. This paper …

Continue Reading

Extensible Consent Management Architectures for Data Trusts

Sep 2023 Extensible Consent Management Architectures for Data Trusts Authors: Balambiga, Srinath, Rohith, Jayati Sensitive personal information of individuals and non-personal information of organizations or communities often needs to be legitimately exchanged among different stakeholders, to provide services, maintain public health, law and order, and so on. While such exchanges are necessary, they also impose enormous privacy and security challenges. …

Continue Reading

Graphiti: Secure Graph Computation Made More Scalable

December 2024 Graphiti: Secure Graph Computation Made More Scalable Authors: Koti, N., Kukkala, V. B., Patra, A., & Raj Gopal, B. Privacy-preserving graph analysis allows performing computations on graphs that store sensitive information, while ensuring all the information about the topology of the graph as well as data associated with the nodes and edges remains hidden. The current work addresses …

Continue Reading

Ruffle: Rapid 3-party shuffle protocols

March 2023 Ruffle: Rapid 3-party shuffle protocols Authors: Koti, N., Kukkala, V. B., Patra, A., Gopal, B. R., & Sangal, S Secure shuffle is an important primitive that finds use in several applications such as secure electronic voting, oblivious RAMs, secure sorting, to name a few. For time-sensitive shuffle-based applications that demand a fast response time, it is essential to …

Continue Reading

Vogue: Faster computation of private heavy hitters

October 2023 Vogue: Faster computation of private heavy hitters Authors: Jangir, P., Koti, N., Kukkala, V. B., Patra, A., Gopal, B. R., & Sangal, S Consider the problem of securely identifying τ -heavy hitters, where given a set of client inputs, the goal is to identify those inputs which are held by at least τ clients in a privacy-preserving manner. …

Continue Reading