Proxy re-encryption: Analysis of constructions and its application to secure access delegation

D Nuñez, I Agudo, J Lopez - Journal of Network and Computer Applications, 2017 - Elsevier
This paper analyzes the secure access delegation problem, which occurs naturally in the
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …

MudraChain: Blockchain-based framework for automated cheque clearance in financial institutions

N Kabra, P Bhattacharya, S Tanwar, S Tyagi - Future Generation Computer …, 2020 - Elsevier
Currently, the burden on the cheque clearing houses in financial institutions is increasing
day-by-day, which necessitates the upgrading of the existing cheque truncation system …

Confidentiality-preserving publish/subscribe: A survey

E Onica, P Felber, H Mercier, E Rivière - ACM computing surveys (CSUR …, 2016 - dl.acm.org
Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale
distributed applications running across multiple administrative domains. Pub/sub allows …

Toward content-centric privacy in ICN: Attribute-based encryption and routing

M Ion, J Zhang, EM Schooler - Proceedings of the 3rd ACM SIGCOMM …, 2013 - dl.acm.org
We design a content-centric privacy scheme for Information-Centric Networking (ICN). We
enhance ICN's ability to support data confidentiality by introducing attribute-based …

Secure pub-sub: Blockchain-based fair payment with reputation for reliable cyber physical systems

Y Zhao, Y Li, Q Mu, B Yang, Y Yu - IEEE Access, 2018 - ieeexplore.ieee.org
The cyber physical system (CPS) has gained considerable success in large-scale
distributed integration environment. In such systems, the sensor devices collect data which …

SEEMQTT: secure end-to-end MQTT-based communication for mobile IoT systems using secret sharing and trust delegation

M Hamad, A Finkenzeller, H Liu… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
The publish/subscribe (Pub/Sub) model offers a communication scheme that is appropriate
for a variety of mobile Internet of Things (IoT) systems (eg, autonomous vehicles). In most of …

PU-ABE: Lightweight attribute-based encryption supporting access policy update for cloud assisted IoT

S Belguith, N Kaaniche… - 2018 IEEE 11th …, 2018 - ieeexplore.ieee.org
Cloud-assisted IoT applications are gaining an expanding interest, such that IoT devices are
deployed in different distributed environments to collect and outsource sensed data to …

On security in publish/subscribe services: A survey

C Esposito, M Ciampi - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
Publish/subscribe services have encountered considerable success in the building of
modern large-scale mission-critical systems. Such systems are characterized by several non …

Galaxy: A Scalable BFT and Privacy-Preserving Pub/Sub IoT Data Sharing Framework Based on Blockchain

Y Zhang, X Wang, X He, N Zhang… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The emergence of the Internet of Things (IoT) technology in recent years has led to a
considerable amount of data to be shared across different organizations. The publish and …

Distributed group key management for event notification confidentiality among sensors

C Esposito, M Ficco, A Castiglione… - … on Dependable and …, 2018 - ieeexplore.ieee.org
There is an increasing involvement of the Internet of Things (IoT) in many of our daily
activities, with the aim of improving their efficiency and effectiveness. We are witnessing the …