Academic & Scientific Articles

Permanent URI for this communityhttp://dl.cerist.dz/handle/CERIST/3

Browse

Search Results

Now showing 1 - 3 of 3
  • Thumbnail Image
    Item
    Collaborative KP-ABE for Cloud-Based Internet of Things Applications
    (IEEE, 2016-05-23) Touati, Lyes; Challal, Yacine
    KP-ABE mechanism emerges as one of the most suitable security protocol for asymmetric encryption. It has been widely used to implement access control solutions. However, due to its expensive overhead, it is difficult to consider this protocol in resource-limited networks, such as the IoT. As the cloud has become a key infrastructural support for IoT applications, it is interesting to exploit cloud resources to perform heavy operations. In this paper, a collaborative variant of KP-ABE named C-KP-ABE for cloud-based IoT applications is proposed. Our proposal is based on the use of computing power and storage capacities of cloud servers and trusted assistant nodes to run heavy operations. A performance analysis is conducted to show the effectiveness of the proposed solution.
  • Item
    Cloud Computing
    (CERIST, 2015) Abdi, Radia
    Le concept Cloud Computing a connu un développement remarquable ces dernières années. Son principe est de déporter le traitement et le stockage des données des utilisateurs sur des infrastructures accessibles depuis internet de n’importe où et à n’importe quel moment. Le Cloud Computing compte plusieurs domaines d’utilisation y compris le domaine de la recherche d’informations. Ce dernier a pour objectif de fournir à un utilisateur un accès facile à l’information qu’il l’intéresse. Cependant l’un des problèmes majeurs qui y sont liés étant la masse d’information à indexer, qui a engendré en conséquence, l’accroissement de l’index (espace de stockage) et le temps d’indexation. A cet effet, nous avons essayé dans ce travail de régler le problème de stockage de l’index et cela par l’exploitation d’une nouvelle technologie qui est le Cloud Computing.
  • Thumbnail Image
    Item
    Metadata’s Protection in CKMS-As-A-Security Services
    (CERIST, 2014-02-20) Fehis, Saad; Nouali, Omar; Bentayeb, Sarah
    To ensure the confidentiality and integrity of data, it is necessary to use encryption techniques; the safety of these techniques is based on the pro- tection of keys and algorithms used by those techniques. Indeed, the estab- lishment of an encryption key management system (creation, storage, distribu- tion, etc...) is paramount. However, the safety of this type of system in the context of Cloud Computing is based on the protection of the data dictionary (metadata). The protection of this dictionary is a real challenge in a no-trust context. This paper describes the implementation of a protection technique for the Cryptographic Key Management System’s metadata, which provides handling (Consulting / Editing) data without offending the confidentiality and integrity of the dictionary.