Research Reports

Permanent URI for this collectionhttp://dl.cerist.dz/handle/CERIST/34

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    Item
    An Adaptive Anonymous Authentication for Cloud Environment
    (CERIST, 2015-04-28) Djellalbia, Amina; Benmeziane, Souad; Badache, Nadjib; Bensimessaoud, Sihem
    Preserving identity privacy is a significant challenge for the security in cloud services. Indeed, an important barrier to the adoption of cloud services is user fear of privacy loss in the cloud. One interesting issue from a privacy perspective is to hide user’s usage behavior or meta-information which includes access patterns and frequencies when accessing services. Users may not want the cloud provider to learn which resources they access and how often they use a service by making them anonymous. In this paper, we will propose an adaptive and flexible approach to protect the identity privacy through an anonymous authentication scheme.
  • Thumbnail Image
    Item
    Tor Network Limits
    (CERIST, 2010-12) Benmeziane, Souad; Badache, Nadjib
    Tor is a volunteer run relay network designed for privacy, anonymity, and censorship resistance. Tor has become the most successful public anonymity communication service in the Internet because of its low latency. In this paper, we present a method to exploit the Tor limits in conjunction with the public profile of a user to reduce the degree of anonymity.