BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:Canada/Eastern
BEGIN:DAYLIGHT
DTSTART:20200308T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20201101T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20200703T172647Z
UID:5E2329A4-6F51-4314-B5A7-804E3A928DBA
DTSTART;TZID=Canada/Eastern:20200629T130000
DTEND;TZID=Canada/Eastern:20200629T140000
DESCRIPTION:Abstract\n\nData security has become an integral part of today
 ’s digital market. With the advent of cloud computing and influx of onli
 ne services\, privacy of the users has become a challenge for the service 
 providers. With a tremendous increase in the number of privacy breeches al
 l over the world\, privacy preserving strategies for the data in the cloud
  have been studies in greater depths. To address security issues of the da
 ta in the cloud\, privacy preserving techniques can be sub branched into E
 ncryption\, Differential Privacy and De-Identification. This talk covers t
 he research done in all the three areas in order to preserve the privacy o
 f the data from the cloud service provider or the third party mining the d
 ata. Encryption scheme can further be utilized to provide Data Deduplicati
 on strategy for the data in the cloud by keeping only one single copy of t
 he identical data coming from different users. This will save digital spac
 e and at the same time provide data security to the users. The sharing of 
 images and videos has made the multimedia data to become a huge portion of
  the data in the cloud. This talks covers de- duplication strategies appli
 ed to multimedia data in the cloud.\n\nBiography\n\nFatema Rashid complete
 d her Bachelor of Science (BS) in Computer Science from National Universit
 y of Computer and Emerging Sciences\, Karachi\, Pakistan in 2004. She comp
 leted her Master of Science (MS)\, Computer Science from Ryerson Universit
 y\, Toronto in 2009 with the thesis entitled  “Inverse Biometrics for Ke
 ystroke Dynamics”. Her PhD was completed in 2015 from Ryerson University
  and the title of the thesis was “ Secure Data Deduplication in Cloud En
 vironments”. She has the honour of being the first PhD of the Department
  of Computer Science at Ryerson University. She has published several publ
 ications with reputable journals like Journal of Information Security and 
 Applications and conferences like IEEE Intl. Conference on BigData Computi
 ng Service and Applications\n\nIEEE World Congress on Services\, Annual In
 formation Technology\, Electronics and Mobile Communication Conference (IE
 MCON)\, Symposium on Cyberspace Safety and Security\, IEEE\n\nPrivacy\, an
 d Security and Trust (PST). She has also contributed a chapter for the boo
 k entitled “Guide to Big Data Applications by Springer”. She has worke
 d as Information Management Specialist at iG2 Inc.\, Toronto. During this 
 period\, she contributed 3 white papers for the firm entitled “Interconn
 ected Vulnerability\, IoT and Next Generation Protection” \, “A framew
 ork for Inside Threat Vulnerability Assessment “ and “Cloud Security a
 nd IoT Security Foundations ”. She is currently involved as a Post Docto
 ral research fellow at Ryerson University and doing research in the area o
 f Big Data Security with Differential Privacy and Generative Adversial Net
 works. She is a member of iCasL Center at Ryerson University and involved 
 in different projects of cyber security\, Big Data Security and Block Chai
 n Security. She has a vast teaching experience of more than 5 years rangin
 g from teaching as a lecturer in NUST\, Pakistan\, Ryerson University\, Ch
 ang School of Continuing Education and Centennial College\, Toronto. Durin
 g her education\, she has been awarded Queen Elizabeth II Graduate Scholar
 ship in Science and Technology two times at Ryerson University.\n\nZoom De
 tails:\n\nTopic: Data Deduplication techniques in the Cloud\n\nTime: Jun 2
 9\, 2020 01:00 PM Eastern Time (US and Canada)\n\nJoin Zoom Meeting\n\nhtt
 ps://us02web.zoom.us/j/89988285148\n\nMeeting ID: 899 8828 5148\n\nOne tap
  mobile\n\n+13126266799\,\,89988285148# US (Chicago)\n\n+13462487799\,\,89
 988285148# US (Houston)\n\nDial by your location\n\n+1 312 626 6799 US (Ch
 icago)\n\n+1 346 248 7799 US (Houston)\n\n+1 646 558 8656 US (New York)\n\
 n+1 669 900 9128 US (San Jose)\n\n+1 253 215 8782 US (Tacoma)\n\n+1 301 71
 5 8592 US (Germantown)\n\nMeeting ID: 899 8828 5148\n\nFind your local num
 ber: https://us02web.zoom.us/u/kcvSmT3V2B\n\nSpeaker(s): Dr. Fatema Rashid
 \, \n\nZoom Meeting https://us02web.zoom.us/j/89988285148\, Toronto\, Onta
 rio\, Canada
LOCATION:Zoom Meeting https://us02web.zoom.us/j/89988285148\, Toronto\, Ont
 ario\, Canada
ORGANIZER:ayda.naserialiabadi@ryerson.ca
SEQUENCE:1
SUMMARY:Data Deduplication Techniques in the Cloud
URL;VALUE=URI:https://events.vtools.ieee.org/m/233946
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;/p&gt;\n&lt;p style=&quot;f
 ont-weight: 400\;&quot;&gt;Data security has become an integral part of today&amp;rsqu
 o\;s digital market. With the advent of cloud computing and influx of onli
 ne services\, privacy of the users has become a challenge for the service 
 providers. With a tremendous increase in the number of privacy breeches al
 l over the world\, privacy preserving strategies for the data in the cloud
