Chirine Ghedira-Guegan - Academia.edu (original) (raw)

Papers by Chirine Ghedira-Guegan

Research paper thumbnail of Foreword — Message from the general chairs

AICCSA 2016 Conference, in collaboration with IEEE, continues its mission of covering all contemp... more AICCSA 2016 Conference, in collaboration with IEEE, continues its mission of covering all contemporary areas in computer systems and applications, and providing the latest results on theory, design, analysis, implementation, and application in these important and rapidly changing disciplines. Indeed, this edition addresses eleven areas and the technical program presents high-quality papers in: (1) IR, Big Data, Business Intelligence, & Knowledge Management; (2) Cloud, Parallel, Distributed, and High Performance Computing; (3) Multimedia, Computer Vision, and Image Processing; (4) Advances in Software Engineering; (5) Natural Language Processing and Applications; (6) Advances in AI, Agent Systems, and Ambient Intelligence; (7) Advances Networking and Sensor Networks; (8) Systems and Software Security; (9) Social and Mobile Computing; (10) Advances in Web Technologies, Semantics, and Future Internet; (11) Digital Living, including E-Learning, E-Government, E-Health. The breadth of the prominence of approaches in these areas is underlined by the topics of the four distinguished keynote speakers: Ahmed Elmagarmid and Jim Jansen, the Executive Director and senior research of Qatar Computing Research Institute (QCRI) respectively; Athman Bouguettaya, professor and the head of School of Computer Science and Information Technology at RMIT University; and Abdella Battou, the Division Chief of the Advanced Network Technologies Division, within The Information Technology Lab at National Institute of Standards and Technology (NIST).

Research paper thumbnail of Adapted Decision Support Service Based on the Prediction of Offline Consumers' Real-Time Intention and Devices Interactions

Due to the specificity of the omni-channel retailing scenario, consumers in a brick and mortar st... more Due to the specificity of the omni-channel retailing scenario, consumers in a brick and mortar store have a merging need for various decision support services to enhance their shopping experience. To survive the fierce competition in the retail world, firms need to predict which services are relevant to their customers and when to offer these services. To address this challenge, we propose a context-aware approach to collect, analyze, and interpret real-time consumer behavioral data from portable devices. Experiment results confirm that context-aware interaction can greatly enhance consumers' shopping experience in the offline scenario.

Research paper thumbnail of A Web Service Security Governance Approach Based on Dedicated Micro-services

Procedia Computer Science, 2019

Service-oriented architecture (SOA) is known to be characterized by its openness, its agility and... more Service-oriented architecture (SOA) is known to be characterized by its openness, its agility and its composability. Such architecture includes autonomous, interoperable and potentially reusable services, which are implemented as Web Services (WS). When deployed in the Cloud Environment, security threats may increase at the WS level, raising some security challenges, such as vulnerability discovery and trust or availability violation. Addressing security issues require complex tasks that should be treated separately with associated concerns. To deal with this problem, we refer here to an alternative architecture known as Micro-Services Architecture (MSA) which is based on the principle of decomposing large and complex software projects into many atomic sub-projects. In Addition, to control, manager and ensure that vulnerabilities are appropriately treated and the expected security objectives are achieved, we find that the governance of Web Service security is inevitably required. Hence, we suggest here a Web Service security governance approach aims to reduce the security flaws and to enhance trust between web services. This approach consists in combining micro-services by using a subset of GDPR * rules and a set of defined security policies. This approach allows guessing the dedicated micro-service referring to user security requirements. * EU General Data Protection Regulation (GDPR) replaces the Data Protection Directive 95/46/EC and was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy.

Research paper thumbnail of A Conceptual Framework of Security Requirements in Multi-cloud Environment

Lecture Notes in Computer Science, 2018

Nowadays, organizations are increasingly attracted by the benefit of multi-cloud offerings. Howev... more Nowadays, organizations are increasingly attracted by the benefit of multi-cloud offerings. However, they have to adapt their business processes for multi-cloud collaboration and especially to deal with a major security problem. Indeed, the complexity of security due to multiple cloud policies and a variety of security requirements does not guarantee compliance with the security requirements of their business processes. We present our initial research that aims to develop an effective security governance framework for a multi-cloud environment. Our approach is to shed light on the need to integrate security requirements into business processes and to provide a conceptual framework of security requirements including steps and processes for a multi-cloud environment.

