Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

N Kaaniche, M Laurent, S Belguith - Journal of Network and Computer …, 2020 - Elsevier
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …

Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms

N Kaaniche, M Laurent - Computer Communications, 2017 - Elsevier
Recent technological advances have sparked the popularity and success of cloud. This new
paradigm is gaining an expanding interest, since it provides cost efficient architectures that …

Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot

S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia - Computer Networks, 2018 - Elsevier
Attribute based encryption (ABE) is an encrypted access control mechanism that ensures
efficient data sharing among dynamic group of users. Nevertheless, this encryption …

Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review

GM Garrido, J Sedlmeir, Ö Uludağ, IS Alaoui… - Journal of Network and …, 2022 - Elsevier
IoT data markets in public and private institutions have become increasingly relevant in
recent years because of their potential to improve data availability and unlock new business …

Realizing an internet of secure things: A survey on issues and enabling technologies

SA Hamad, QZ Sheng, WE Zhang… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …

Proud: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications

S Belguith, N Kaaniche, M Hammoudeh… - Future Generation …, 2020 - Elsevier
The ever-growing number of Internet connected devices poses several cybersecurity risks.
Most of the exchanged data between the Internet of Things (IoT) devices are not adequately …

Bringing data minimization to digital wallets at scale with general-purpose zero-knowledge proofs

M Babel, J Sedlmeir - arxiv preprint arxiv:2301.00823, 2023 - arxiv.org
Today, digital identity management for individuals is either inconvenient and error-prone or
creates undesirable lock-in effects and violates privacy and security expectations. These …

Lessons learned: Surveying the practicality of differential privacy in the industry

GM Garrido, X Liu, F Matthes, D Song - arxiv preprint arxiv:2211.03898, 2022 - arxiv.org
Since its introduction in 2006, differential privacy has emerged as a predominant statistical
tool for quantifying data privacy in academic works. Yet despite the plethora of research and …

Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds

S Belguith, N Kaaniche, M Laurent, A Jemai… - Journal of Parallel and …, 2020 - Elsevier
In this paper, we propose an accountable privacy preserving attribute-based framework,
called Ins-PAbAC, that combines attribute based encryption and attribute based signature …

Analysis of attribute‐based cryptographic techniques and their application to protect cloud services

S Belguith, N Kaaniche… - Transactions on …, 2022 - Wiley Online Library
Recent technological advances such as the internet of things, fog computing, and cloud
applications lead to exponential growth in the amount of generated data. Indeed, cloud …