  have been studies in greater depths.&amp;nbsp\; To address security issues of
  the data in the cloud\, privacy preserving techniques can be sub branched
  into Encryption\, Differential Privacy and De-Identification.&amp;nbsp\; This
  talk covers the research done in all the three areas in order to preserve
  the privacy of the data from the cloud service provider or the third part
 y mining the data.&amp;nbsp\; Encryption scheme can further be utilized to pro
 vide Data Deduplication strategy for the data in the cloud by keeping only
  one single copy of the identical data coming from different users. This w
 ill save digital space and at the same time provide data security to the u
 sers. The sharing of images and videos has made the multimedia data to bec
 ome a huge portion of the data in the cloud. This talks covers de- duplica
 tion strategies applied to multimedia data in the cloud.&amp;nbsp\;&lt;/p&gt;\n&lt;p st
 yle=&quot;font-weight: 400\;&quot;&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;Biography&lt;/strong&gt;&lt;/p&gt;\n&lt;
 p&gt;Fatema Rashid completed her Bachelor of Science (BS) in Computer Science
  from National University of Computer and Emerging Sciences\, Karachi\, Pa
 kistan in 2004. She completed her Master of Science (MS)\, Computer Scienc
 e from Ryerson University\, Toronto in 2009 with the thesis entitled&amp;nbsp\
 ;&amp;nbsp\;&lt;strong&gt;&amp;nbsp\;&lt;/strong&gt;&amp;ldquo\;Inverse Biometrics for Keystroke D
 ynamics&amp;rdquo\;. Her PhD was completed in 2015 from Ryerson University and
  the title of the thesis was &amp;ldquo\;&amp;nbsp\;Secure Data Deduplication in C
 loud Environments&amp;rdquo\;. &amp;nbsp\;She has the honour of being the first Ph
 D of the Department of Computer Science at Ryerson University. She has pub
 lished several publications with reputable journals like Journal of Inform
 ation Security and Applications and conferences like IEEE Intl. Conference
  on BigData Computing Service and Applications&lt;/p&gt;\n&lt;p&gt;IEEE World Congress
  on Services\,&amp;nbsp\;&lt;em&gt;Annual Information Technology\, Electronics and M
 obile Communication Conference (IEMCON)&lt;/em&gt;\, Symposium on Cyberspace Saf
 ety and Security\, IEEE&lt;/p&gt;\n&lt;p&gt;Privacy\, and Security and Trust (PST). Sh
 e has also contributed a chapter for the book entitled &amp;ldquo\;&lt;em&gt;Guide t
 o Big Data Applications&lt;/em&gt;&amp;nbsp\;by Springer&amp;rdquo\;.&amp;nbsp\;&amp;nbsp\;She h
 as worked as&amp;nbsp\;Information Management Specialist at iG2 Inc.\, Toronto
 .&amp;nbsp\; During this period\, she contributed&amp;nbsp\;&amp;nbsp\;3 white papers 
 for the firm entitled &amp;ldquo\;Interconnected Vulnerability\, IoT and Next 
 Generation Protection&amp;rdquo\;&amp;nbsp\;\, &amp;ldquo\;A framework for Inside Thre
 at Vulnerability Assessment&amp;nbsp\;&amp;ldquo\; and &amp;ldquo\;Cloud Security and 
 IoT Security Foundations&amp;nbsp\;&amp;rdquo\;.&amp;nbsp\; She is currently involved 
 as a Post Doctoral research fellow at Ryerson University and doing researc
 h in the area of Big Data Security with Differential Privacy and Generativ
 e Adversial Networks. She is a member of iCasL Center at Ryerson Universit
 y and involved in different projects of cyber security\, Big Data Security
  and Block Chain Security. She has a vast teaching experience of more than
  5 years ranging from teaching as a lecturer in NUST\, Pakistan\, Ryerson 
 University\, Chang School of Continuing Education and Centennial College\,
  Toronto.&amp;nbsp\; During her education\, she has been awarded Queen Elizabe
 th II Graduate Scholarship in Science and Technology two times at Ryerson 
 University.&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;Zoom Details:&lt;/strong&gt;&lt;
 /p&gt;\n&lt;p&gt;Topic: Data Deduplication techniques in the Cloud&lt;/p&gt;\n&lt;p&gt;Time: Ju
 n 29\, 2020 01:00 PM Eastern Time (US and Canada)&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;Join Zoo
 m Meeting&lt;/strong&gt;&lt;/p&gt;\n&lt;p&gt;https://us02web.zoom.us/j/89988285148&lt;/p&gt;\n&lt;p&gt;M
 eeting ID: 899 8828 5148&lt;/p&gt;\n&lt;p&gt;One tap mobile&lt;/p&gt;\n&lt;p&gt;+13126266799\,\,89
 988285148# US (Chicago)&lt;/p&gt;\n&lt;p&gt;+13462487799\,\,89988285148# US (Houston)&lt;
 /p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;Dial by your location&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\
 ;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\; +1 312 626 6799 US (Chicago)&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;
 &amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\; +1 346 248 7799 US (Houston)&lt;/p
 &gt;\n&lt;p&gt;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\; +1 646 558 8656 US
  (New York)&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\; +1 6
 69 900 9128 US (San Jose)&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp
 \;&amp;nbsp\; +1 253 215 8782 US (Tacoma)&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\;
 &amp;nbsp\;&amp;nbsp\; &amp;nbsp\;+1 301 715 8592 US (Germantown)&lt;/p&gt;\n&lt;p&gt;Meeting ID: 
 899 8828 5148&lt;/p&gt;\n&lt;p&gt;Find your local number: &lt;a href=&quot;https://us02web.zoo
 m.us/u/kcvSmT3V2B&quot;&gt;https://us02web.zoom.us/u/kcvSmT3V2B&lt;/a&gt;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

