Skip to main content

Research Repository

Advanced Search

All Outputs (7)

Coop-DAAB : cooperative attribute based data aggregation for Internet of Things applications (2018)
Presentation / Conference
Belguith, S., Kaaniche, N., Mohamed, M., & Russello, G. (2018, October). Coop-DAAB : cooperative attribute based data aggregation for Internet of Things applications. Presented at On the Move to Meaningful Internet Systems, Valletta, Malta

The deployment of IoT devices is gaining an expanding interest in our daily life. Indeed, IoT networks consist in interconnecting several smart and resource constrained devices to enable advanced services. Security management in IoT is a big challeng... Read More about Coop-DAAB : cooperative attribute based data aggregation for Internet of Things applications.

EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control (2018)
Presentation / Conference
Belguith, S., Kaaniche, N., & Russello, G. (2018, August). EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control. Presented at International Conference on Network and System Security, Hong Kong, China

Recent years have witnessed the trend of increasingly relying on remote and distributed infrastructures. This increases the complexity of access control to data, where access control policies should be flexible and distinguishable among users with di... Read More about EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control.

Preserving access pattern privacy in SGX-assisted encrypted search (2018)
Presentation / Conference
Cui, S., Belguith, S., Zhang, M., Asghar, M., & Russello, G. (2018, July). Preserving access pattern privacy in SGX-assisted encrypted search. Presented at International Conference on Computer Communication and Networks (ICCCN), Hangzhou, China

Outsourcing sensitive data and operations to untrusted cloud providers is considered a challenging issue. To perform a search operation, even if both the data and the query are encrypted, attackers still can learn which data locations match the quer... Read More about Preserving access pattern privacy in SGX-assisted encrypted search.

Lightweight attribute-based encryption supporting access policy update for cloud assisted IoT (2018)
Presentation / Conference
Belguith, S., Kaaniche, N., & Russello, G. (2018, July). Lightweight attribute-based encryption supporting access policy update for cloud assisted IoT. Presented at 15th International Conference on Security and Cryptography, Porto, Portugal

Cloud-assisted IoT applications are gaining an expanding interest, such that IoT devices are deployed in different distributed environments to collect and outsource sensed data to remote servers for further processing and sharing among users. On the... Read More about Lightweight attribute-based encryption supporting access policy update for cloud assisted IoT.

Emergency access control management via attribute based encrypted QR codes (2018)
Presentation / Conference
Belguith, S., Gochhayat, S., Conti, M., & Russello, G. (2018, May). Emergency access control management via attribute based encrypted QR codes. Presented at IEEE Workshop on Security and Privacy in the Cloud (IEEE CNS 2018 workshop: SPC 2018), Beijing, China

In dynamic environments such as disaster management, mechanisms for the controlled override of access restrictions, a.k.a. break-glass need to be supported. These access control mechanisms should ensure access to facilities, for example, an office b... Read More about Emergency access control management via attribute based encrypted QR codes.

Secure publish and subscribe systems with efficient revocation (2018)
Presentation / Conference
Belguith, S., Cui, S., Asghar, M., & Russello, G. (2018, April). Secure publish and subscribe systems with efficient revocation. Presented at ACM/SIGAPP Symposium On Applied Computing, Pau, France

User revocation is one of the main security issues in publish and subscribe (pub/sub) systems. Indeed, to ensure data confidentiality, the system should be able to remove malicious subscribers without affecting the functionalities and decoupling of... Read More about Secure publish and subscribe systems with efficient revocation.

PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT (2018)
Journal Article
Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., & Attia, R. (2018). PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Computer Networks, 133, 141-156. https://doi.org/10.1016/j.comnet.2018.01.036

Attribute based encryption (ABE) is an encrypted access control mechanism that ensures efficient data sharing among dynamic group of users. Nevertheless, this encryption technique presents two main drawbacks, namely high decryption cost and publicly... Read More about PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT.