Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …
contexts. For instance, with the emergence of distributed applications, several providers are …
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms
Recent technological advances have sparked the popularity and success of cloud. This new
paradigm is gaining an expanding interest, since it provides cost efficient architectures that …
paradigm is gaining an expanding interest, since it provides cost efficient architectures that …
Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot
Attribute based encryption (ABE) is an encrypted access control mechanism that ensures
efficient data sharing among dynamic group of users. Nevertheless, this encryption …
efficient data sharing among dynamic group of users. Nevertheless, this encryption …
Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review
IoT data markets in public and private institutions have become increasingly relevant in
recent years because of their potential to improve data availability and unlock new business …
recent years because of their potential to improve data availability and unlock new business …
Realizing an internet of secure things: A survey on issues and enabling technologies
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …
momentum in connecting physical objects to the Internet and facilitating machine-to-human …
Proud: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications
The ever-growing number of Internet connected devices poses several cybersecurity risks.
Most of the exchanged data between the Internet of Things (IoT) devices are not adequately …
Most of the exchanged data between the Internet of Things (IoT) devices are not adequately …
Bringing data minimization to digital wallets at scale with general-purpose zero-knowledge proofs
Today, digital identity management for individuals is either inconvenient and error-prone or
creates undesirable lock-in effects and violates privacy and security expectations. These …
creates undesirable lock-in effects and violates privacy and security expectations. These …
Lessons learned: Surveying the practicality of differential privacy in the industry
Since its introduction in 2006, differential privacy has emerged as a predominant statistical
tool for quantifying data privacy in academic works. Yet despite the plethora of research and …
tool for quantifying data privacy in academic works. Yet despite the plethora of research and …
Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds
In this paper, we propose an accountable privacy preserving attribute-based framework,
called Ins-PAbAC, that combines attribute based encryption and attribute based signature …
called Ins-PAbAC, that combines attribute based encryption and attribute based signature …
Analysis of attribute‐based cryptographic techniques and their application to protect cloud services
Recent technological advances such as the internet of things, fog computing, and cloud
applications lead to exponential growth in the amount of generated data. Indeed, cloud …
applications lead to exponential growth in the amount of generated data. Indeed, cloud …