Research paper thumbnail of PATRIoT: A Data Sharing Platform for IoT Using a Service-Oriented Approach Based on Blockchain

Lecture Notes in Computer Science, 2020

The Internet of Things has emerged as a paradigm in a variety of application domains where severa... more The Internet of Things has emerged as a paradigm in a variety of application domains where several parties share data to tackle specific tasks. However, these IoT data can be sensitive and the data subject wish not share them with other competitor organizations without retaining some level of control. Thus, a privacy-preserving, user-centric, and transparent solution is needed to deal with the challenges of IoT data sharing, such as the loss of control over the shared data, the trust need in data consumer infrastructure, and the lack of transparency in terms of data handling. Therefore, we propose PATRIoT, a privacy-preserving PlATfoRm for IoT data sharing using a service-oriented approach. The latter is proposed based on the blockchain technology, which enforces privacy requirement compliance according to the General Data Protection Regulation. For validation purposes, we deploy the proposed solution on a private Ethereum blockchain and give the performance evaluation.

Research paper thumbnail of Towards a Secure Database Integration Using SLA in a Multi-cloud Context

The recent emergence of the cloud opens new challenges for data processing and integration. Indee... more The recent emergence of the cloud opens new challenges for data processing and integration. Indeed, unlimited access to cloud resources and the "pay as U go" model change the hypothesis for integrating and processing big data collections. This is accentuated due to cloud provider incentives to attract data providers and let them choose their cloud. In this context data services are deployed on several clouds which make data integration face several heterogeneity problems. This paper proposes a secure-aware data integration (lookup, aggregation, correlation) strategies that can be performed on a multi-cloud environment guided by their respective SLA contracts. The resulting data integration is provided as DaaS (data as a service) with a global SLA that consolidates as much as possible the SLA adopted by every cloud provider. Our data integration approach is being tested for integrating databases used for managing an education program.

Research paper thumbnail of Rhone: A Quality-Based Query Rewriting Algorithm for Data Integration

Communications in computer and information science, 2016

Nowadays, data provision is mostly done by data services. Data integration can be seen as composi... more Nowadays, data provision is mostly done by data services. Data integration can be seen as composition of data services and data processing services that can deal with to integrate data collections. With the advent of cloud, producing service compositions is computationally costly. Furthermore, executing them can require a considerable amount of memory, storage and computing resources that can be provided by clouds. Our research focuses on how to enhance the results on the increase of cost on data integration in the new context of cloud. To do so, we present in this paper our original data integration approach which takes into account user’s integration requirements while producing and delivering the results. The service selection and service composition are guided by the service level agreement - SLA exported by different services (from one or more clouds) and used by our matching algorithm (called Rhone) that addresses the query rewriting for data integration presented here as proof of concept.

Research paper thumbnail of A Meta-model for context-aware adaptive Business Process as a Service in collaborative cloud environment

Procedia Computer Science, 2019

With the emergence of cloud computing, building and developing a new Software by SaaS composition... more With the emergence of cloud computing, building and developing a new Software by SaaS composition becomes a major concern in today's cloud business. First, the business analyst establishes the Business Process (BP) of the new SaaS. Then, the SaaS composer, based on functional and non-functional requirements, discovers and selects the potential SaaS components that can fill into each of the defined tasks in the BP. Currently, enterprises need more and more flexible SaaS business process as an adaptive composite SaaS from process vendors, which interest on context changes and needs evolutions. A meta-model is proposed in this paper dealing with different concepts involved in business cloud layer. This meta-model, in which both business process and service composition are considered, is accompanied by a case study. Then, an ontology has been developed and an extract of instances has been presented to demonstrate the adaptation process.

Research paper thumbnail of Privacy-Aware in the IoT Applications: A Systematic Literature Review

Springer eBooks, 2017

The Internet of Things (IoT) emerged as a paradigm in which smart things collaborate among them a... more The Internet of Things (IoT) emerged as a paradigm in which smart things collaborate among them and with other physical and virtual objects using the Internet in order to perform high level tasks. These things appear in a variety of application domains, including smart grid, health care and smart spaces where several parties share data in order to tackle specific tasks. Data in such domains are rich in sensitive data and data owner-specific habits. Thus, IoT raises concerns about privacy and data protection. This paper reports on a systematic literature review of privacy preserving solutions used in Cooperative Information Systems (CIS) in the IoT field. To do so, and after retrieving scientific productions on the subject, we classify the results according to several facets. In this paper, we consider a subset of them: (i) data life cycle, (ii) privacy preserving techniques and (iii) ISO privacy principles. We combine the facets then express and analyze the results as bubble charts. We analyze the proposed solutions in terms of the techniques they deployed and the privacy principles they covered according to the ISO standard and the data privacy laws and regulations of the European Commission on the Protection of Personal Data. Finally, we identifies recommendations to involve privacy principle coverage and security requirement fulfillment in the IoT applications.

Research paper thumbnail of Towards an End-to-End IoT Data Privacy-Preserving Framework Using Blockchain Technology

Springer eBooks, 2018

Internet of Things-based environments collect and generate huge amounts of data about users, thei... more Internet of Things-based environments collect and generate huge amounts of data about users, their activities, and their surroundings, which can disclose some sensitive information and threaten their privacy. Hence, the user's collected and handled data by IoT-based applications need to be exploited and secured in an appropriate way to protect personal data and user's privacy. Therefore, we aim at improving the data ownership, transparency, and auditability for users. To this end, we propose an end-to-end privacy-preserving framework for the IoT data using blockchain technology. The smart contract use in our framework will hence enforce the privacy requirement compliance according to the user's (i.e., data owner) privacy preferences and end-user's (i.e., data consumer) requests. To do so, we detail the design of the system architecture by introducing its core components and functionalities and highlight through an example of how it operates in a real-world use-case.

Research paper thumbnail of Intelligent integration of heterogeneous data for answering analytics queries in multi-cloud environments

HAL (Le Centre pour la Communication Scientifique Directe), Mar 29, 2022

This position paper discusses the design of an approach to enable trusted data integration in a m... more This position paper discusses the design of an approach to enable trusted data integration in a multi-cloud environment in the presence of heterogeneous and large data sources. This approach is based on mechanisms to compute trust in data and its providers by applying statistical and probabilistic methods on its provenance. The result is a solution expressing analytics queries as services coordination that can be enacted on multi-cloud settings. This paper describes the associated challenges and possible ways of addressing them. The approach and challenges are based on concrete requirements stemming from a medical scenario related to understanding, modelling, and predicting patients' conditions associated with sleep apnoea.

Research paper thumbnail of Towards an adaptive curation services composition based on machine learning

Data curation deals with managing the data by applying different tasks such as extraction, enrich... more Data curation deals with managing the data by applying different tasks such as extraction, enrichment, cleaning to fit the purpose of use. Indeed, nowadays, there is an increasing need to implement such tasks in the big data era to maintain data management. Big data is involved in decision processes to perform analysis, visualization, prediction, etc. Thus, there is a dependency between the generated outcomes and the input data of such a process. Therefore, decision process features (e.g., decision context, user constraints, and requirements) need to be taken into account during the data management process, including the data curation phase. Although the proposed curation approaches in the literature are diverse, most of them are static and do not consider the decision process features. Moreover, most of the proposals are dedicated to curating a specific data source format (e.g., structured/unstructured data source). To overcome these limitations, we propose a new approach ACUSEC (Adaptive CUration SErvice Composition) that ensures adaptive curation services composition by considering different features: the source type, the user constraints and preferences, and the decision context. To do so, we rely on AI and machine learning mechanisms such as reinforcement learning. Following the approach's definition, we conducted experiments that show encouraging results in overall execution time and adaptation to the above features.

Research paper thumbnail of Security Governance in Multi-cloud Environment: A Systematic Mapping Study

Cloud computing has revolutionized delivery of IT solutions increasing economic advantages, robus... more Cloud computing has revolutionized delivery of IT solutions increasing economic advantages, robustness, scalability, elasticity and security. Nowadays to achieve their cloud goals, organizations are increasingly move towards enabling multi-cloud environments which promised to support very large-scale, worldwide, distributed applications using multiple and independent cloud environments. However, given their complexity and distribution, multi-cloud has to face several key challenges around security and governance such as interoperability, portability, provisioning, elasticity, high availability and security. Therefore, these challenges increase the needs of security governance in such environments. Although some researches have been realized in the multi-cloud security domain, it becomes imperative to asses the current state of research and practice of its security governance. This paper aims to categorize the existing works related to security governance in multi-cloud environments by applying a systematic mapping study methodology in order toidentify trends and future directions. Our results prove that multi-clouds security governance seems to be a promising areain multi-cloud research and evaluation.

Research paper thumbnail of A semantic blockchain-based system for drug traceability

International Database Engineered Applications Symposium Conference

Research paper thumbnail of A knowledge-driven service composition framework for wildfire prediction

Research paper thumbnail of A Service-Based Framework for Adaptive Data Curation in Data Lakehouses

Lecture Notes in Computer Science, 2022

Research paper thumbnail of Semantic-based Data Integration and Mapping Maintenance: Application to Drugs Domain

Proceedings of the 17th International Conference on Software Technologies

Research paper thumbnail of A Model-Driven Approach for Semantic Data-as-a-Service Generation

2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)

Nowadays, with the increasing number of data sources, especially in environmental domain, earth o... more Nowadays, with the increasing number of data sources, especially in environmental domain, earth observation programs face major challenges for environmental data exploitation, mainly due to data sources heterogeneity of different types such as access techniques, used protocols, languages, data formats, etc. Although typical solutions abstract from this heterogeneity with a layer of data services, the development of such systems remains tedious in this context. In this paper, we propose an approach based on Model-Driven Engineering (MDE) combined with semantic annotations, to automate data service development on top of data sources. Our work contributes to the development of integrated service-based architectures driven by automatic service generation, data integration from existing environmental systems and automatic service annotations. Our solution, applied to the detection of natural disasters, provides 1) appropriate modelling of data sources and services to apply model-to-text (M2T) transformations, 2) automatic generation of Representational State Transfer (REST) data service code template, 3) automatic generation of semantically annotated Hypermedia-based descriptors of these services. We have implemented and evaluated our solution with a set of real data sources provided by the Sahara and Sahel Observatory (OSS), OpenWeatherMap and CHIRPS. Index Terms-Semantic RESTful Services, Model-Driven-Engineering, Hypermedia Driven APIs.

Research paper thumbnail of A blockchain-based framework for drug traceability

Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing

Research paper thumbnail of PATRIoT: A Data Sharing Platform for IoT Using a Service-Oriented Approach Based on Blockchain

Service-Oriented Computing, 2020

The Internet of Things has emerged as a paradigm in a variety of application domains where severa... more The Internet of Things has emerged as a paradigm in a variety of application domains where several parties share data to tackle specific tasks. However, these IoT data can be sensitive and the data subject wish not share them with other competitor organizations without retaining some level of control. Thus, a privacy-preserving, user-centric, and transparent solution is needed to deal with the challenges of IoT data sharing, such as the loss of control over the shared data, the trust need in data consumer infrastructure, and the lack of transparency in terms of data handling. Therefore, we propose PATRIoT, a privacy-preserving PlATfoRm for IoT data sharing using a service-oriented approach. The latter is proposed based on the blockchain technology, which enforces privacy requirement compliance according to the General Data Protection Regulation. For validation purposes, we deploy the proposed solution on a private Ethereum blockchain and give the performance evaluation.

