Browsing by Author "Benmeziane, Souad"
Now showing 1 - 12 of 12
Results Per Page
Sort Options
- ItemA Novel Approach to Preserving Privacy in Social Network Data Publishing(CERIST, 2016-10-24) Bensimessaoud, Sihem; Benmeziane, Souad; Badache, Nadjib; Djellalbia, AminaToday, more and more social network data are published for data analysis. Although this analysis is important, these publications may be targeted by re-identification attacks i.e., where an attacker tries to recover the identities of some nodes that were removed during the anonymization process. Among these attacks, we distinguish "the neighborhood attacks" where an attacker can have background knowledge about the neighborhoods of target victims. Researchers have developed anonymization models similar to k-anonymity, based on edge adding, but can significantly alter the properties of the original graph. In this work, a new anonymization algorithm based on the addition of fake nodes is proposed, which ensures that the published graph preserves another important utility that is the average path length “APL”.
- ItemA clustering technique to analyse anonymous systems(CERIST, 2014-07-20) Benmeziane, Souad; Badache, NadjibConcerns about privacy and anonymity have gained more and more attention in conjunction with the rapid growth of the Internet as a means of communication and information dissemination. A number of anonymous communication systems have been developed to protect the identity of communication participants. Nevertheless, it is important to provide ways to evaluate and measure the level of anonymity provided. We introduce in this report the use of hierarchical clustering technique to analyse anonymous systems. We propose a new measure to evaluate anonymous systems by introducing the concept of dominant cluster. We further show that using this measure will overcome the limitations of other existing measures.
- ItemA clustering technique to analyse anonymous users.(CPS, 2014-08-09) Benmeziane, Souad; Badache, NadjibConcerns about privacy and anonymity have gained more and more attention in conjunction with the rapid growth of the Internet as a means of communication and information dissemination. A number of anonymous communication systems have been developed to protect the identity of communication participants. Nevertheless, it is important to provide ways to evaluate and measure the level of anonymity provided. We introduce in this paper the use of hierarchical clustering technique to analyse anonymous systems. We propose a new measure to evaluate anonymous systems by introducing the concept of dominant cluster. We further show that using this measure will overcome the limitations of other existing measures.
- ItemA Java-Web-Based-Learning Methodology, Case Study : Waterborne diseases(CERIST, Alger, 2001) Benmeziane, Souad; Aliane, Hassina; Allouti, F.; Khelalfa, H. M.Les développements récents des technologies Web ont fait émerger de nouvelles approches pour l’enseignement assisté par ordinateur. En effet, l’apprenant peut apprendre indépendamment des contraintes de temps et de lieu. Plusieurs systèmes basés sur le Web ont été développés. Cependant, ils demeurent limités : ils ne peuvent pas contrôler et guider l’apprenant vu le manque d’interactivité du Web. Dans cet article, nous présentons une approche basée sur Java pour la conception de systèmes d’enseignement qui surmontent les limites des systèmes existants. Cette approche offre un apprentissage à distance, invidualisé tenant compte du rythme de l’apprenant et supportant ainsi un haut niveau d’interactivité. Une étude de cas est présentée concernant les maladies à transmission hydrique.
- ItemA review on Privacy and Anonymity in electronic communications(Conference Procedings, 2006-10-25) Benmeziane, Souad; Badache, NadjibCurrent Internet networking protocols provide no support to ensure the privacy of communication endpoints. An adversary can determine which addresses have asked for which services. Anonymity is now increasingly important for networked applications. This paper overviews the concept of anonymity in electronic communications, vectors for a privacy invasion, and proposed solutions. Solutions are examined from the perspective of attacks which can be reasonably expected against these systems. Particular attention is paid to mobile agents systems and how to hide the itinerary of the agent.
- ItemAn Adaptive Anonymous Authentication for Cloud Environment(CERIST, 2015-04-28) Djellalbia, Amina; Benmeziane, Souad; Badache, Nadjib; Bensimessaoud, SihemPreserving identity privacy is a significant challenge for the security in cloud services. Indeed, an important barrier to the adoption of cloud services is user fear of privacy loss in the cloud. One interesting issue from a privacy perspective is to hide user’s usage behavior or meta-information which includes access patterns and frequencies when accessing services. Users may not want the cloud provider to learn which resources they access and how often they use a service by making them anonymous. In this paper, we will propose an adaptive and flexible approach to protect the identity privacy through an anonymous authentication scheme.
