Publications

Djebaili K, Melkemi L. A Different Encryption System Based on the Integer Factorization Problem. Malaysian Journal of Computing and Applied Mathematics [Internet]. 2020;3 (1) :50-54. Publisher's VersionAbstract

We present a new computational problem in this paper, namely the order of a group element problem which is based on the factorization problem, and we analyze its applications in cryptography. We present a new one-way function and from this function we propose a homomorphic probabilistic scheme for encryption. Our scheme, provably secure under the new computational problem in the standard model.

Ben-Attia H, Kahloul L, Benhazrallah S, Bourekkache S. Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies. International Journal of Information Security [Internet]. 2020;19 :163–187 . Publisher's VersionAbstract

Role-Based Access Control (RBAC) is one of the most used models in designing and implementation of security policies, in large networking systems. Basic RBAC model does not consider temporal aspects which are so important in such policies. Temporal RBAC (TRBAC) is proposed to deal with these temporal aspects. Despite the elegance of these models, designing a security policy remains a challenge. Designers must ensure the consistency and the correctness of the policy. The use of formal methods provides techniques for proving that the designed policy is consistent. In this paper, we present a formal modelling/analysis approach of TRBAC policies. This approach uses Hierarchical Timed Coloured Petri Nets (HTCPN) formalism to model the TRBAC policy, and the CPN-tool to analyse the generated models. The timed aspect, in HTCPN, facilitates the consideration of temporal constraints introduced in TRBAC. The hierarchical aspect of HTCPN makes the model “manageable”, in spite of the complexity of TRBAC policy specification. The analysis phase allows the verification of many important properties about the TRBAC security policy.

Hmidi Z, Kahloul L, Benharzallah S. Using priced timed automata for the specification and verification of CSMA/CA in WSNs. International Journal of Information and Communication Technology [Internet]. 2020;17 (2). Publisher's VersionAbstract

Several contention-based MAC protocols for WSNs have been proposed. The control channel is accessed with carrier sense multiple access with collision avoidance (CSMA/CA) method. The complexity of this method and its criticality motivate the formal specification and verification of its basic algorithms. Most existing works do not deal with all possible aspects such as topology, number of nodes, node behaviour, and number of possible retransmissions. In this paper, we propose a stochastic generic model for the 802.11 MAC protocol for an arbitrary network topology which is independent of the number of sensors. In addition to the qualitative evaluation that proves the correctness of the model, we will make a quantitative evaluation using the statistical model checking to measure the probabilistic performance of the protocol.

Zoubeidi M, Kazar O, Benharzallah S, Mesbahi N, Merizig A, Rezki D. A new approach agent-based for distributing association rules by business to improve decision process in ERP systems. International Journal of Information and Decision Sciences [Internet]. 2020;12 (1) :1-35. Publisher's VersionAbstract

Nowadays, the distributed computing plays an important role in the data mining process. To make systems scalable it is important to develop mechanisms that distribute the workload among several sites in a flexible way. Moreover, the acronym ERP refers to the systems and software packages used by organisations to manage day-by-day business activities. ERP systems are designed for the defined schema that usually has a common database. In this paper, we present a collaborative multi-agent based system for association rules mining from distributed databases. In our proposed approach, we combine the multi-agent system with association rules as a data mining technique to build a model that can execute the association rules mining in a parallel and distributed way from the centralised ERP database. The autonomous agents used to provide a generic and scalable platform. This will help business decision-makers to take the right decisions and provide a perfect response time using multi-agent system. The platform has been compared with the classic association rules algorithms and has proved to be more efficient and more scalable.

Mezzoudj S. A parallel content-based image retrieval system using spark and tachyon frameworks. Journal of King Saud University - Computer and Information Sciences [Internet]. 2021;33 (2) :141-149. Publisher's VersionAbstract

With the huge increase of large-scale multimedia over Internet, especially images, building Content-Based Image Retrieval (CBIR) systems for large-scale images has become a big challenge. One of the drawbacks associated with CBIR is the very long execution time. In this article, we propose a fast Content-Based Image Retrieval system using Spark (CBIR-S) targeting large-scale images. Our system is composed of two steps. (i) image indexation step, in which we use MapReduce distributed model on Spark in order to speed up the indexation process. We also use a memory-centric distributed storage system, called Tachyon, to enhance the write operation (ii) image retrieving step which we speed up by using a parallel k-Nearest Neighbors (k-NN) search method based on MapReduce model implemented under Apache Spark, in addition to exploiting the cache method of spark framework. We have showed, through a wide set of experiments, the effectiveness of our approach in terms of processing time.

Tioura A, Moumen H, Kalla H, Ait-Saidi A. A Hybrid Protocol to Solve Authenticated Byzantine Consensus. Fundamenta Informaticae [Internet]. 2020;173 (1) :73-89. Publisher's VersionAbstract

The consensus is a central problem of fault-tolerant distributed computing. Unfortunately, solving such a problem is impossible in asynchronous distributed systems prone to process failures. To circumvent this impossibility (known as FLP impossibility result) in a deterministic way, on top of asynchronous distributed systems enriched with additional assumptions, several protocols have been proposed. Actually, to solve the Byzantine Consensus problem, with a deterministic manner, in systems where at most t processes may exhibit a Byzantine behavior, two approaches have been investigated. The first relies on the addition of synchrony, called Timer-Based, while the second, called Time-Free, is based on the pattern of message exchange. This paper shows that both types of assumptions are not antagonist and can be combined to solve authenticated Byzantine consensus. The combined assumption considers a correct process pi, called ⋄〈t + 1〉-BW, and a set X of t+1 correct processes (including pi itself) such that, eventually, for each query broadcasted by a correct process pj of X, pj receives a response from pi ∈ X among the (n – t) first responses to that query or both links connecting pi and pj are timely. Based on this combination, a simple hybrid authenticated Byzantine consensus protocol benefiting from the best of both worlds is proposed. As a matter of fact, although numerous hybrid protocols have been designed for the consensus problem in the crash model, this is, to our knowledge, the first hybrid deterministic solution to the Byzantine consensus problem.

  •  
  • 1 of 7
  • »