Research paper thumbnail of Foreword — Message from the general chairs

AICCSA 2016 Conference, in collaboration with IEEE, continues its mission of covering all contemp... more AICCSA 2016 Conference, in collaboration with IEEE, continues its mission of covering all contemporary areas in computer systems and applications, and providing the latest results on theory, design, analysis, implementation, and application in these important and rapidly changing disciplines. Indeed, this edition addresses eleven areas and the technical program presents high-quality papers in: (1) IR, Big Data, Business Intelligence, & Knowledge Management; (2) Cloud, Parallel, Distributed, and High Performance Computing; (3) Multimedia, Computer Vision, and Image Processing; (4) Advances in Software Engineering; (5) Natural Language Processing and Applications; (6) Advances in AI, Agent Systems, and Ambient Intelligence; (7) Advances Networking and Sensor Networks; (8) Systems and Software Security; (9) Social and Mobile Computing; (10) Advances in Web Technologies, Semantics, and Future Internet; (11) Digital Living, including E-Learning, E-Government, E-Health. The breadth of the prominence of approaches in these areas is underlined by the topics of the four distinguished keynote speakers: Ahmed Elmagarmid and Jim Jansen, the Executive Director and senior research of Qatar Computing Research Institute (QCRI) respectively; Athman Bouguettaya, professor and the head of School of Computer Science and Information Technology at RMIT University; and Abdella Battou, the Division Chief of the Advanced Network Technologies Division, within The Information Technology Lab at National Institute of Standards and Technology (NIST).

Research paper thumbnail of Adapted Decision Support Service Based on the Prediction of Offline Consumers' Real-Time Intention and Devices Interactions

Due to the specificity of the omni-channel retailing scenario, consumers in a brick and mortar st... more Due to the specificity of the omni-channel retailing scenario, consumers in a brick and mortar store have a merging need for various decision support services to enhance their shopping experience. To survive the fierce competition in the retail world, firms need to predict which services are relevant to their customers and when to offer these services. To address this challenge, we propose a context-aware approach to collect, analyze, and interpret real-time consumer behavioral data from portable devices. Experiment results confirm that context-aware interaction can greatly enhance consumers' shopping experience in the offline scenario.

Research paper thumbnail of A Web Service Security Governance Approach Based on Dedicated Micro-services

Procedia Computer Science, 2019

Service-oriented architecture (SOA) is known to be characterized by its openness, its agility and... more Service-oriented architecture (SOA) is known to be characterized by its openness, its agility and its composability. Such architecture includes autonomous, interoperable and potentially reusable services, which are implemented as Web Services (WS). When deployed in the Cloud Environment, security threats may increase at the WS level, raising some security challenges, such as vulnerability discovery and trust or availability violation. Addressing security issues require complex tasks that should be treated separately with associated concerns. To deal with this problem, we refer here to an alternative architecture known as Micro-Services Architecture (MSA) which is based on the principle of decomposing large and complex software projects into many atomic sub-projects. In Addition, to control, manager and ensure that vulnerabilities are appropriately treated and the expected security objectives are achieved, we find that the governance of Web Service security is inevitably required. Hence, we suggest here a Web Service security governance approach aims to reduce the security flaws and to enhance trust between web services. This approach consists in combining micro-services by using a subset of GDPR * rules and a set of defined security policies. This approach allows guessing the dedicated micro-service referring to user security requirements. * EU General Data Protection Regulation (GDPR) replaces the Data Protection Directive 95/46/EC and was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy.

Research paper thumbnail of A Conceptual Framework of Security Requirements in Multi-cloud Environment

Lecture Notes in Computer Science, 2018

Nowadays, organizations are increasingly attracted by the benefit of multi-cloud offerings. Howev... more Nowadays, organizations are increasingly attracted by the benefit of multi-cloud offerings. However, they have to adapt their business processes for multi-cloud collaboration and especially to deal with a major security problem. Indeed, the complexity of security due to multiple cloud policies and a variety of security requirements does not guarantee compliance with the security requirements of their business processes. We present our initial research that aims to develop an effective security governance framework for a multi-cloud environment. Our approach is to shed light on the need to integrate security requirements into business processes and to provide a conceptual framework of security requirements including steps and processes for a multi-cloud environment.

