logo EDITE Mohamed El Mehdi BENTOUNSI
Identité
Mohamed El Mehdi BENTOUNSI
État académique
Thèse soutenue le 2015-09-14
Sujet: La sécurité dans le cloud computing
Direction de thèse:
Laboratoire:
Voisinage
Ellipse bleue: doctorant, ellipse jaune: docteur, rectangle vert: permanent, rectangle jaune: HDR. Trait vert: encadrant de thèse, trait bleu: directeur de thèse, pointillé: jury d'évaluation à mi-parcours ou jury de thèse.
Productions scientifiques
oai:hal.archives-ouvertes.fr:hal-00727735
Anonyfrag: An Anonymization-Based Approach For Privacy-Preserving BPaaS
Many cloud providers offer on demand applications as BPaaS "Business Process as a Service" through multi-tenant cloud platforms, allowing many companies to outsource their business processes. That is, an increasing amount of personal data involved in business processes is automatically gathered and stored on the cloud. For cost saving, some fragments of business processes can be reused i.e., shared between the clients on the cloud regardless of privacy risks. In this paper, we propose an anonymization-based approach to preserve the client business activity while sharing process fragments between organizations on the cloud.
Cloud-I '12 Proceedings of the 1st International Workshop on Cloud Intelligence Cloud-I '12 the 1st International Workshop on Cloud Intelligenceproceeding with peer review 2012-09-04
oai:hal.archives-ouvertes.fr:hal-00727717
Privacy-Preserving Business Process Outsourcing
Many cloud providers offer on demand applications as Business Process as a Service (BPaaS), allowing companies to outsource their processes. For cost saving, some process fragments can be reused on the cloud regardless of privacy risks. In this paper, we propose an anonymization-based approach to preserve client business activity while sharing process fragments between organizations on the cloud.
Web Services (ICWS), 2012 IEEE 19th International Conference on Web Services (ICWS), 2012 IEEE 19th International Conference onproceeding with peer review 2012-08-06
oai:hal.archives-ouvertes.fr:hal-01278180
Procédé sécurisé d’analyse externe de données d’exploitation d’une infrastructure de traitement de données
https://hal.archives-ouvertes.fr/hal-01278180 France, N° de brevet: 1561009. 2015ARRAY(0x7f03ff0d1578) 2015-11-16
oai:hal.archives-ouvertes.fr:hal-01185941
Security-Aware Business Process as a Service by hiding provenance
International audience
As BPaaS (Business Process as a Service) continues to proliferate and is being used for an increasing variety of applications, there are growing securityrisks raised by such business process outsourcing on user data and activities. In this paper, we address the security issues that arise when outsourcingbusiness processes, in particular when sharing and reusing process fragments coming from dierent organizations for faster and easier developmentof process-based applications. The goal is twofold, to preserve the process fragment provenance, i.e., the companies's business activities which provide the reused fragments in order to avoid the competition, and to guarantee the end-to-end availability of process-based application to fragment'sconsumers in the BPaaS. We formally dene the problem, and oer an efficient anonymization-based protocol. Experiments have been conducted toshow the eectiveness of the proposed solution.
ISSN: 0920-5489 Computer Standards and Interfaces https://hal.archives-ouvertes.fr/hal-01185941 Computer Standards and Interfaces, Elsevier, 2015, pp.CSI_3057. <10.1016/j.csi.2015.08.011>ARRAY(0x7f0400d3b3b0) 2015-08-20
oai:hal.archives-ouvertes.fr:hal-01376467
Secure Complex Monitoring Event Processing
International audience
In this paper, we present EMaaS, for Event Management as a Service, a multi-tenant cloud service to outsource the management of monitoring events in the cloud. Furthermore, we provide a secure multi-party computation (SMC) protocol for complex monitoring event processing. The protocol is integrated to EMaaS and uses some properties of encryption schemes. Finally, we evaluate the protocol security, and then discuss its implementation.
The 15th IEEE International Symposium on Network Computing and Applications (NCA 2016) https://hal.archives-ouvertes.fr/hal-01376467 The 15th IEEE International Symposium on Network Computing and Applications (NCA 2016), Oct 2016, Cambridge, United States. <http://www.ieee-nca.org/2016/> http://www.ieee-nca.org/2016/ARRAY(0x7f040038bd30) 2016-10-31
Soutenance
Thèse: Les Processus Métiers en tant que services : sécurisation des données et des services
Soutenance: 2015-09-14
Rapporteurs: Claude GODART    Mohand-Said HACID