<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii"><meta name=Generator content="Microsoft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
        {font-family:SimSun;
        panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
        {font-family:SimSun;
        panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Tahoma;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
        {font-family:"\@SimSun";
        panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:#0563C1;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:#954F72;
        text-decoration:underline;}
span.EmailStyle17
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:windowtext;}
span.EmailStyle18
        {mso-style-type:personal-reply;
        font-family:"Calibri","sans-serif";
        color:#44546A;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link="#0563C1" vlink="#954F72"><div class=WordSection1><p class=MsoNormal><b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif";color:#44546A'>Hi guys,<o:p></o:p></span></b></p><p class=MsoNormal><span style='color:#44546A'><o:p> </o:p></span></p><p class=MsoNormal><span style='color:#44546A'>Please attend this talk this Friday! It’s a friend of mine. Thanks!<o:p></o:p></span></p><p class=MsoNormal><span style='color:#44546A'><o:p> </o:p></span></p><p class=MsoNormal><span style='color:#44546A'>Kenny<o:p></o:p></span></p><p class=MsoNormal>***************************************************************************<o:p></o:p></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>Title: Secure Access to Big Data with Confidentiality and Integrity Assurance<o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>Speaker: Haibo Hu, Department of Computer Science, Hong Kong Baptist University<o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>Host: Kenny Q. Zhu<o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>Time: 4 PM, Friday, July 3, 2015<o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>Venue: SEIEE-03-414<o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'><o:p> </o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>Abstract:<o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>With the prosperity of cloud computing and internet of things, huge <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>amount of heterogeneous data have spawned new businesses which crave for <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>integrating, querying, and analyzing big data. Among them, however, a <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>lot of data are born private and sensitive, such as financial <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>transactions, medical records, web/chat logs, and location traces. It is <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>challenging to access them for analytical tasks while still preserving <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>certain degree of confidentiality and integrity --- traditional <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>cryptography may fail us on this scale of volume, velocity, and <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>veracity. In this talk, I will discuss recent advances in secure access <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>to these sensitive data from an information system’s perspective. In <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>particular, I will give several show cases on how cryptographic tools <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>such as conditional oblivious transfer and homomorphic encryption are <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>reinforced with database techniques such as indexing, pruning, and <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>combinatorial optimization. These works can be put to practical use in <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>financial engineering, health care, social network, and location-based <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>services.<o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'><o:p> </o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>Biography<o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>Dr. Haibo Hu will be an assistant professor in the Department of <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>Electronic and Information Engineering, Hong Kong Polytechnic University <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>from September, 2015. He is currently a research assistant professor in <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>the Department of Computer Science, Hong Kong Baptist University. He <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>received his PhD degree from the Hong Kong University of Science and <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>Technology in 2005. His research interests include data security and <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>privacy, wireless data management, and location-based services. He has <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>published over 50 research papers in refereed journals, international <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>conferences, and book chapters. As PI, he has received over 4 million HK <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>dollars external research grants. He served on organizing and program <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>committee for many international conferences, and is the recipient of a <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>number of awards, including ACM Best PhD Paper Award, Microsoft Imagine <o:p></o:p></span></p><p class=MsoNormal style='line-height:15.95pt;background:white'><span style='font-size:11.5pt;font-family:"Courier New";color:#444444'>Cup, and GS1 Internet of Things Award.<o:p></o:p></span></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p></div></body></html>