International Journal Papers
Permanent URI for this collection
Browse
Browsing International Journal Papers by Author "Amira, Abdelouahab"
Now showing 1 - 3 of 3
Results Per Page
Sort Options
- ItemDeep learning in pervasive health monitoring, design goals, applications, and architectures: An overview and a brief synthesis(Elsevier, 2021-11) Boulemtafes, Amine; Khemissa, Hamza; Derki, Mohamed Saddek; Amira, Abdelouahab; Djedjig, NabilThe continuous growth of an aging population in some countries, and patients with chronic conditions needs the development of efficient solutions for healthcare. Pervasive Health Monitoring (PHM) is an important pervasive computing application that has the potential to provide patients with a high-quality medical service and enable quick-response alerting of critical conditions. To that end, PHM enables continuous and ubiquitous monitoring of patients' health and wellbeing using Internet of Things (IoT) technologies, such as wearables and ambient sensors. In recent years, deep learning (DL) has attracted a growing interest from the research community to improve PHM applications. In this paper, we discuss the state-of-the-art of DL-based PHM, through identifying, (1) the main PHM applications where DL is successful, (2) design goals and objectives of using DL in PHM, and (3) design notes including DL architectures and data preprocessing. Finally, main advantages, limitations and challenges of the adoption of DL in PHM are discussed.
- ItemSHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing(Springer, 2022) Saidi, Ahmed; Nouali, Omar; Amira, AbdelouahabAttribute-based encryption (ABE) is an access control mechanism that ensures efficient data sharing among dynamic groups of users by setting up access structures indicating who can access what. However, ABE suffers from expensive computation and privacy issues in resource-constrained environments such as IoT devices. In this paper, we present SHARE-ABE, a novel collaborative approach for preserving privacy that is built on top of Ciphertext-Policy Attribute-Based Encryption (CP-ABE). Our approach uses Fog computing to outsource the most laborious decryption operations to Fog nodes. The latter collaborate to partially decrypt the data using an original and efficient chained architecture. Additionally, our approach preserves the privacy of the access policy by introducing false attributes. Furthermore, we introduce a new construction of a collaboration attribute that allows users within the same group to combine their attributes while satisfying the access policy. Experiments and analyses of the security properties demonstrate that the proposed scheme is secure and efficient especially for resource-constrained IoT devices.
- ItemTriDroid: a triage and classification framework for fast detection of mobile threats in android markets(Springer-Verlag, 2021) Amira, Abdelouahab; Derhab, Abdelouahid; Karbab, ElMouatez Billah; Nouali, Omar; Aslam Khan , FarrukhThe Android platform is highly targeted by malware developers, which aim to infect the maximum number of mobile devices by uploading their malicious applications to different app markets. In order to keep a healthy Android ecosystem, app-markets check the maliciousness of newly submitted apps. These markets need to (a) correctly detect malicious app, and (b) speed up the detection process of the most likely dangerous applications among an overwhelming flow of submitted apps, to quickly mitigate their potential damages. To address these challenges, we propose TriDroid, a market-scale triage and classification system for Android apps. TriDroid prioritizes apps analysis according to their risk likelihood. To this end, we categorize the submitted apps as: botnet, general malware, and benign. TriDroid starts by performing a (1) Triage process, which applies a fast coarse-grained and less-accurate analysis on a continuous stream of the submitted apps to identify their corresponding queue in a three-class priority queuing system. Then, (2) the Classification process extracts fine-grained static features from the apps in the priority queue, and applies three-class machine learning classifiers to confirm with high accuracy the classification decisions of the triage process. In addition to the priority queuing model, we also propose a multi-server queuing model where the classification of each app category is run on a different server. Experiments on a dataset with more than 24K malicious and 3K benign applications show that the priority model offers a trade-off between waiting time and processing overhead, as it requires only one server compared to the multi-server model. Also it successfully prioritizes malicious apps analysis, which allows a short waiting time for dangerous applications compared to the FIFO policy.