Academic & Scientific Articles
Permanent URI for this communityhttp://dl.cerist.dz/handle/CERIST/3
Browse
2 results
Search Results
Item Collaborative KP-ABE for Cloud-Based Internet of Things Applications(IEEE, 2016-05-23) Touati, Lyes; Challal, YacineKP-ABE mechanism emerges as one of the most suitable security protocol for asymmetric encryption. It has been widely used to implement access control solutions. However, due to its expensive overhead, it is difficult to consider this protocol in resource-limited networks, such as the IoT. As the cloud has become a key infrastructural support for IoT applications, it is interesting to exploit cloud resources to perform heavy operations. In this paper, a collaborative variant of KP-ABE named C-KP-ABE for cloud-based IoT applications is proposed. Our proposal is based on the use of computing power and storage capacities of cloud servers and trusted assistant nodes to run heavy operations. A performance analysis is conducted to show the effectiveness of the proposed solution.Item Metadata’s Protection in CKMS-As-A-Security Services(CERIST, 2014-02-20) Fehis, Saad; Nouali, Omar; Bentayeb, SarahTo ensure the confidentiality and integrity of data, it is necessary to use encryption techniques; the safety of these techniques is based on the pro- tection of keys and algorithms used by those techniques. Indeed, the estab- lishment of an encryption key management system (creation, storage, distribu- tion, etc...) is paramount. However, the safety of this type of system in the context of Cloud Computing is based on the protection of the data dictionary (metadata). The protection of this dictionary is a real challenge in a no-trust context. This paper describes the implementation of a protection technique for the Cryptographic Key Management System’s metadata, which provides handling (Consulting / Editing) data without offending the confidentiality and integrity of the dictionary.