Skip to main content

Research Repository

Advanced Search

All Outputs (27)

Towards securing machine learning models against membership inference attacks (2021)
Journal Article
Ben Hamida, S., Mrabet, H., Belguith, S., Alhomoud, A., & Jemai, A. (2022). Towards securing machine learning models against membership inference attacks. Computers, Materials & Continua, 70(3), 4897-4919. https://doi.org/10.32604/cmc.2022.019709

From fraud detection to speech recognition, including price prediction, Machine Learning (ML) applications are manifold and can significantly improve different areas. Nevertheless, machine learning models are vulnerable and are exposed to differen... Read More about Towards securing machine learning models against membership inference attacks.

On the security and privacy challenges of virtual assistants (2021)
Journal Article
Bolton, T., Dargahi, T., Belguith, S., Al-Rakhami, M., & Sodhro, A. (2021). On the security and privacy challenges of virtual assistants. Sensors, 21(7), e2312. https://doi.org/10.3390/s21072312

Since the purchase of Siri by Apple, and its release with the iPhone 4S in 2011, virtual assistants (VAs) have grown in number and popularity. The sophisticated natural language processing and speech recognition employed by VAs enables users to inter... Read More about On the security and privacy challenges of virtual assistants.

Security challenges of Internet of Underwater Things : a systematic literature review (2020)
Journal Article
systematic literature review. Transactions on Emerging Telecommunications Technologies, 32(3), e4203. https://doi.org/10.1002/ett.4203

Water covers approximately 71% of the earth surface, yet much of the underwater world remains unexplored due to technology limitations. Internet of Underwater Things (IoUT) is a network of underwater objects that enables monitoring subsea environmen... Read More about Security challenges of Internet of Underwater Things : a systematic literature review.

Network traffic analysis for threats detection in the Internet of Things (2020)
Journal Article
Hammoudeh, M., Pimlott, J., Belguith, S., Epiphaniou, G., Baker, T., Kayes, A., …Bounceur, A. (2020). Network traffic analysis for threats detection in the Internet of Things. IEEE Internet of Things Magazine, 3(4), 40-45. https://doi.org/10.1109/IOTM.0001.2000015

As the prevalence of the Internet of Things (IoT) continues to increase, cyber criminals are quick to exploit the security gaps that many devices are inherently designed with. Whilst users can not be expected to tackle this threat alone, many cur... Read More about Network traffic analysis for threats detection in the Internet of Things.

Privacy Enhancing Technologies for solving the privacy-personalization paradox : taxonomy and survey (2020)
Journal Article
Kaaniche, N., Laurent, M., & Belguith, S. (2020). Privacy Enhancing Technologies for solving the privacy-personalization paradox : taxonomy and survey. Journal of Network and Computer Applications, 171, 102807. https://doi.org/10.1016/j.jnca.2020.102807

Personal data are often collected and processed in a decentralized fashion, within different contexts. For instance, with the emergence of distributed applications, several providers are usually correlating their records, and providing personalized... Read More about Privacy Enhancing Technologies for solving the privacy-personalization paradox : taxonomy and survey.

A survey of IoT security based on a layered architecture of sensing and data analysis (2020)
Journal Article
Mrabet, H., Belguith, S., Alhomoud, A., & Jemai, A. (2020). A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors, 20(13), 3625

The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of dail... Read More about A survey of IoT security based on a layered architecture of sensing and data analysis.

A service-oriented approach for sensing in the Internet of Things : intelligent transportation systems and privacy use cases (2020)
Journal Article
Hammoudeh, M., Epiphaniou, G., Belguith, S., Unal, D., Adebisi, B., Baker, T., …Watters, P. (2021). A service-oriented approach for sensing in the Internet of Things : intelligent transportation systems and privacy use cases. IEEE Sensors Journal, 21(14), 15753-15761. https://doi.org/10.1109/JSEN.2020.2981558

This paper presents a Sensing-as-a-Service run-time Service Oriented Architecture (SOA), called 3SOA, for the development of Internet of Things (IoT) applications. 3SOA aims to allow interoperability among various IoT platforms and support service-or... Read More about A service-oriented approach for sensing in the Internet of Things : intelligent transportation systems and privacy use cases.

PROUD : verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IoT applications (2019)
Journal Article
Belguith, S., Kaaniche, N., Hammoudeh, M., & Dargahi, T. (2020). PROUD : verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IoT applications. Future Generation Computer Systems, 111, 899-918. https://doi.org/10.1016/j.future.2019.11.012

The ever-growing number of Internet connected devices poses several cybersecurity risks. Most of the exchanged data between the Internet of Things (IoT) devices are not adequately secured due to resource constraints on IoT devices. Attribute Based... Read More about PROUD : verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IoT applications.

Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds (2019)
Journal Article
Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., & Attia, R. (2020). Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing, 135, 1-20. https://doi.org/10.1016/j.jpdc.2019.08.014

In this paper, we propose an accountable privacy preserving attribute-based framework, called Ins-PAbAC, that combines attribute based encryption and attribute based signature techniques for securely sharing outsourced data contents via public clo... Read More about Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds.

CUPS : Secure Opportunistic Cloud of Things Framework based on Attribute Based Encryption Scheme Supporting Access Policy Update (2019)
Journal Article
Belguith, S., Kaaniche, N., & Russello, G. (2020). CUPS : Secure Opportunistic Cloud of Things Framework based on Attribute Based Encryption Scheme Supporting Access Policy Update. Security and Privacy, 3(4), e85. https://doi.org/10.1002/spy2.85

The ever‐growing number of internet connected devices, coupled with the new computing trends, namely within emerging opportunistic networks, engenders several security concerns. Most of the exchanged data between the internet of things (IoT) devices... Read More about CUPS : Secure Opportunistic Cloud of Things Framework based on Attribute Based Encryption Scheme Supporting Access Policy Update.

