Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Chirine Ghedira-Guegan

    AICCSA 2016 Conference, in collaboration with IEEE, continues its mission of covering all contemporary areas in computer systems and applications, and providing the latest results on theory, design, analysis, implementation, and... more
    AICCSA 2016 Conference, in collaboration with IEEE, continues its mission of covering all contemporary areas in computer systems and applications, and providing the latest results on theory, design, analysis, implementation, and application in these important and rapidly changing disciplines. Indeed, this edition addresses eleven areas and the technical program presents high-quality papers in: (1) IR, Big Data, Business Intelligence, & Knowledge Management; (2) Cloud, Parallel, Distributed, and High Performance Computing; (3) Multimedia, Computer Vision, and Image Processing; (4) Advances in Software Engineering; (5) Natural Language Processing and Applications; (6) Advances in AI, Agent Systems, and Ambient Intelligence; (7) Advances Networking and Sensor Networks; (8) Systems and Software Security; (9) Social and Mobile Computing; (10) Advances in Web Technologies, Semantics, and Future Internet; (11) Digital Living, including E-Learning, E-Government, E-Health. The breadth of the prominence of approaches in these areas is underlined by the topics of the four distinguished keynote speakers: Ahmed Elmagarmid and Jim Jansen, the Executive Director and senior research of Qatar Computing Research Institute (QCRI) respectively; Athman Bouguettaya, professor and the head of School of Computer Science and Information Technology at RMIT University; and Abdella Battou, the Division Chief of the Advanced Network Technologies Division, within The Information Technology Lab at National Institute of Standards and Technology (NIST).
    Due to the specificity of the omni-channel retailing scenario, consumers in a brick and mortar store have a merging need for various decision support services to enhance their shopping experience. To survive the fierce competition in the... more
    Due to the specificity of the omni-channel retailing scenario, consumers in a brick and mortar store have a merging need for various decision support services to enhance their shopping experience. To survive the fierce competition in the retail world, firms need to predict which services are relevant to their customers and when to offer these services. To address this challenge, we propose a context-aware approach to collect, analyze, and interpret real-time consumer behavioral data from portable devices. Experiment results confirm that context-aware interaction can greatly enhance consumers' shopping experience in the offline scenario.
    Nowadays, organizations are increasingly attracted by the benefit of multi-cloud offerings. However, they have to adapt their business processes for multi-cloud collaboration and especially to deal with a major security problem. Indeed,... more
    Nowadays, organizations are increasingly attracted by the benefit of multi-cloud offerings. However, they have to adapt their business processes for multi-cloud collaboration and especially to deal with a major security problem. Indeed, the complexity of security due to multiple cloud policies and a variety of security requirements does not guarantee compliance with the security requirements of their business processes. We present our initial research that aims to develop an effective security governance framework for a multi-cloud environment. Our approach is to shed light on the need to integrate security requirements into business processes and to provide a conceptual framework of security requirements including steps and processes for a multi-cloud environment.
    Nowadays, data provision is mostly done by data services. Data integration can be seen as composition of data services and data processing services that can deal with to integrate data collections. With the advent of cloud, producing... more
    Nowadays, data provision is mostly done by data services. Data integration can be seen as composition of data services and data processing services that can deal with to integrate data collections. With the advent of cloud, producing service compositions is computationally costly. Furthermore, executing them can require a considerable amount of memory, storage and computing resources that can be provided by clouds. Our research focuses on how to enhance the results on the increase of cost on data integration in the new context of cloud. To do so, we present in this paper our original data integration approach which takes into account user’s integration requirements while producing and delivering the results. The service selection and service composition are guided by the service level agreement - SLA exported by different services (from one or more clouds) and used by our matching algorithm (called Rhone) that addresses the query rewriting for data integration presented here as proof of concept.
    Data curation deals with managing the data by applying different tasks such as extraction, enrichment, cleaning to fit the purpose of use. Indeed, nowadays, there is an increasing need to implement such tasks in the big data era to... more
    Data curation deals with managing the data by applying different tasks such as extraction, enrichment, cleaning to fit the purpose of use. Indeed, nowadays, there is an increasing need to implement such tasks in the big data era to maintain data management. Big data is involved in decision processes to perform analysis, visualization, prediction, etc. Thus, there is a dependency between the generated outcomes and the input data of such a process. Therefore, decision process features (e.g., decision context, user constraints, and requirements) need to be taken into account during the data management process, including the data curation phase. Although the proposed curation approaches in the literature are diverse, most of them are static and do not consider the decision process features. Moreover, most of the proposals are dedicated to curating a specific data source format (e.g., structured/unstructured data source). To overcome these limitations, we propose a new approach ACUSEC (Adaptive CUration SErvice Composition) that ensures adaptive curation services composition by considering different features: the source type, the user constraints and preferences, and the decision context. To do so, we rely on AI and machine learning mechanisms such as reinforcement learning. Following the approach's definition, we conducted experiments that show encouraging results in overall execution time and adaptation to the above features.