- ItemAn Adaptive Anonymous Authentication for Cloud Environment(IEEE Xplore Digital labrary, 2015-06-02) Djellalbia, Amina; Benmeziane, Souad; Badache, Nadjib; Bensimessaoud, SihemPreserving identity privacy is a significant challenge for the security in cloud services. Indeed, an important barrier to the adoption of cloud services is user fear of privacy loss in the cloud. One interesting issue from a privacy perspective is to hide user’s usage behavior or meta-information which includes access patterns and frequencies when accessing services. Users may not want the cloud provider to learn which resources they access and how often they use a service by making them anonymous. In this paper, we will propose an adaptive and flexible approach to protect the identity privacy through an anonymous authentication scheme.
- ItemAnonymat Complet dans un environnement mobile(2003-06-09) Benmeziane, SouadDomaine de recherche relativement sensible, la protection de la vie privée et particulièrement l’anonymat constitue un axe de recherche crucial en sécurité dans les environnements mobiles. L’anonymat consiste à protéger les informations secondaires telles que l’identité des entités impliquées dans une transaction mais aussi à protéger les méta-informations qui découlent des interactions entre entités d’un système. Etant donné que les réseaux mobiles sont plus vulnérables à l’écoute, un intrus peut avoir accès à des informations sensibles concernant la vie privée des utilisateurs. Les messages échangés durant la procédure d’authentification peuvent révéler des informations privées à des ennemis écoutant le médium de communication. Il devient alors possible de pister l’usager. En nous intéressant au problème d’anonymat, nous nous sommes confrontés à un domaine sensible. En effet, d’un point de vue social, les communications anonymes semblent être désirées seulement par une minorité de gens concernés par le problème de préserver confidentielles les informations privées et souvent non acceptées par les gouvernements ou organisations. C’est pourquoi, les solutions pour les communications anonymes ne sont pas intégrées dans des produits existants ou infrastructures. Notons que l’anonymat assuré par GSM n’est que partiel et à ce jour les travaux de UMTS ne considèrent pas un anonymat complet. Il est également important de noter que même les travaux de recherche ne considèrent pas un anonymat complet. Dans ce contexte, nous proposons un protocole d’authentification dans un environnement mobile qui assure l’anonymat complet. Le protocole est basé sur la technique de signature aveugle pour assurer l’intraçabilité de l’utilisateur mobile même par son domaine d’affiliation. Ce dernier ne pourra pas connaître les différents déplacements de son abonné. Le protocole, ainsi défini, garantit la confidentialité des messages échangés durant l’authentification et permet de résister aux attaques par rejeu. L’anonymat complet peut sembler contradictoire avec la tarification des services demandés. Pour cela, nous intégrons un moyen de paiement électronique sans compromettre l’anonymat.
- ItemAnonymous Authentication Scheme in e-Health Cloud environment(CERIST, 2016-10-20) Djellalbia, Amina; Benmeziane, Souad; Badache, Nadjib; Bensimessaoud, SihemThe adoption of an e-Health Cloud has different advantages especially allowing sharing and exchanging information between medical institutions, availability of information, reducing costs, etc. However, preserving identity privacy is a significant challenge of security in all environments, and constitutes particularly a very serious concern in Cloud environments. Indeed, an important barrier to the adoption of Cloud is user fear of privacy loss in the Cloud, particularly in an e-Health Cloud where users are Patients. Users may not want to disclose their identities to the Cloud Service Provider, a way to protect them is making them anonymous. In this paper, we will propose an adaptive and flexible approach to protect the identity privacy of Patients in an e-Health Cloud through an anonymous authentication scheme.
- ItemAnonymous Mobile Agents(IEEE, 2006-04-24) Benmeziane, Souad; Larab, BaghdadOne of the most important issues of the agent security is to keep the agent anonymity, not only in regard of the outsider (eavesdropper) but from the visited hosts too. Indeed, the observer may access agent's data, like the agent's route information data, and thus collecting sensitive information about the agent's owner. In this paper, we present a solution based on mixes to hide the itinerary of the agent. We extend the existing agent based Ajanta platform by adding this functionality. It is then possible to create protected agents capable of roaming in the Internet without revealing their whereabouts information
- ItemJava:un Langage Orienté Objet Adabté à Internet.(CERIST, 1997) Benmeziane, Souad; Djaid, M.Le Web, service le plus populaire d’Internet, apporte chaque jour de changements radicaux qui touchent tous les aspects de nos activités quotidiennes, que ce soit, le monde des affaires, l’éducation...Lava, une nouvelle technologie développée par un microsystèmes, a révolutionné le WWW.Ce dossier sur java, divisé en sept articles présente de manière détaillée les différents aspect de ce langage.
- ItemTor Network Limits(CERIST, 2010-12) Benmeziane, Souad; Badache, NadjibTor is a volunteer run relay network designed for privacy, anonymity, and censorship resistance. Tor has become the most successful public anonymity communication service in the Internet because of its low latency. In this paper, we present a method to exploit the Tor limits in conjunction with the public profile of a user to reduce the degree of anonymity.