Faculty

Sourya Joyee De

Asst. Professor
souryajoyee@iimraipur.ac.in

Sourya Joyee De

Asst. Professor
Fellow (IIM Calcutta), B.E.(Bengal Engineering and Science University, Shibpur)
About Faculty

Area of Research

Privacy risk analysis, Privacy in online social networks (OSN), smart grid and quantified self, Enhancing user control on personal data, User consent in personal data processing, General Data Protection Regulation (GDPR) compliance, Interdisciplinary research in security and privacy


Education
Fellow (IIM Calcutta), B.E.(Bengal Engineering and Science University, Shibpur)
Affiliation

i. Researcher (2017 - 2019), Team PESTO, LORIA-CNRS-INRIA Nancy Grand-Est, France

ii. Post doctorant (2015 - 2017), Team PRIVATICS, INRIA Lyon & Universite de Lyon, France

iii. Visiting Scientist (2014 – 2015), Indian Statistical Institute, Kolkata, India

Awards & Recognitions
Research

Edited/Authored Books

>> Sourya Joyee De, Daniel le Metayer (2016). Privacy Risk Analysis. Morgan & Claypool Publishers

Journal Publications

>> De, S. J., & Shukla, R. (2020). Privacy policies of e‐governance initiatives: Evidence from India. Journal of Public Affairs, DOI: https://doi.org/10.1002/pa.2160

>> De, S. J., & Imine, A. (2020). Consent for targeted advertising: the case of Facebook. AI & Society, DOI: 10.1007/s00146-020-00981-5

>> Sourya Joyee De, Sushmita Ruj (2017). Efficient Decentralized Attribute Based Access Control for Mobile Clouds. IEEE Transactions on Cloud Computing (TCC) (Impact factor: 7.928)

>> Arpita Maitra, Sourya Joyee De, Goutam Paul, Asim Kumar Pal (2015). A Proposal for Quantum Rational Secret Sharing. Physical Review A, 92, 022305. (Impact Factor: 2.925)

Conference Papers

>> De, S. J., & Imine, A. (2018). Enabling Users to Balance Social Benefit and Privacy in Online Social Networks. 16th Annual Conference on Privacy, Security and Trust (PST'18). IEEE.

>> De, S. J., & Le Metayer, D. (2018). Privacy Risk Analysis to Enable Informed Privacy Settings. International Workshop on Privacy Engineering (IWPE'18)

>> (2018). To Reveal or Not to Reveal: Balancing User-Centric Social Benefit and Privacy in Online Social Networks. 33rd ACM Symposium on Applied Computing (SAC'18). ACM.

>> De, S. J., & Imine, A. (2017). Privacy Scoring of Social Network User Profiles through Risk Analysis. 12th International Conference on Risks and Security of Internet and Systems (CRiSIS'17)

>> De, S. J., & Le Metayer, D. (2017). A Refinement Approach for the Reuse of Privacy Risk Analysis Results. Privacy Technologies and Policy - 5th Annual Privacy Forum (APF'17), Vienna, Austria: Springer

>> De, S. J., & Le Metayer, D. (2016). PRIAM: A Privacy Risk Analysis Methodology. 11th International Workshop on Data Privacy Management (DPM'16), Heraklion, Crete, Greece: Springer

>> De, S. J., & Le Metayer, D. (2016). Privacy Harm Analysis: A Case Study on Smart Grids. International Workshop on Privacy Engineering (IWPE'16), IEEE, San Jose, United States

>> De, S. J., & Ruj, S. (2016). Failure Tolerant Rational Secret Sharing. The 30th IEEE International Conference on Advanced Information Networking and Applications (AINA-2016) (pp. 925-932). Le Régent Congress Centre, Crans-Montana, Switzerland

>> De, S. J., & Ruj, S. (2015). Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption. 2015 IEEE Global Communications Conference (GLOBECOM'15) (pp. 1-6). IEEE

>> De, S. J., Ruj, S., & Pal, A. K. (2014). Should Silence be Heard? Fair Rational Secret Sharing with Silent and Non-Silent Players. 13th International Conference on Cryptology and Network Security (CANS'14) (pp. 240-255). Switzerland: Springer International Publishing

>> De, S. J., & Pal, A. K. (2014). A Policy-based Security Framework for Storage and Computation on Enterprise Data in the Cloud. 47th Hawaii International Conference on System Sciences (HICSS'14) (pp. 4986- 4997). IEEE.

>> Ghosh, A., De, S. J., & Mahanti, A. (2014). A Mobile Banking Model in the Cloud for Financial Inclusion in India. ACM SIGDOC Conference, Colorado Springs, CO, USA

>> De, S. J., & Pal, A. K. (2013). Achieving Correctness in Fair Rational Secret Sharing. 12th International Conference on Cryptology and Network Security 2013 (CANS'13) (pp.139-161). Switzerland: Springer International Publishing

>> De, S. J., & Pal, A. K. (2013). Auctions with Rational Adversary. 9th International Conference on Information System Security (ICISS'13) (pp. 91-105). Springer-Verlag Berlin Heidelberg

>> De, S. J., Saha, S., & Pal, A. K. (2013). Achieving Energy Efficiency and Security in Mobile Cloud Computing. 3rd International Conference on Cloud Computing and Services Sciences (CLOSER'13) (pp. 469-474). SciTePress

>> De, S. J., & Pal, A. K. (2013). Cloud-based Privacy Aware Preference Aggregation Service. Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, Regensburg, Germany

>> De, S. J., & Imine, A. (2018) . On Consent in Online Social Networks: Privacy Impacts and Research Directions. 13th International Conference on Risks andSecurity of Internet and Systems (CRiSIS'18). Springer

Memberships
Training and Consultancy
i. Program Director and Instructor, Cyber Security Risk Management (e-learning course for working executives)
ii. Co-Program Director and Co-Instructor, Business Management in Digital Economy (e-learning course for working executives)

English हिन्दी