Proud: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications

S Belguith, N Kaaniche, M Hammoudeh… - Future Generation …, 2020 - Elsevier
The ever-growing number of Internet connected devices poses several cybersecurity risks.
Most of the exchanged data between the Internet of Things (IoT) devices are not adequately …

Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds

S Belguith, N Kaaniche, M Laurent, A Jemai… - Journal of Parallel and …, 2020 - Elsevier
In this paper, we propose an accountable privacy preserving attribute-based framework,
called Ins-PAbAC, that combines attribute based encryption and attribute based signature …

Analysis of attribute‐based cryptographic techniques and their application to protect cloud services

S Belguith, N Kaaniche… - Transactions on …, 2022 - Wiley Online Library
Recent technological advances such as the internet of things, fog computing, and cloud
applications lead to exponential growth in the amount of generated data. Indeed, cloud …

Secure fog-assisted crowdsensing with collusion resistance: From data reporting to data requesting

L Zhu, M Li, Z Zhang - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
The development and ubiquity of smart mobile devices have produced the idea of
crowdsensing, where people report and request data in a community via a cloud server …

Collusion defender: Preserving subscribers' privacy in publish and subscribe systems

S Cui, S Belguith, P De Alwis… - … on Dependable and …, 2019 - ieeexplore.ieee.org
The Publish and Subscribe (pub/sub) system is an established paradigm to disseminate the
data from publishers to subscribers in a loosely coupled manner using a network of …

CUPS: secure opportunistic cloud of things framework based on attribute‐based encryption scheme supporting access policy update

S Belguith, N Kaaniche, G Russello - Security and Privacy, 2020 - Wiley Online Library
The ever‐growing number of internet connected devices, coupled with the new computing
trends, namely within emerging opportunistic networks, engenders several security …

Performance analysis of privacy preservation-based authentication scheme and cryptographic-based data protocols for DSaC in cloud

AB Pawar, SU Ghumbre… - International Journal of …, 2023 - inderscienceonline.com
Advanced technology is the cloud computing that has the ability to preserve massive amount
of data and shares the data resources over the internet. Cloud computing has a wide range …

A secure privacy-preserving mutual authentication scheme for publish-subscribe fog computing

FM Salem - 2018 14th International Computer Engineering …, 2018 - ieeexplore.ieee.org
The exponential grow of internet of things applications leads to proposing fog computing
structure that is geospatially distributed and latency sensitive. Since asynchronous …

Performance Analysis and Systematic Review of Privacy Preservation-Based Authentication Models and Cryptographic-Based Data Protocols

AB Pawar, SU Ghumbre, RM Jogdand - International Journal of …, 2022 - igi-global.com
This paper proposes a privacy preservation-based data security and secure data protocol for
distributed Data Storage and Communication (DSaC). An effective performance analysis is …

[引用][C] COLLUSION DEFENDER PRESERVING SUBSCRIBERS PRIVACY IN PUBLISH AND SUBSCRIBE SYSTEMS

P Uyyala - The International journal of analytical and experimental …, 2021