Research paper thumbnail of PATRIoT: A Data Sharing Platform for IoT Using a Service-Oriented Approach Based on Blockchain

Lecture Notes in Computer Science, 2020

The Internet of Things has emerged as a paradigm in a variety of application domains where severa... more The Internet of Things has emerged as a paradigm in a variety of application domains where several parties share data to tackle specific tasks. However, these IoT data can be sensitive and the data subject wish not share them with other competitor organizations without retaining some level of control. Thus, a privacy-preserving, user-centric, and transparent solution is needed to deal with the challenges of IoT data sharing, such as the loss of control over the shared data, the trust need in data consumer infrastructure, and the lack of transparency in terms of data handling. Therefore, we propose PATRIoT, a privacy-preserving PlATfoRm for IoT data sharing using a service-oriented approach. The latter is proposed based on the blockchain technology, which enforces privacy requirement compliance according to the General Data Protection Regulation. For validation purposes, we deploy the proposed solution on a private Ethereum blockchain and give the performance evaluation.

Research paper thumbnail of Towards a Secure Database Integration Using SLA in a Multi-cloud Context

The recent emergence of the cloud opens new challenges for data processing and integration. Indee... more The recent emergence of the cloud opens new challenges for data processing and integration. Indeed, unlimited access to cloud resources and the "pay as U go" model change the hypothesis for integrating and processing big data collections. This is accentuated due to cloud provider incentives to attract data providers and let them choose their cloud. In this context data services are deployed on several clouds which make data integration face several heterogeneity problems. This paper proposes a secure-aware data integration (lookup, aggregation, correlation) strategies that can be performed on a multi-cloud environment guided by their respective SLA contracts. The resulting data integration is provided as DaaS (data as a service) with a global SLA that consolidates as much as possible the SLA adopted by every cloud provider. Our data integration approach is being tested for integrating databases used for managing an education program.

Research paper thumbnail of Rhone: A Quality-Based Query Rewriting Algorithm for Data Integration

Communications in computer and information science, 2016

Nowadays, data provision is mostly done by data services. Data integration can be seen as composi... more Nowadays, data provision is mostly done by data services. Data integration can be seen as composition of data services and data processing services that can deal with to integrate data collections. With the advent of cloud, producing service compositions is computationally costly. Furthermore, executing them can require a considerable amount of memory, storage and computing resources that can be provided by clouds. Our research focuses on how to enhance the results on the increase of cost on data integration in the new context of cloud. To do so, we present in this paper our original data integration approach which takes into account user’s integration requirements while producing and delivering the results. The service selection and service composition are guided by the service level agreement - SLA exported by different services (from one or more clouds) and used by our matching algorithm (called Rhone) that addresses the query rewriting for data integration presented here as proof of concept.

Research paper thumbnail of A Meta-model for context-aware adaptive Business Process as a Service in collaborative cloud environment

Procedia Computer Science, 2019

With the emergence of cloud computing, building and developing a new Software by SaaS composition... more With the emergence of cloud computing, building and developing a new Software by SaaS composition becomes a major concern in today's cloud business. First, the business analyst establishes the Business Process (BP) of the new SaaS. Then, the SaaS composer, based on functional and non-functional requirements, discovers and selects the potential SaaS components that can fill into each of the defined tasks in the BP. Currently, enterprises need more and more flexible SaaS business process as an adaptive composite SaaS from process vendors, which interest on context changes and needs evolutions. A meta-model is proposed in this paper dealing with different concepts involved in business cloud layer. This meta-model, in which both business process and service composition are considered, is accompanied by a case study. Then, an ontology has been developed and an extract of instances has been presented to demonstrate the adaptation process.

Research paper thumbnail of Privacy-Aware in the IoT Applications: A Systematic Literature Review

Springer eBooks, 2017

The Internet of Things (IoT) emerged as a paradigm in which smart things collaborate among them a... more The Internet of Things (IoT) emerged as a paradigm in which smart things collaborate among them and with other physical and virtual objects using the Internet in order to perform high level tasks. These things appear in a variety of application domains, including smart grid, health care and smart spaces where several parties share data in order to tackle specific tasks. Data in such domains are rich in sensitive data and data owner-specific habits. Thus, IoT raises concerns about privacy and data protection. This paper reports on a systematic literature review of privacy preserving solutions used in Cooperative Information Systems (CIS) in the IoT field. To do so, and after retrieving scientific productions on the subject, we classify the results according to several facets. In this paper, we consider a subset of them: (i) data life cycle, (ii) privacy preserving techniques and (iii) ISO privacy principles. We combine the facets then express and analyze the results as bubble charts. We analyze the proposed solutions in terms of the techniques they deployed and the privacy principles they covered according to the ISO standard and the data privacy laws and regulations of the European Commission on the Protection of Personal Data. Finally, we identifies recommendations to involve privacy principle coverage and security requirement fulfillment in the IoT applications.

Research paper thumbnail of Towards an End-to-End IoT Data Privacy-Preserving Framework Using Blockchain Technology

Springer eBooks, 2018

Internet of Things-based environments collect and generate huge amounts of data about users, thei... more Internet of Things-based environments collect and generate huge amounts of data about users, their activities, and their surroundings, which can disclose some sensitive information and threaten their privacy. Hence, the user's collected and handled data by IoT-based applications need to be exploited and secured in an appropriate way to protect personal data and user's privacy. Therefore, we aim at improving the data ownership, transparency, and auditability for users. To this end, we propose an end-to-end privacy-preserving framework for the IoT data using blockchain technology. The smart contract use in our framework will hence enforce the privacy requirement compliance according to the user's (i.e., data owner) privacy preferences and end-user's (i.e., data consumer) requests. To do so, we detail the design of the system architecture by introducing its core components and functionalities and highlight through an example of how it operates in a real-world use-case.

Research paper thumbnail of Intelligent integration of heterogeneous data for answering analytics queries in multi-cloud environments

HAL (Le Centre pour la Communication Scientifique Directe), Mar 29, 2022

This position paper discusses the design of an approach to enable trusted data integration in a m... more This position paper discusses the design of an approach to enable trusted data integration in a multi-cloud environment in the presence of heterogeneous and large data sources. This approach is based on mechanisms to compute trust in data and its providers by applying statistical and probabilistic methods on its provenance. The result is a solution expressing analytics queries as services coordination that can be enacted on multi-cloud settings. This paper describes the associated challenges and possible ways of addressing them. The approach and challenges are based on concrete requirements stemming from a medical scenario related to understanding, modelling, and predicting patients' conditions associated with sleep apnoea.

Research paper thumbnail of Towards an adaptive curation services composition based on machine learning

Data curation deals with managing the data by applying different tasks such as extraction, enrich... more Data curation deals with managing the data by applying different tasks such as extraction, enrichment, cleaning to fit the purpose of use. Indeed, nowadays, there is an increasing need to implement such tasks in the big data era to maintain data management. Big data is involved in decision processes to perform analysis, visualization, prediction, etc. Thus, there is a dependency between the generated outcomes and the input data of such a process. Therefore, decision process features (e.g., decision context, user constraints, and requirements) need to be taken into account during the data management process, including the data curation phase. Although the proposed curation approaches in the literature are diverse, most of them are static and do not consider the decision process features. Moreover, most of the proposals are dedicated to curating a specific data source format (e.g., structured/unstructured data source). To overcome these limitations, we propose a new approach ACUSEC (Adaptive CUration SErvice Composition) that ensures adaptive curation services composition by considering different features: the source type, the user constraints and preferences, and the decision context. To do so, we rely on AI and machine learning mechanisms such as reinforcement learning. Following the approach's definition, we conducted experiments that show encouraging results in overall execution time and adaptation to the above features.