    Cloud computing has revolutionized delivery of IT solutions increasing economic advantages, robustness, scalability, elasticity and security. Nowadays to achieve their cloud goals, organizations are increasingly move towards enabling... more
    Cloud computing has revolutionized delivery of IT solutions increasing economic advantages, robustness, scalability, elasticity and security. Nowadays to achieve their cloud goals, organizations are increasingly move towards enabling multi-cloud environments which promised to support very large-scale, worldwide, distributed applications using multiple and independent cloud environments. However, given their complexity and distribution, multi-cloud has to face several key challenges around security and governance such as interoperability, portability, provisioning, elasticity, high availability and security. Therefore, these challenges increase the needs of security governance in such environments. Although some researches have been realized in the multi-cloud security domain, it becomes imperative to asses the current state of research and practice of its security governance. This paper aims to categorize the existing works related to security governance in multi-cloud environments by applying a systematic mapping study methodology in order toidentify trends and future directions. Our results prove that multi-clouds security governance seems to be a promising areain multi-cloud research and evaluation.
    This dataset includes the papers that were involved to perform our systematic study.
    Nowadays, organizations are increasingly attracted by the benefit of multi-cloud offerings. However, they have to adapt their business processes for multi-cloud collaboration and especially to deal with a major security problem. Indeed,... more
    Nowadays, organizations are increasingly attracted by the benefit of multi-cloud offerings. However, they have to adapt their business processes for multi-cloud collaboration and especially to deal with a major security problem. Indeed, the complexity of security due to multiple cloud policies and a variety of security requirements does not guarantee compliance with the security requirements of their business processes. We present our initial research that aims to develop an effective security governance framework for a multi-cloud environment. Our approach is to shed light on the need to integrate security requirements into business processes and to provide a conceptual framework of security requirements including steps and processes for a multi-cloud environment.
    Due to the specificity of the omni-channel retailing scenario, consumers in a brick and mortar store have a merging need for various decision support services to enhance their shopping experience. To survive the fierce competition in the... more
    Due to the specificity of the omni-channel retailing scenario, consumers in a brick and mortar store have a merging need for various decision support services to enhance their shopping experience. To survive the fierce competition in the retail world, firms need to predict which services are relevant to their customers and when to offer these services. To address this challenge, we propose a context-aware approach to collect, analyze, and interpret real-time consumer behavioral data from portable devices. Experiment results confirm that context-aware interaction can greatly enhance consumers' shopping experience in the offline scenario.
    Monitoring the epidemiological situation of public health remains a challenge, given the exponential growth of health data. Indeed, these latter come from various sources such as, health professionals, biologists, experts in health... more
    Monitoring the epidemiological situation of public health remains a challenge, given the exponential growth of health data. Indeed, these latter come from various sources such as, health professionals, biologists, experts in health organizations, etc. In this context, reconciling the search for the greatest amount of appropriate signals and the way of treating them, is the ultimate challenge.
    After a cloud computing decade, the user-centric, fully interoperable, multi-provider cloud remains a mirage. In currently deployed architectures, "horizontal" multi-cloud interoperability limitations come on top of... more
    After a cloud computing decade, the user-centric, fully interoperable, multi-provider cloud remains a mirage. In currently deployed architectures, "horizontal" multi-cloud interoperability limitations come on top of "vertical" multi-layer security concerns. In this paper, we argue that an architecture with a hybrid design could be a viable solution. Indeed, we present a new virtualization architecture combining micro-hypervisor (MH), nested virtualization (NV)and component-based hypervisor (CBH) paradigms. Leveraging NV interoperability and legacy support, the architecture provides to users a transparent federation of multiple-provider resources. We also adopt a MH including CBH-like modules as NV lower-layer hypervisor to achieve both a minimal TCB and to enable users to directly control hypervisor components managing their resources.
    Datasets used for experimental results (Figure 5): (a) Compositional weaver efficiency; (b) incremental weaving efficiency; (c) relative overhead of weaving in workflow; (d) weaver efficiency vs. aspect complexity. Type of data: raw and... more
    Datasets used for experimental results (Figure 5): (a) Compositional weaver efficiency; (b) incremental weaving efficiency; (c) relative overhead of weaving in workflow; (d) weaver efficiency vs. aspect complexity. Type of data: raw and processed Hardware/software used: Intel Xeon E5-2650 Haswell at 2.60GHz with 64 GB of RAM; Testing input for all Mantus benchmarks: OpenStack-based ORBITS template described in paper, composed of a controller node and of 3 different group instances of compute nodes (Xen, KVM, LXC), with two virtual networks and relative network resources. Data format: CSV Source: Experiments
    Datasets used for experimental results (Figure 5) for different virtualization configurations: (a) Average TCP latency; (b) Average TCP throughput w.r.t. message size; (c) Request service response time for variable number of concurrent... more
    Datasets used for experimental results (Figure 5) for different virtualization configurations: (a) Average TCP latency; (b) Average TCP throughput w.r.t. message size; (c) Request service response time for variable number of concurrent connections; (d) Request throughput per second for variable number of concurrent connections. Intel Xeon E5-2650 Haswell 2.60 GHz, 64 GB RAM, bare-metal OS: Centos 7 OpenStack, Linux KVM, Ubuntu 16.04, para-virtualized VirtIO drivers (network card, disk) Data format: CSV Source: Experiments
    The bubble charts depicts the result of the systematic mapping.
