Santiago de Diego

ORCID: 0000-0002-8823-7509
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • Smart Grid Security and Resilience
  • Cloud Data Security Solutions
  • Digital Transformation in Industry
  • Advanced Authentication Protocols Security
  • Caching and Content Delivery
  • Law, AI, and Intellectual Property
  • Business, Innovation, and Economy
  • Network Security and Intrusion Detection
  • Distributed systems and fault tolerance
  • Vehicular Ad Hoc Networks (VANETs)
  • Technology in Education and Healthcare
  • Digital Transformation in Law
  • Cryptography and Data Security
  • Information Technology and Learning
  • Privacy-Preserving Technologies in Data
  • Advanced Steganography and Watermarking Techniques
  • Robotics and Automated Systems

Euskadiko Parke Teknologikoa
2019-2024

Tecnalia
2019-2024

Association of Electronic and Information Technologies
2021-2022

The recent increase in reported incidents of security breaches compromising users' privacy call into question the current centralized model which third-parties collect and control massive amounts personal data. Blockchain has demonstrated that trusted auditable computing is possible using a decentralized network peers accompanied by public ledger. Furthermore, Homomorphic Encryption (HE) guarantees confidentiality not only on computation but also transmission, storage processes. synergy...

10.1016/j.ipm.2021.102745 article EN cc-by-nc-nd Information Processing & Management 2021-09-10

The IoT-as-a-Service (IoTaaS) business model has already been identified by some people from both industry and academia, but not formally defined. IoTaaS offers IoT devices on demand, with considerable cost savings resource optimization. In addition, it enables different applications to reuse the existing devices. However, this is associated technological challenges that need be addressed, one of which identity problem. Focusing this, self-sovereign (SSI) schemes have proven provide better...

10.1109/access.2021.3131012 article EN cc-by IEEE Access 2021-01-01

Blockchain technology is currently being adopted in several domains and applications, including the energy domain specifically smart grids. One of principal applications blockchain peer-to-peer trading among stakeholders grids, providing trusted transactions without need third parties. Also, e-auctions are rapidly growing as a mean e-commerce that allows direct product bidding through internet. major issues reliance on third-party to host e-auction platform which not only induces extra cost...

10.1109/worlds451998.2021.9514028 article EN 2021-07-29

The Self-Sovereign Identity (SSI) paradigm has emerged as a decentralized Management model with interesting capabilities for the Internet of Things (IoT). However, current standard SSI protocols and procedures only consider that individuals store their own identity, failing to provide an accurate solution identity management groups where participants might use credentials from different identities collaborate meet set verifier´s requirements. present work introduces concept Collaborative...

10.1016/j.comnet.2024.110629 article EN cc-by Computer Networks 2024-07-07

This document presents a reference architecture for Blockchain-based Threat Registry platform, named BBTR, to share information about treats among different actors. The design of the BBTR guarantees integrity and availability data stored in it is also compatible with privacy requirements, allowing actors participate as users this shared BaaS (Blockchain Service). paper shows how approach can be combined AI techniques extract valuable from threats directly Blockchain, empowering final...

10.1109/iemcon.2019.8936249 article EN 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) 2019-10-01

This paper presents a protocol for Identity Management in Industrial IoT enabled devices, that is based on the principles of Self-Sovereign Identity.The Industry 4.0 transformation has led to sector digitalization and one its major challenges uniquely identify Internet Things unattended devices.The digital identity management must allow increasing security control, it been evolving towards model where device acquires responsibility managing own data through Identity.This studies why approach...

10.12785/ijcds/120153 article EN cc-by-nc-nd International Journal of Computing and Digital Systems 2022-08-06
Coming Soon ...