Dr Nesrine Kaaniche
PhD
Department of Computer Science
Lecturer in Cybersecurity
Undergraduate Progression Tutor (L2 + L3)
Member of the Security of Advanced Systems research group

+44 114 222 1837
Full contact details
Department of Computer Science
Regent Court (DCS)
211 Portobello
Sheffield
S1 4DP
- Profile
-
Nesrine Kaaniche is a Lecturer in Cybersecurity at the Department of Computer Science, the University of Sheffield, co-affiliated with the Security of Advanced Systems Research Group.
Before joining the university, she was a research member of the interdisciplinary chair Values and Policies of Personal Information, at Télécom SudParis, Institut Polytechnique de Paris, France and an International Research Fellow (August- November 2016) at SRI International, San Francisco, CA, USA.
She received a PhD degree with honours on cloud data storage security jointly from Sorbonne University and Télécom SudParis, Institut Mines Télécom, France, in 2014, and got a thesis award from SAMOVAR, CNRS, France in 2015.
- Research interests
-
Dr Nesrine Kaaniche's research interests are situated in several domains of ICT (wired and wireless) security and privacy issues, with a special emphasis on the design of secure and privacy-preserving cryptographic algorithms and protocols for emerging networks, ie IoT environments, opportunistic networks, cloud, data provenance systems and blockchain-based applications.
- Publications
-
Journal articles
- Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey. Journal of Network and Computer Applications, 102807-102807.
- Cyber-physical systems security: Limitations, issues and future trends. Microprocessors and Microsystems, 77, 103201-103201.
- ID-based user-centric data usage auditing scheme for distributed environments. Frontiers in Blockchain, 3. View this article in WRRO
- Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing, 135, 1-20. View this article in WRRO
- PROUD : verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IoT applications. Future Generation Computer Systems. View this article in WRRO
- Anonymous certification for E-assessment opinion polls. Journal of Ambient Intelligence and Humanized Computing. View this article in WRRO
- CUPS : secure opportunistic cloud of things framework based on attribute-based encryption scheme supporting access policy update. Security and Privacy. View this article in WRRO
- Authorized keyword search over outsourced encrypted data in cloud environment. IEEE Transactions on Cloud Computing. View this article in WRRO
- Analysis of attribute‐based cryptographic techniques and their application to protect cloud services. Transactions on Emerging Telecommunications Technologies. View this article in WRRO
- Cooperative Set Homomorphic Proofs for Data Possession Checking in Clouds. IEEE Transactions on Cloud Computing.
- PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Computer Networks, 133, 141-156.
- Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications, 111, 120-141.
Conference proceedings papers
- Privacy preserving cooperative computation for personalized web search applications. SAC '20: Proceedings of the 35th Annual ACM Symposium on Applied Computing (pp 250-258). Brno, Czech Republic, 30 March 2020 - 3 April 2020. View this article in WRRO
- Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System. Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 8 July 2020 - 10 July 2020.
- An Identity-matching Process to Strengthen Trust in Federated-identity Architectures. Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 8 July 2020 - 10 July 2020.
- AuthLedger: A Novel Blockchain-based Domain Name Authentication Scheme. Proceedings of the 5th International Conference on Information Systems Security and Privacy, 23 February 2019 - 25 February 2019.
- Privacy-Preserving Multi-User Encrypted Access Control Scheme for Cloud-Assisted IoT Applications. 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 2 July 2018 - 7 July 2018.
- BDUA: Blockchain-Based Data Usage Auditing. 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 2 July 2018 - 7 July 2018.
- PU-ABE: Lightweight Attribute-Based Encryption Supporting Access Policy Update for Cloud Assisted IoT. 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 2 July 2018 - 7 July 2018.
- C-ABSC: Cooperative Attribute Based SignCryption Scheme for Internet of Things Applications. 2018 IEEE International Conference on Services Computing (SCC), 2 July 2018 - 7 July 2018.
- Efficiently Validating Aggregated IoT Data Integrity. 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService), 26 March 2018 - 29 March 2018.
- Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 26 July 2018 - 28 July 2018.
- SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 26 July 2018 - 28 July 2018.
- A Blockchain based Access Control Scheme. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 26 July 2018 - 28 July 2018.
- A Blockchain based Access Control Scheme. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 26 July 2018 - 28 July 2018.
- Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 26 July 2018 - 28 July 2018.
- SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 26 July 2018 - 28 July 2018.
- Lifelogging Protection Scheme for Internet-Based Personal Assistants (pp 431-440)
- Coop-DAAB: Cooperative Attribute Based Data Aggregation for Internet of Things Applications (pp 498-515)
- EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control (pp 187-201)
- A blockchain-based data usage auditing architecture with enhanced privacy and availability. 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), 30 October 2017 - 1 November 2017.
- Security SLA Based Monitoring in Clouds. 2017 IEEE International Conference on Edge Computing (EDGE), 25 June 2017 - 30 June 2017.
- Constant-size Threshold Attribute based SignCryption for Cloud Applications. Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, 24 July 2017 - 26 July 2017.
- Attribute based Encryption for Multi-level Access Control Policies. Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, 24 July 2017 - 26 July 2017.
- $$mathcal {PCS}$$, A Privacy-Preserving Certification Scheme (pp 239-256)
- Anonymous Certification for an e-Assessment Framework (pp 70-85)
- PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds. Proceedings of the 13th International Joint Conference on e-Business and Telecommunications, 26 July 2016 - 28 July 2016.
- Attribute-Based Signatures for Supporting Anonymous Certification (pp 279-300)
- SHoPS: Set Homomorphic Proof of Data Possession Scheme in Cloud Storage Applications. 2015 IEEE World Congress on Services, 27 June 2015 - 2 July 2015.
- A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications. 2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 26 May 2014 - 29 May 2014.
- A Secure Client Side Deduplication Scheme in Cloud Storage Environments. 2014 6th International Conference on New Technologies, Mobility and Security (NTMS), 30 March 2014 - 2 April 2014.
- CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in Clouds. Proceedings of the 11th International Conference on Security and Cryptography, 28 August 2014 - 30 August 2014.
- ID Based Cryptography for Cloud Data Storage. 2013 IEEE Sixth International Conference on Cloud Computing, 28 June 2013 - 3 July 2013.
- Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey. Journal of Network and Computer Applications, 102807-102807.
- Professional activities
-
Member of the Security of Advanced Systems research group