Academic & Scientific Articles
Permanent URI for this communityhttp://dl.cerist.dz/handle/CERIST/3
Browse
3 results
Search Results
Item Collaborative KP-ABE for Cloud-Based Internet of Things Applications(IEEE, 2016-05-23) Touati, Lyes; Challal, YacineKP-ABE mechanism emerges as one of the most suitable security protocol for asymmetric encryption. It has been widely used to implement access control solutions. However, due to its expensive overhead, it is difficult to consider this protocol in resource-limited networks, such as the IoT. As the cloud has become a key infrastructural support for IoT applications, it is interesting to exploit cloud resources to perform heavy operations. In this paper, a collaborative variant of KP-ABE named C-KP-ABE for cloud-based IoT applications is proposed. Our proposal is based on the use of computing power and storage capacities of cloud servers and trusted assistant nodes to run heavy operations. A performance analysis is conducted to show the effectiveness of the proposed solution.Item Cloud Computing(CERIST, 2015) Abdi, RadiaLe concept Cloud Computing a connu un développement remarquable ces dernières années. Son principe est de déporter le traitement et le stockage des données des utilisateurs sur des infrastructures accessibles depuis internet de n’importe où et à n’importe quel moment. Le Cloud Computing compte plusieurs domaines d’utilisation y compris le domaine de la recherche d’informations. Ce dernier a pour objectif de fournir à un utilisateur un accès facile à l’information qu’il l’intéresse. Cependant l’un des problèmes majeurs qui y sont liés étant la masse d’information à indexer, qui a engendré en conséquence, l’accroissement de l’index (espace de stockage) et le temps d’indexation. A cet effet, nous avons essayé dans ce travail de régler le problème de stockage de l’index et cela par l’exploitation d’une nouvelle technologie qui est le Cloud Computing.Item Metadata’s Protection in CKMS-As-A-Security Services(CERIST, 2014-02-20) Fehis, Saad; Nouali, Omar; Bentayeb, SarahTo ensure the confidentiality and integrity of data, it is necessary to use encryption techniques; the safety of these techniques is based on the pro- tection of keys and algorithms used by those techniques. Indeed, the estab- lishment of an encryption key management system (creation, storage, distribu- tion, etc...) is paramount. However, the safety of this type of system in the context of Cloud Computing is based on the protection of the data dictionary (metadata). The protection of this dictionary is a real challenge in a no-trust context. This paper describes the implementation of a protection technique for the Cryptographic Key Management System’s metadata, which provides handling (Consulting / Editing) data without offending the confidentiality and integrity of the dictionary.