Analysis of attribute-based cryptographic techniques and their application to protect cloud services (2019)
Journal Article
Belguith, S., Kaaniche, N., & Hammoudeh, M. (2019). Analysis of attribute-based cryptographic techniques and their application to protect cloud services. Transactions on Emerging Telecommunications Technologies, e3667. https://doi.org/10.1002/ett.3667

Recent technological advances such as the Internet of Things (IoT), fog computing, cloud applications lead to exponential growth in the amount of generated data. Indeed, cloud storage services have experienced unprecedented usage demand. The loss of... Read More about Analysis of attribute-based cryptographic techniques and their application to protect cloud services.

Collusion defender : preserving subscribers’ privacy in publish and subscribe systems (2019)
Journal Article
in publish and subscribe systems. IEEE Transactions on Dependable and Secure Computing, 18(3), 1051-1064. https://doi.org/10.1109/TDSC.2019.2898827

The Publish and Subscribe (pub/sub) system is an established paradigm to disseminate the data from publishers to subscribers in a loosely coupled manner using a network of dedicated brokers. However, sensitive data could be exposed to malicious e... Read More about Collusion defender : preserving subscribers’ privacy in publish and subscribe systems.

Coop-DAAB : cooperative attribute based data aggregation for Internet of Things applications (2018)
Presentation / Conference
Belguith, S., Kaaniche, N., Mohamed, M., & Russello, G. (2018, October). Coop-DAAB : cooperative attribute based data aggregation for Internet of Things applications. Presented at On the Move to Meaningful Internet Systems, Valletta, Malta

The deployment of IoT devices is gaining an expanding interest in our daily life. Indeed, IoT networks consist in interconnecting several smart and resource constrained devices to enable advanced services. Security management in IoT is a big challeng... Read More about Coop-DAAB : cooperative attribute based data aggregation for Internet of Things applications.

EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control (2018)
Presentation / Conference
Belguith, S., Kaaniche, N., & Russello, G. (2018, August). EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control. Presented at International Conference on Network and System Security, Hong Kong, China

Recent years have witnessed the trend of increasingly relying on remote and distributed infrastructures. This increases the complexity of access control to data, where access control policies should be flexible and distinguishable among users with di... Read More about EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control.

Preserving access pattern privacy in SGX-assisted encrypted search (2018)
Presentation / Conference
Cui, S., Belguith, S., Zhang, M., Asghar, M., & Russello, G. (2018, July). Preserving access pattern privacy in SGX-assisted encrypted search. Presented at International Conference on Computer Communication and Networks (ICCCN), Hangzhou, China

Outsourcing sensitive data and operations to untrusted cloud providers is considered a challenging issue. To perform a search operation, even if both the data and the query are encrypted, attackers still can learn which data locations match the quer... Read More about Preserving access pattern privacy in SGX-assisted encrypted search.

Lightweight attribute-based encryption supporting access policy update for cloud assisted IoT (2018)
Presentation / Conference
Belguith, S., Kaaniche, N., & Russello, G. (2018, July). Lightweight attribute-based encryption supporting access policy update for cloud assisted IoT. Presented at 15th International Conference on Security and Cryptography, Porto, Portugal

Cloud-assisted IoT applications are gaining an expanding interest, such that IoT devices are deployed in different distributed environments to collect and outsource sensed data to remote servers for further processing and sharing among users. On the... Read More about Lightweight attribute-based encryption supporting access policy update for cloud assisted IoT.

Emergency access control management via attribute based encrypted QR codes (2018)
Presentation / Conference
Belguith, S., Gochhayat, S., Conti, M., & Russello, G. (2018, May). Emergency access control management via attribute based encrypted QR codes. Presented at IEEE Workshop on Security and Privacy in the Cloud (IEEE CNS 2018 workshop: SPC 2018), Beijing, China

In dynamic environments such as disaster management, mechanisms for the controlled override of access restrictions, a.k.a. break-glass need to be supported. These access control mechanisms should ensure access to facilities, for example, an office b... Read More about Emergency access control management via attribute based encrypted QR codes.

Secure publish and subscribe systems with efficient revocation (2018)
Presentation / Conference
Belguith, S., Cui, S., Asghar, M., & Russello, G. (2018, April). Secure publish and subscribe systems with efficient revocation. Presented at ACM/SIGAPP Symposium On Applied Computing, Pau, France

User revocation is one of the main security issues in publish and subscribe (pub/sub) systems. Indeed, to ensure data confidentiality, the system should be able to remove malicious subscribers without affecting the functionalities and decoupling of... Read More about Secure publish and subscribe systems with efficient revocation.

PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT (2018)
Journal Article
Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., & Attia, R. (2018). PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Computer Networks, 133, 141-156. https://doi.org/10.1016/j.comnet.2018.01.036

Attribute based encryption (ABE) is an encrypted access control mechanism that ensures efficient data sharing among dynamic group of users. Nevertheless, this encryption technique presents two main drawbacks, namely high decryption cost and publicly... Read More about PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT.

Constant-size threshold attribute based SignCryption for cloud applications (2017)
Presentation / Conference
Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., & Attia, R. (2017, July). Constant-size threshold attribute based SignCryption for cloud applications. Presented at SECRYPT 2017 : 14th International Conference on Security and Cryptography, Madrid, Spain

In this paper, we propose a novel constant-size threshold attribute-based signcryption scheme for securely sharing data through public clouds. Our proposal has several advantages. First, it provides flexible cryptographic access control, while prese... Read More about Constant-size threshold attribute based SignCryption for cloud applications.