    Data analytics based on the produced data from the Internet of Things (IoT) devices is expected to improve the individuals’ quality of life. However, ensuring security and privacy in the IoT data aggregation process is a non-trivial task.... more
    Data analytics based on the produced data from the Internet of Things (IoT) devices is expected to improve the individuals’ quality of life. However, ensuring security and privacy in the IoT data aggregation process is a non-trivial task. Generally, the IoT data aggregation process is based on centralized servers. Yet, in the case of distributed approaches, it is difficult to coordinate several untrustworthy parties. Fortunately, the blockchain may provide decentralization while overcoming the trust problem. Consequently, blockchain-based IoT data aggregation may become a reasonable choice for the design of a privacy-preserving system. To this end, we propose PrivDA, a Privacy-preserving IoT Data Aggregation scheme based on the blockchain and homomorphic encryption technologies. In the proposed system, each data consumer can create a smart contract and publish both terms of service and requested IoT data. Thus, the smart contract puts together into one group potential data producers...
    AICCSA 2016 Conference, in collaboration with IEEE, continues its mission of covering all contemporary areas in computer systems and applications, and providing the latest results on theory, design, analysis, implementation, and... more
    AICCSA 2016 Conference, in collaboration with IEEE, continues its mission of covering all contemporary areas in computer systems and applications, and providing the latest results on theory, design, analysis, implementation, and application in these important and rapidly changing disciplines. Indeed, this edition addresses eleven areas and the technical program presents high-quality papers in: (1) IR, Big Data, Business Intelligence, & Knowledge Management; (2) Cloud, Parallel, Distributed, and High Performance Computing; (3) Multimedia, Computer Vision, and Image Processing; (4) Advances in Software Engineering; (5) Natural Language Processing and Applications; (6) Advances in AI, Agent Systems, and Ambient Intelligence; (7) Advances Networking and Sensor Networks; (8) Systems and Software Security; (9) Social and Mobile Computing; (10) Advances in Web Technologies, Semantics, and Future Internet; (11) Digital Living, including E-Learning, E-Government, E-Health. The breadth of the...
    Blockchain technology enables several untrustworthy parties to execute inter-organizational business processes in a tamper-proof manner. Existing approaches are based on smart contract code generation. Although the smart contract... more
    Blockchain technology enables several untrustworthy parties to execute inter-organizational business processes in a tamper-proof manner. Existing approaches are based on smart contract code generation. Although the smart contract immutability guarantees that the process model is followed by each participant, any change in the process model makes the existing process instance smart contract not compliant with the process model and therefore, the deployment of a new smart contract becomes a requirement. In this paper, we propose CoBuP, a decentralized Collaborative Business Process execution architecture using blockchain. To address the inflexibility issue, this paper presents an interpreter of BPMN process models, supporting the instantiating, execution, monitoring of process instances. For this reason, one generic smart contract is deployed once, which helps generate a process instance, create BPMN elements by invoking the process instance predefined functions, and dynamically update the adaptation of a process at run time. For validation purposes, two use cases have permitted to carry out different experiments that demonstrate the technical feasibility of our approach. The obtained results of the experimental evaluation shows that our approach cost is similar or lower than that of the existing approaches.
    The Internet of Things (IoT) is expected to improve the individuals’ quality of life. However, ensuring security and privacy in the IoT context is a non-trivial task due to the low capability of these connected devices. Generally, the IoT... more
    The Internet of Things (IoT) is expected to improve the individuals’ quality of life. However, ensuring security and privacy in the IoT context is a non-trivial task due to the low capability of these connected devices. Generally, the IoT device management is based on a centralized entity that validates communication and connection rights. Therefore, this centralized entity can be considered as a single point of failure. Yet, in the case of distributed approaches, it is difficult to delegate the right validation to IoT devices themselves in untrustworthy IoT environments. Fortunately, the blockchain may provide decentralization of overcoming the trust problem while designing a privacy-preserving system. To this end, we propose a novel privacy-preserving IoT device management framework based on the blockchain technology. In the proposed system, the IoT devices are controlled by several smart contracts that validate the connection rights according to the privacy permission settings pr...

    And 16 more