International Journal Papers

Permanent URI for this collectionhttp://dl.cerist.dz/handle/CERIST/17

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    Item
    SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing
    (Springer, 2022) Saidi, Ahmed; Nouali, Omar; Amira, Abdelouahab
    Attribute-based encryption (ABE) is an access control mechanism that ensures efficient data sharing among dynamic groups of users by setting up access structures indicating who can access what. However, ABE suffers from expensive computation and privacy issues in resource-constrained environments such as IoT devices. In this paper, we present SHARE-ABE, a novel collaborative approach for preserving privacy that is built on top of Ciphertext-Policy Attribute-Based Encryption (CP-ABE). Our approach uses Fog computing to outsource the most laborious decryption operations to Fog nodes. The latter collaborate to partially decrypt the data using an original and efficient chained architecture. Additionally, our approach preserves the privacy of the access policy by introducing false attributes. Furthermore, we introduce a new construction of a collaboration attribute that allows users within the same group to combine their attributes while satisfying the access policy. Experiments and analyses of the security properties demonstrate that the proposed scheme is secure and efficient especially for resource-constrained IoT devices.
  • Thumbnail Image
    Item
    Enabling ad-hoc collaboration between mobile users in the MESSENGER project
    (Kluwer Academic Publishers-Plenum, 2007-03) Maamar, Zakaria; Mahmoud, Qusay H.; Derhab, Abdelouahid
    This paper discusses how ad-hoc collaboration boosts the operation of a set of messengers. This discussion continues the research we earlier initiated in the MESSENGER project, which develops data management mechanisms for UDDI registries of Web services using mobile users and software agents. In the current operation mode of messengers, descriptions of Web services are first, collected from UDDI registries and later, submitted to other UDDI registries. This submission mode of Web services descriptions does not foster the tremendous opportunities that both wireless technologies and mobile devices offer. When mobile devices are “close” to each other, they can form a mobile ad-hoc network that permits the exchange of data between these devices without any pre-existing communication infrastructure. By authorizing messengers to engage in ad-hoc collaboration, collecting additional descriptions of Web services from other messengers can happen, too. This has several advantages, but at the same time poses several challenges, which in fact highlight the complexity of ad-hoc networks.