Skip to main content

Research Repository

Advanced Search

All Outputs (13)

Towards securing machine learning models against membership inference attacks (2021)
Journal Article
Ben Hamida, S., Mrabet, H., Belguith, S., Alhomoud, A., & Jemai, A. (2022). Towards securing machine learning models against membership inference attacks. Computers, Materials & Continua, 70(3), 4897-4919. https://doi.org/10.32604/cmc.2022.019709

From fraud detection to speech recognition, including price prediction, Machine Learning (ML) applications are manifold and can significantly improve different areas. Nevertheless, machine learning models are vulnerable and are exposed to differen... Read More about Towards securing machine learning models against membership inference attacks.

On the security and privacy challenges of virtual assistants (2021)
Journal Article
Bolton, T., Dargahi, T., Belguith, S., Al-Rakhami, M., & Sodhro, A. (2021). On the security and privacy challenges of virtual assistants. Sensors, 21(7), e2312. https://doi.org/10.3390/s21072312

Since the purchase of Siri by Apple, and its release with the iPhone 4S in 2011, virtual assistants (VAs) have grown in number and popularity. The sophisticated natural language processing and speech recognition employed by VAs enables users to inter... Read More about On the security and privacy challenges of virtual assistants.

Security challenges of Internet of Underwater Things : a systematic literature review (2020)
Journal Article
systematic literature review. Transactions on Emerging Telecommunications Technologies, 32(3), e4203. https://doi.org/10.1002/ett.4203

Water covers approximately 71% of the earth surface, yet much of the underwater world remains unexplored due to technology limitations. Internet of Underwater Things (IoUT) is a network of underwater objects that enables monitoring subsea environmen... Read More about Security challenges of Internet of Underwater Things : a systematic literature review.

Network traffic analysis for threats detection in the Internet of Things (2020)
Journal Article
Hammoudeh, M., Pimlott, J., Belguith, S., Epiphaniou, G., Baker, T., Kayes, A., …Bounceur, A. (2020). Network traffic analysis for threats detection in the Internet of Things. IEEE Internet of Things Magazine, 3(4), 40-45. https://doi.org/10.1109/IOTM.0001.2000015

As the prevalence of the Internet of Things (IoT) continues to increase, cyber criminals are quick to exploit the security gaps that many devices are inherently designed with. Whilst users can not be expected to tackle this threat alone, many cur... Read More about Network traffic analysis for threats detection in the Internet of Things.

Privacy Enhancing Technologies for solving the privacy-personalization paradox : taxonomy and survey (2020)
Journal Article
Kaaniche, N., Laurent, M., & Belguith, S. (2020). Privacy Enhancing Technologies for solving the privacy-personalization paradox : taxonomy and survey. Journal of Network and Computer Applications, 171, 102807. https://doi.org/10.1016/j.jnca.2020.102807

Personal data are often collected and processed in a decentralized fashion, within different contexts. For instance, with the emergence of distributed applications, several providers are usually correlating their records, and providing personalized... Read More about Privacy Enhancing Technologies for solving the privacy-personalization paradox : taxonomy and survey.

A survey of IoT security based on a layered architecture of sensing and data analysis (2020)
Journal Article
Mrabet, H., Belguith, S., Alhomoud, A., & Jemai, A. (2020). A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors, 20(13), 3625

The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of dail... Read More about A survey of IoT security based on a layered architecture of sensing and data analysis.

A service-oriented approach for sensing in the Internet of Things : intelligent transportation systems and privacy use cases (2020)
Journal Article
Hammoudeh, M., Epiphaniou, G., Belguith, S., Unal, D., Adebisi, B., Baker, T., …Watters, P. (2021). A service-oriented approach for sensing in the Internet of Things : intelligent transportation systems and privacy use cases. IEEE Sensors Journal, 21(14), 15753-15761. https://doi.org/10.1109/JSEN.2020.2981558

This paper presents a Sensing-as-a-Service run-time Service Oriented Architecture (SOA), called 3SOA, for the development of Internet of Things (IoT) applications. 3SOA aims to allow interoperability among various IoT platforms and support service-or... Read More about A service-oriented approach for sensing in the Internet of Things : intelligent transportation systems and privacy use cases.

PROUD : verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IoT applications (2019)
Journal Article
Belguith, S., Kaaniche, N., Hammoudeh, M., & Dargahi, T. (2020). PROUD : verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IoT applications. Future Generation Computer Systems, 111, 899-918. https://doi.org/10.1016/j.future.2019.11.012

The ever-growing number of Internet connected devices poses several cybersecurity risks. Most of the exchanged data between the Internet of Things (IoT) devices are not adequately secured due to resource constraints on IoT devices. Attribute Based... Read More about PROUD : verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IoT applications.

Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds (2019)
Journal Article
Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., & Attia, R. (2020). Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing, 135, 1-20. https://doi.org/10.1016/j.jpdc.2019.08.014

In this paper, we propose an accountable privacy preserving attribute-based framework, called Ins-PAbAC, that combines attribute based encryption and attribute based signature techniques for securely sharing outsourced data contents via public clo... Read More about Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds.

CUPS : Secure Opportunistic Cloud of Things Framework based on Attribute Based Encryption Scheme Supporting Access Policy Update (2019)
Journal Article
Belguith, S., Kaaniche, N., & Russello, G. (2020). CUPS : Secure Opportunistic Cloud of Things Framework based on Attribute Based Encryption Scheme Supporting Access Policy Update. Security and Privacy, 3(4), e85. https://doi.org/10.1002/spy2.85

The ever‐growing number of internet connected devices, coupled with the new computing trends, namely within emerging opportunistic networks, engenders several security concerns. Most of the exchanged data between the internet of things (IoT) devices... Read More about CUPS : Secure Opportunistic Cloud of Things Framework based on Attribute Based Encryption Scheme Supporting Access Policy Update.

Analysis of attribute-based cryptographic techniques and their application to protect cloud services (2019)
Journal Article
Belguith, S., Kaaniche, N., & Hammoudeh, M. (2019). Analysis of attribute-based cryptographic techniques and their application to protect cloud services. Transactions on Emerging Telecommunications Technologies, e3667. https://doi.org/10.1002/ett.3667

Recent technological advances such as the Internet of Things (IoT), fog computing, cloud applications lead to exponential growth in the amount of generated data. Indeed, cloud storage services have experienced unprecedented usage demand. The loss of... Read More about Analysis of attribute-based cryptographic techniques and their application to protect cloud services.

Collusion defender : preserving subscribers’ privacy in publish and subscribe systems (2019)
Journal Article
in publish and subscribe systems. IEEE Transactions on Dependable and Secure Computing, 18(3), 1051-1064. https://doi.org/10.1109/TDSC.2019.2898827

The Publish and Subscribe (pub/sub) system is an established paradigm to disseminate the data from publishers to subscribers in a loosely coupled manner using a network of dedicated brokers. However, sensitive data could be exposed to malicious e... Read More about Collusion defender : preserving subscribers’ privacy in publish and subscribe systems.

PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT (2018)
Journal Article
Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., & Attia, R. (2018). PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Computer Networks, 133, 141-156. https://doi.org/10.1016/j.comnet.2018.01.036

Attribute based encryption (ABE) is an encrypted access control mechanism that ensures efficient data sharing among dynamic group of users. Nevertheless, this encryption technique presents two main drawbacks, namely high decryption cost and publicly... Read More about PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT.