B. Gomes, L. Muniz, F. J. da Silva e Silva, Luis Eduardo Talavera Rios, M. Endler
{"title":"A comprehensive cloud-based IoT software infrastructure for Ambient Assisted Living","authors":"B. Gomes, L. Muniz, F. J. da Silva e Silva, Luis Eduardo Talavera Rios, M. Endler","doi":"10.1109/CLOUDTECH.2015.7336998","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336998","url":null,"abstract":"Ambient Assisted Living (AAL) is a research field whose main objective is to develop health monitoring systems for elderly patients at home, increasing the degree of patient independence during chronic diseases treatment. AAL systems are composed by several technologies: medical sensors and actuators, computer and mobile devices, Wireress Sensors Networks (WSN), computer networks, software infrastructure and applications. A comprehensive software infrastructure for AAL systems should use these technologies in an integrated manner and be able to cover scenarios involving several patient mobility level, patient locations, and levels of physical and cognitive abilities. The integration of AAL with the Internet of Things (IoT) technologies expands the scope of these systems with the ability to connect various sensors and actuators, integrating them into a single network that serves the purpose of patient health monitoring. In this context, the contribution of this paper is to present a comprehensive Cloud based IoT softwre infrastructure for Ambient Assisted Living. The main components of this software infrastructure are the M-Hub and the SDDL middleware. Preliminary results show that the proposed infrastructure has the potential to be applied in a wide range of health monitoring scenarios.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133115346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Management platform for Cloud Computing","authors":"Omar Sefraoui, Mohammed Aissaoui, M. Eleuldj","doi":"10.1109/CLOUDTECH.2015.7336968","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336968","url":null,"abstract":"The Cloud Computing is a new concept in which dynamically scalable resources, virtualized and provided to users as a service over the Internet. It is primarily intended to meet the needs of users and allow them access to virtually unlimited resources. In fact, many researchers are motivated to develop solutions to improve performance and give users more tools to control the use of cloud computing. The cloud services offered is very diverse in terms of hardware and software, providing a wide range of configurations, and great flexibility., In this paper we propose a Management platform for Cloud Computing (Man4CC platform), aimed to act as an intermediate between users and Cloud environment. The main purpose of the Man4CC platform is to support cloud environment and offering additional components that enhance the functionality. The Man4CC platform is open source solution, scalable, interoperable and extensible. Also dealing with a management platform specification approach by capturing the user specifications and translate them into rules that will help to generate the cloud settings.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125182285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward a trusted framework for cloud computing","authors":"Hicham Toumi, M. Talea, K. Sabiri, A. Eddaoui","doi":"10.1109/CLOUDTECH.2015.7337013","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337013","url":null,"abstract":"Cloud Computing is evolving as a key computing platform for sharing resources that include infrastructures, software, applications, and business. However, Cloud Computing is still a matter of great concern for a cloud user to trust security and reliability of cloud services. Cloud Computing is undergoing an incontestable success, which could be indeed compromised by concerns about the risks related to potential misuse of this model aimed at conducting illegal activities. There is major need of bringing security, transparency and reliability in cloud model for client satisfaction. One of the security issues is how to reduce the impact of any type of intrusion in this environment. To overcome these kinds of attacks, we propose a framework of cooperative Hybrid Intrusion Detection System (Hy-IDS) and Mobile Agents. Then, our Hybrid IDS consists of two types of IDS, which are dispatched over three layer of cloud computing. Therefore, in the first layer our framework allows to collect, analyze and detect malicious data using the first type of IDS and Mobile Agents. In case of attack, we collect at the level of the second layer all the malicious data detected in the first layer for the generation of new signatures, based on a Signature Generation Algorithm (SGA) and network intrusion detection system (NIDS). However, these new signatures are used to update the database of the IDS. The mobile agents play an important role in this collaboration. They are used in our framework for investigation of hosts, transfer data malicious and transfer update of a database of neighboring IDS in the cloud. Therefore, the neighboring IDS will use these new signatures to protect their area of control against the same type of attack. Applying this close-loop control, the collaborative network security management framework could identify and address new distributed attacks more quickly and effectively.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127841246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rayane El Sibai, T. Atéchian, J. B. Abdo, R. Tawil, J. Demerjian
{"title":"Connectivity-aware service provision in vehicular cloud","authors":"Rayane El Sibai, T. Atéchian, J. B. Abdo, R. Tawil, J. Demerjian","doi":"10.1109/CLOUDTECH.2015.7337017","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337017","url":null,"abstract":"In the last twenty years, vehicles have become equipped with various sensors and resources, making them capable to communicate, to share resources and to behave cooperatively. This gave rise to the concept of vehicular cloud (VC). Vehicular cloud can be described from the standpoint of applications and services offered by vehicles that belong to a Vehicular Ad hoc Network (VANET). Because of the limitation of computation, storage and bandwidth resources for complex in-vehicle multimedia, entertainment applications, it is important to request services from service provider vehicles in the network, forming a cloud. However, the main challenge of vehicular networks is how to maintain the connectivity between the vehicles during service provision process. It is important to note that, to fully provide a service without interruption, it is necessary to ensure that the connectivity duration between the requestor and the service provider vehicles is sufficient for a complete end-to-end transmission. In this paper, a connectivity-aware service provision mechanism is proposed for VANET, where the service provider vehicle is selected based on several parameters such as the availability of the requested service and the mobility of the vehicles.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126244830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges of using homomorphic encryption to secure cloud computing","authors":"Khalid El Makkaoui, Abdellah Ezzati, A. B. Hssane","doi":"10.1109/CLOUDTECH.2015.7337011","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337011","url":null,"abstract":"With the emergence of cloud computing, the concept of information security has become a major issue. Indeed, the security of such a system is the greatest concern of computer scientists, providers of cloud and organizations who want to adopt and benefit from these services. Cloud computing providers must implement concepts ensuring network security, hardware, data storage and strategies of control and access to services. All these elements help to preserve data security and ensuring the availability of services associated with the Cloud, to better satisfy clients and acquire and build their trust. However, even if the data storage security in cloud servers is assured, reluctance remain when it comes to process the confidential data. Indeed, the fear that sensitive data is being used is a major obstacle in the adoption of cloud services by enterprises. To overcome this obstacle, the use of methods that can perform operations on encrypted data without knowing the secret key, seems to be an effective way to strengthen the confidentiality of information. In this paper we will examine the challenges facing Homomorphic Encryption methods to allow suppliers of cloud to perform operations on encrypted data, and provide the same results after treatment, as if they were performing calculations on raw data.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128436447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security model for cloud database as a service (DBaaS)","authors":"K. Munir","doi":"10.1109/CLOUDTECH.2015.7336974","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336974","url":null,"abstract":"Database-as-a-service (DBaaS) is a cloud computing service model that provides users with some form of access to a database without the need for setting up physical hardware, installing software or configuring for performance. Since consumers host data on the Cloud, DBaaS providers should be able to guarantee data owners that their data would be protected from all potential security threats. Protecting application data for large-scale web and mobile apps can be complex; especially with distributed and NoSQL databases. Data centers are no longer confined to the enterprise perimeter. More and more enterprises take their data to the cloud, but forget to adjust their security management practices when doing so. Unauthorized access to data resources, misuse of data stored on third party platform, data confidentiality, integrity and availability are some of the major security challenges that ail this nascent Cloud service model, which hinders the wide-scale adoption of DBaaS. In this paper, I propose a security model for cloud Database as a service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed framework for DBaaS and achieves efficiency. This will help Cloud community to get an insight into state-of-the-art progress in terms of secure strategies, their deficiencies and possible future directions.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122643324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decentralized attribute-based encryption scheme with scalable revocation for sharing data in public cloud servers","authors":"Adel Binbusayyis, Ning Zhang","doi":"10.1109/CLOUDTECH.2015.7336985","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336985","url":null,"abstract":"With the rapid development of cloud computing, it is attractive for enterprise companies to outsource their data files for sharing in cloud servers, as cloud computing can offer desirable characteristics, such as on-demand self-service, broad network access, and rapid elasticity. However, by uploading data files onto cloud servers, data owners (i.e. the companies) will lose control over their own data. This makes it essential to use Attribute-based encryption (ABE) because it can help to protect the data confidentiality by uploading data files in encrypted form. In addition, it can help to facilitate granting access to data by allowing only authorized users to decrypt the encrypted data files based on a set of attributes. However, this ABE approach includes three key issues. The first one is the complexity of user secret key management for large-scale cloud environments. The second is the complexity of revoking the users access rights. The third is the computational complexity involved in assigning user rights, encrypting and accessing data files. This paper addresses these three issues by proposing a decentralized ciphertext-policy ABE scheme (CP-DABE) for a large-scale cooperative cloud environment. The scheme reduces the complexity of user secret key management by providing a secure attribute delegation services between a master authority and a number of multiple attribute authorities. The scheme also reduces the complexity of revocation process by using Proxy Re-encryption technique to revoke any users access right. In addition, by comparing with most relative work, the scheme reduces the computational requirements for assigning user rights, encrypting and accessing data files. The scheme can support any LSSS access structure. In this paper, the cryptographic construction of the CP-DABE scheme is presented, and its efficiency is analyzed and compared with most relative work. The security of the CP-DABE scheme is discussed and selectively proved against chosen-plaintext attacks under the decisional Bilinear Diffie-Hellman Exponent assumption. Finally, ideas to extend the CP-DABE scheme are discussed.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133718405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Mostefai, Amina Annane, Lylia Kissoum, M. Ahmed-Nacer
{"title":"Implementing knowledge management systems in cloud-based environments: A case study in a computer science high school","authors":"M. Mostefai, Amina Annane, Lylia Kissoum, M. Ahmed-Nacer","doi":"10.1109/CLOUDTECH.2015.7337008","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337008","url":null,"abstract":"Knowledge Management Systems are a special class of information systems that support the knowledge management processes. One of the most important barriers that could compromise the KMS implementation is the cost related to the acquisition and the maintenance of the required IT infrastructure. This paper presents how cloud computing could be an alternative to traditional on-premise based implementation project and discusses a case study where a KMS has been implemented in a high school context using a cloud-based environment.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129653154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An overview of variability management in cloud services","authors":"Khadija Aouzal, H. Hafiddi, Mohamed Dahchour","doi":"10.1109/CLOUDTECH.2015.7336976","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336976","url":null,"abstract":"The Cloud Computing paradigm has enabled the multi-tenancy architectural approach in Cloud applications. In a multi-tenant application, one single instance is shared by many tenants (users). Since each client has its own and particular requirements and context, that are exposed to change in time, the process of realizing customizable and adaptable services becomes complex and difficult to handle. Handling variability has been subject of many research works in the domain of Service Oriented Computing, while less interest was given to variability in Cloud services. Therefore, managing variability in Cloud applications can take benefit from related works in service-oriented computing. In this paper, we present an overview of variability management in Cloud applications, in order to assess the pertinence of the different approaches proposed to tackle this issue.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132148817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An ontology-based guidance for privacy enforcement in a multi-authority cloud environment","authors":"Maherzia Belaazi, H. B. Rahmouni, A. Bouhoula","doi":"10.1109/CLOUDTECH.2015.7337015","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337015","url":null,"abstract":"Despite its attractive benefits, cloud adoption is challenged by some criteria of security and privacy. Access Control is one of the traditional and essential security tools of data protection. The decision to grant access to a resource must ensure secure management with a specific attention to privacy and data protection regulations. In particular, the challenge is more important with public clouds as many governing authorities could be involved in one cloud scenario. This implies a difficulty to work out which regulation should be applicable in case of conflict. In recent years, many access control models were proposed. Despite increasing legislative pressure, few of these propositions take care of privacy requirements in their security policies specification and enforcement. In this paper, we propose to enforce privacy compliance in access control policies for the context of public cloud. Throughout the use of ontology tools, we propose an approach for checking privacy enforcement with access control conditions. We also suggest the use of privacy safeguards notification where the threat to privacy protection is related to the secondary usage of personal data more than just the data access itself.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134537806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}