Research paper thumbnail of Security Governance in Multi-cloud Environment: A Systematic Mapping Study

Cloud computing has revolutionized delivery of IT solutions increasing economic advantages, robus... more Cloud computing has revolutionized delivery of IT solutions increasing economic advantages, robustness, scalability, elasticity and security. Nowadays to achieve their cloud goals, organizations are increasingly move towards enabling multi-cloud environments which promised to support very large-scale, worldwide, distributed applications using multiple and independent cloud environments. However, given their complexity and distribution, multi-cloud has to face several key challenges around security and governance such as interoperability, portability, provisioning, elasticity, high availability and security. Therefore, these challenges increase the needs of security governance in such environments. Although some researches have been realized in the multi-cloud security domain, it becomes imperative to asses the current state of research and practice of its security governance. This paper aims to categorize the existing works related to security governance in multi-cloud environments by applying a systematic mapping study methodology in order toidentify trends and future directions. Our results prove that multi-clouds security governance seems to be a promising areain multi-cloud research and evaluation.

Research paper thumbnail of A semantic blockchain-based system for drug traceability

International Database Engineered Applications Symposium Conference

Research paper thumbnail of A knowledge-driven service composition framework for wildfire prediction

Research paper thumbnail of A Service-Based Framework for Adaptive Data Curation in Data Lakehouses

Lecture Notes in Computer Science, 2022

Research paper thumbnail of Semantic-based Data Integration and Mapping Maintenance: Application to Drugs Domain

Proceedings of the 17th International Conference on Software Technologies

Research paper thumbnail of A Model-Driven Approach for Semantic Data-as-a-Service Generation

2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)

Nowadays, with the increasing number of data sources, especially in environmental domain, earth o... more Nowadays, with the increasing number of data sources, especially in environmental domain, earth observation programs face major challenges for environmental data exploitation, mainly due to data sources heterogeneity of different types such as access techniques, used protocols, languages, data formats, etc. Although typical solutions abstract from this heterogeneity with a layer of data services, the development of such systems remains tedious in this context. In this paper, we propose an approach based on Model-Driven Engineering (MDE) combined with semantic annotations, to automate data service development on top of data sources. Our work contributes to the development of integrated service-based architectures driven by automatic service generation, data integration from existing environmental systems and automatic service annotations. Our solution, applied to the detection of natural disasters, provides 1) appropriate modelling of data sources and services to apply model-to-text (M2T) transformations, 2) automatic generation of Representational State Transfer (REST) data service code template, 3) automatic generation of semantically annotated Hypermedia-based descriptors of these services. We have implemented and evaluated our solution with a set of real data sources provided by the Sahara and Sahel Observatory (OSS), OpenWeatherMap and CHIRPS. Index Terms-Semantic RESTful Services, Model-Driven-Engineering, Hypermedia Driven APIs.

Research paper thumbnail of A blockchain-based framework for drug traceability

Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing

Research paper thumbnail of PATRIoT: A Data Sharing Platform for IoT Using a Service-Oriented Approach Based on Blockchain

Service-Oriented Computing, 2020

The Internet of Things has emerged as a paradigm in a variety of application domains where severa... more The Internet of Things has emerged as a paradigm in a variety of application domains where several parties share data to tackle specific tasks. However, these IoT data can be sensitive and the data subject wish not share them with other competitor organizations without retaining some level of control. Thus, a privacy-preserving, user-centric, and transparent solution is needed to deal with the challenges of IoT data sharing, such as the loss of control over the shared data, the trust need in data consumer infrastructure, and the lack of transparency in terms of data handling. Therefore, we propose PATRIoT, a privacy-preserving PlATfoRm for IoT data sharing using a service-oriented approach. The latter is proposed based on the blockchain technology, which enforces privacy requirement compliance according to the General Data Protection Regulation. For validation purposes, we deploy the proposed solution on a private Ethereum blockchain and give the performance evaluation.