Academic & Scientific Articles

Permanent URI for this communityhttp://dl.cerist.dz/handle/CERIST/3

Browse

Search Results

Now showing 1 - 10 of 11
  • Thumbnail Image
    Item
    A Novel Approach to Preserving Privacy in Social Network Data Publishing
    (CERIST, 2016-10-24) Bensimessaoud, Sihem; Benmeziane, Souad; Badache, Nadjib; Djellalbia, Amina
    Today, more and more social network data are published for data analysis. Although this analysis is important, these publications may be targeted by re-identification attacks i.e., where an attacker tries to recover the identities of some nodes that were removed during the anonymization process. Among these attacks, we distinguish "the neighborhood attacks" where an attacker can have background knowledge about the neighborhoods of target victims. Researchers have developed anonymization models similar to k-anonymity, based on edge adding, but can significantly alter the properties of the original graph. In this work, a new anonymization algorithm based on the addition of fake nodes is proposed, which ensures that the published graph preserves another important utility that is the average path length “APL”.
  • Thumbnail Image
    Item
    Anonymous Authentication Scheme in e-Health Cloud environment
    (CERIST, 2016-10-20) Djellalbia, Amina; Benmeziane, Souad; Badache, Nadjib; Bensimessaoud, Sihem
    The adoption of an e-Health Cloud has different advantages especially allowing sharing and exchanging information between medical institutions, availability of information, reducing costs, etc. However, preserving identity privacy is a significant challenge of security in all environments, and constitutes particularly a very serious concern in Cloud environments. Indeed, an important barrier to the adoption of Cloud is user fear of privacy loss in the Cloud, particularly in an e-Health Cloud where users are Patients. Users may not want to disclose their identities to the Cloud Service Provider, a way to protect them is making them anonymous. In this paper, we will propose an adaptive and flexible approach to protect the identity privacy of Patients in an e-Health Cloud through an anonymous authentication scheme.
  • Thumbnail Image
    Item
    A review on Privacy and Anonymity in electronic communications
    (Conference Procedings, 2006-10-25) Benmeziane, Souad; Badache, Nadjib
    Current Internet networking protocols provide no support to ensure the privacy of communication endpoints. An adversary can determine which addresses have asked for which services. Anonymity is now increasingly important for networked applications. This paper overviews the concept of anonymity in electronic communications, vectors for a privacy invasion, and proposed solutions. Solutions are examined from the perspective of attacks which can be reasonably expected against these systems. Particular attention is paid to mobile agents systems and how to hide the itinerary of the agent.
  • Thumbnail Image
    Item
    Anonymous Mobile Agents
    (IEEE, 2006-04-24) Benmeziane, Souad; Larab, Baghdad
    One of the most important issues of the agent security is to keep the agent anonymity, not only in regard of the outsider (eavesdropper) but from the visited hosts too. Indeed, the observer may access agent's data, like the agent's route information data, and thus collecting sensitive information about the agent's owner. In this paper, we present a solution based on mixes to hide the itinerary of the agent. We extend the existing agent based Ajanta platform by adding this functionality. It is then possible to create protected agents capable of roaming in the Internet without revealing their whereabouts information
  • Thumbnail Image
    Item
    An Adaptive Anonymous Authentication for Cloud Environment
    (IEEE Xplore Digital labrary, 2015-06-02) Djellalbia, Amina; Benmeziane, Souad; Badache, Nadjib; Bensimessaoud, Sihem
    Preserving identity privacy is a significant challenge for the security in cloud services. Indeed, an important barrier to the adoption of cloud services is user fear of privacy loss in the cloud. One interesting issue from a privacy perspective is to hide user’s usage behavior or meta-information which includes access patterns and frequencies when accessing services. Users may not want the cloud provider to learn which resources they access and how often they use a service by making them anonymous. In this paper, we will propose an adaptive and flexible approach to protect the identity privacy through an anonymous authentication scheme.
  • Thumbnail Image
    Item
    A clustering technique to analyse anonymous users.
    (CPS, 2014-08-09) Benmeziane, Souad; Badache, Nadjib
    Concerns about privacy and anonymity have gained more and more attention in conjunction with the rapid growth of the Internet as a means of communication and information dissemination. A number of anonymous communication systems have been developed to protect the identity of communication participants. Nevertheless, it is important to provide ways to evaluate and measure the level of anonymity provided. We introduce in this paper the use of hierarchical clustering technique to analyse anonymous systems. We propose a new measure to evaluate anonymous systems by introducing the concept of dominant cluster. We further show that using this measure will overcome the limitations of other existing measures.
  • Thumbnail Image
    Item
    An Adaptive Anonymous Authentication for Cloud Environment
    (CERIST, 2015-04-28) Djellalbia, Amina; Benmeziane, Souad; Badache, Nadjib; Bensimessaoud, Sihem
    Preserving identity privacy is a significant challenge for the security in cloud services. Indeed, an important barrier to the adoption of cloud services is user fear of privacy loss in the cloud. One interesting issue from a privacy perspective is to hide user’s usage behavior or meta-information which includes access patterns and frequencies when accessing services. Users may not want the cloud provider to learn which resources they access and how often they use a service by making them anonymous. In this paper, we will propose an adaptive and flexible approach to protect the identity privacy through an anonymous authentication scheme.
  • Thumbnail Image
    Item
    A clustering technique to analyse anonymous systems
    (CERIST, 2014-07-20) Benmeziane, Souad; Badache, Nadjib
    Concerns about privacy and anonymity have gained more and more attention in conjunction with the rapid growth of the Internet as a means of communication and information dissemination. A number of anonymous communication systems have been developed to protect the identity of communication participants. Nevertheless, it is important to provide ways to evaluate and measure the level of anonymity provided. We introduce in this report the use of hierarchical clustering technique to analyse anonymous systems. We propose a new measure to evaluate anonymous systems by introducing the concept of dominant cluster. We further show that using this measure will overcome the limitations of other existing measures.
  • Thumbnail Image
    Item
    A Java-Web-Based-Learning Methodology, Case Study : Waterborne diseases
    (CERIST, Alger, 2001) Benmeziane, Souad; Aliane, Hassina; Allouti, F.; Khelalfa, H. M.
    Les développements récents des technologies Web ont fait émerger de nouvelles approches pour l’enseignement assisté par ordinateur. En effet, l’apprenant peut apprendre indépendamment des contraintes de temps et de lieu. Plusieurs systèmes basés sur le Web ont été développés. Cependant, ils demeurent limités : ils ne peuvent pas contrôler et guider l’apprenant vu le manque d’interactivité du Web. Dans cet article, nous présentons une approche basée sur Java pour la conception de systèmes d’enseignement qui surmontent les limites des systèmes existants. Cette approche offre un apprentissage à distance, invidualisé tenant compte du rythme de l’apprenant et supportant ainsi un haut niveau d’interactivité. Une étude de cas est présentée concernant les maladies à transmission hydrique.
  • Thumbnail Image
    Item
    Java:un Langage Orienté Objet Adabté à Internet.
    (CERIST, 1997) Benmeziane, Souad; Djaid, M.
    Le Web, service le plus populaire d’Internet, apporte chaque jour de changements radicaux qui touchent tous les aspects de nos activités quotidiennes, que ce soit, le monde des affaires, l’éducation...Lava, une nouvelle technologie développée par un microsystèmes, a révolutionné le WWW.Ce dossier sur java, divisé en sept articles présente de manière détaillée les différents aspect de ce langage.