- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Cloud Data Security Solutions
- Adversarial Robustness in Machine Learning
- Internet Traffic Analysis and Secure E-voting
- Privacy, Security, and Data Protection
- Caching and Content Delivery
- Mobile Ad Hoc Networks
- Complexity and Algorithms in Graphs
- Security in Wireless Sensor Networks
- Opportunistic and Delay-Tolerant Networks
- Chaos-based Image/Signal Encryption
- Access Control and Trust
- User Authentication and Security Systems
- Stochastic Gradient Optimization Techniques
- Blockchain Technology Applications and Security
- Advanced Steganography and Watermarking Techniques
- Peer-to-Peer Network Technologies
- Cooperative Communication and Network Coding
- Advanced Data Storage Technologies
- Quantum-Dot Cellular Automata
- Biometric Identification and Security
- Wireless Communication Security Techniques
- Speech Recognition and Synthesis
- Quantum Information and Cryptography
EURECOM
2016-2025
Laboratoire Traitement et Communication de l’Information
2005
With the continuous and exponential increase of number users size their data, data deduplication becomes more a necessity for cloud storage providers. By storing unique copy duplicate providers greatly reduce transfer costs. The advantages unfortunately come with high cost in terms new security privacy challenges. We propose ClouDedup, secure efficient service which assures block-level confidentiality at same time. Although based on convergent encryption, ClouDedup remains thanks to...
Secure aggregation consists of computing the sum data collected from multiple sources without disclosing these individual inputs. has been found useful for various applications ranging electronic voting to smart grid measurements. Recently, federated learning emerged as a new collaborative machine technology train models. In this work, we study suitability secure based on cryptographic schemes learning. We first provide formal definition problem and suggest systematic categorization existing...
With the advent of cloud computing, individuals and companies alike are looking for opportunities to leverage resources not only storage but also computation. Nevertheless, reliance on perform computation raises unavoidable challenge how assure correctness delegated In this regard, we introduce two cryptographic protocols publicly verifiable that allow a lightweight client securely outsource server evaluation high-degree univariate polynomials multiplication large matrices. Similarly...
EVA1 is describing a new class of emotion-aware autonomous systems delivering intelligent personal assistant functionalities. EVA requires multi-disciplinary approach, combining number critical building blocks into cybernetics systems/software architecture: emotion aware and algorithms, multimodal interaction design, cognitive modelling, decision making recommender systems, sensing as feedback for learning, distributed (edge) computing services.
Online Social Network (OSN) applications and services such as picture sharing, wall posting, the like, nowadays have a strong impact on way users interact with each other. Catering for broad range of all ages, vast difference in social, educational, national background, these allow even limited technical skills to share wide personal information theoretically unlimited number partners. This advantage comes at cost increased security privacy exposures two main reasons: first all, tend...
Recent technological developments in cloud computing and the ensuing commercial appeal have encouraged companies individuals to outsource their storage computations powerful servers. However, challenge when outsourcing data computation is ensure that servers comply with advertised policies. In this paper, we focus particular on scenario where a owner wishes (i) its public database server; (ii) enable anyone submit multi-keyword search queries outsourced database; (iii) can verify correctness...
Abstract Searchable Encryption (SE) allows a user to upload data the cloud and search it in remote fashion while preserving privacy of both queries. Recent research results describe attacks on SE schemes using access pattern, denoting ids documents matching queries, which most reveal during query processing. However usually leak more than just this extra leakage can lead (much) harmful ones basic pattern only. We remark that special case Multi-User (MUSE), where many users cloud-based...
Abstract Confidence in information and communication technology services systems is crucial for the digital society which we live in, but this confidence not possible without privacy-enhancing tools technologies, nor risks management frameworks that guarantee privacy, data protection, secure identities. This paper provides on ongoing recent developments area European Union (EU) space. We start by providing an overview of EU’s General Data Protection Regulation (GDPR) proceed identifying...
Clustering is an unsupervised machine learning technique that outputs clusters containing similar data items. In this work, we investigate privacy-preserving density-based clustering which is, for example, used in financial analytics and medical diagnosis. When (multiple) owners collaborate or outsource the computation, privacy concerns arise. To address problem, design, implement, evaluate first practical fully private scheme based on secure two-party computation. Our protocol privately...
Image registration is a key task in medical imaging applications, allowing to represent images common spatial reference frame. Current approaches image are generally based on the assumption that content of usually accessible clear form, from which transformation subsequently estimated. This may not be met practical since sensitive nature ultimately require their analysis under privacy constraints, preventing openly share content. In this work, we formulate problem preserving regime, where...