10 research outputs found

    Exploiting Blockchains to improve Data Upload and Storage in the Cloud

    Get PDF
    Cloud computing is an information technology that enables different users to access a shared pool of configurable system resources and different services without physically acquiring them. Most industries nowadays such as banking, healthcare and education are migrating to the cloud due to its efficiency of services especially when it comes to data security and integrity. Cloud platforms encounter numerous challenges such as Data deduplication, Data Transmission, Data Integrity, VM Security, Data Availability, Bandwidth usage… etc. In this paper we have adopted the Blockchain technology - which is a relatively new technology - that emerged for the first time as the cryptocurrency Bitcoin and proved its efficiency in securing data and assuring data integrity. It is mostly a distributed public ledger that holds transactions data in case of Bitcoin. In our work blockchains are adopted in a different way than its regular use in bitcoin. Three of the major challenges in Cloud Computing and Cloud services are Data Deduplication, Storage and Bandwidth usage are discussed in this paper

    Smart Cities and NICT

    Get PDF
    in the wake of this urban innovation wind, the smart city, nicknamed the "Intelligent city," a model promoted since the growth of digital whose dynamics is based on the use of information and communication technologies. It is a concept based on a holistic approach to the integration of different information systems in sectors such as transportation, health, energy, the cleanliness that should translate into a net improvement in the daily life of the inhabitants. These new information and communications technologies (NICT) Such as big data, Internet of Things are the element that inspired the concept of smart city. This article discusses the architectural portion of the intelligent city based on the new technologies as well as a first step for a future study on the mobility and the behavior of citizens in the intelligent citiesby based on the Human predisposition to the game

    A New Data Deletion Scheme for a Blockchain-based De-duplication System in the Cloud

    Get PDF
    Almost all Cloud Service Providers (CSP) takes a principled approach to the storage and deletion of Customer Data. Most of them have engineered their cloud platform to achieve a high degree of speed, availability, durability, and consistency. Their systems are designed to be optimized for these performance attributes and must be carefully balanced with the necessity to achieve accurate and timely data deletion.many researchers have turn their focus toward data storage and how it will be a challenging task for CSPs in term of storage capacity, data management and security, a considerable number of papers has been published containing new models and technique that will allow data De-duplication in a shared environment but few of them have discussed data deletion.In this paper we will be discussing a new approach that will allow a smart deletion of data stored in the file system as well as its reference in the Blockchain since, by its nature, Blockchains does not allow deletion without violating the Blockchain’s consistency, a preexisting de-duplication system will be our base platform on which we will be working to achieve an accurate and secure data deletion using Blockchain technology while preserving its consistency

    Mesure d’audience d’un site Web: Utilisation du formalisme XML

    No full text
    No Abstrac

    A collaborative framework for intrusion detection (C-NIDS) in Cloud computing

    No full text
    In recent years, Cloud computing has emerged as a new paradigm for delivering highly scalable and on-demand shared pool IT resources such as networks, servers, storage, applications and services through internet. It enables IT managers to provision services to users faster and in a cost-effective way. As a result, this technology is used by an increasing number of end users. On the other hand, existing security deficiencies and vulnerabilities of underlying technologies can leave an open door for intruders. Indeed, one of the major security issues in Cloud is to protect against distributed attacks and other malicious activities on the network that can affect confidentiality, availability and integrity of Cloud resources. In order to solve these problems, we propose a Collaborative Network Intrusion Detection System (C-NIDS) to detect network attacks in Cloud by monitoring network traffic, while offering high accuracy by addressing newer challenges, namely, intrusion detection in virtual network, monitoring high traffic, scalability and resistance capability. In our NIDS framework, we use Snort as a signature based detection to detect known attacks, while for detecting network anomaly, we use Support Vector Machine (SVM). Moreover, in this framework, the NIDS sensors deployed in Cloud operate in collaborative way to oppose the coordinated attacks against cloud infrastructure and knowledge base remains up-to-date

    Serious Game Design: Presenting a New Generic Creative Reflection Framework

    No full text
    Serious games are transcending the way of teaching and learning nowadays. Since serious games balance playful and educational aspects, it constitutes a privileged learning method for the digital natives. However, they are ubiquitous in today's society and their stakes and assets remain largely fuzzy. This paper describes different models and frameworks for serious game design. Between theoretical and technical consideration, authors propose a new reflection model that aims to help pedagogues guiding their conception of serious games. This model is a result of a thematic synthesis analyzing more than 40 texts offering a three-layered model covering the simplest to the most advanced design. Three study cases are announced to be conducted by the end of this year in order to challenge and evaluate this new model
    corecore