\n \n \n \n\n\n
\n
\n\n \n \n \n \n \n An Overview on Data Security in Cloud Computing.\n \n \n \n\n\n \n Kacha, L.; and Zitouni, A.\n\n\n \n\n\n\n In pages 250–261. 2017.\n
Section: Type: inbook\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@incollection{kacha_overview_2017,\n\ttitle = {An {Overview} on {Data} {Security} in {Cloud} {Computing}},\n\tauthor = {Kacha, Lynda and Zitouni, Abdelhafid},\n\tyear = {2017},\n\tnote = {Section: \nType: inbook},\n\tpages = {250--261},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Advances in Intelligent Systems and Computing.\n \n \n \n\n\n \n Arki, O.; and Zitouni, A.\n\n\n \n\n\n\n In volume 662, pages 62–73. 2017.\n
Section: A Security Framework for Cloud Data Storage (CDS) Based on Agent Type: inbook\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@incollection{arki_advances_2017,\n\ttitle = {Advances in {Intelligent} {Systems} and {Computing}},\n\tvolume = {662},\n\tauthor = {Arki, Oussama and Zitouni, Abdelhafid},\n\tyear = {2017},\n\tnote = {Section: A Security Framework for Cloud Data Storage (CDS) Based on Agent\nType: inbook},\n\tpages = {62--73},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n ARAACOM: Arabic Algerian corpus for opinion mining.\n \n \n \n\n\n \n Rahab, H.; Zitouni, A.; and Djoudi, M.\n\n\n \n\n\n\n In
ACM International Conference Proceeding Series, volume Part F1306, pages 1–5, 2017. \n
Type: inproceedings\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{rahab_araacom_2017,\n\ttitle = {{ARAACOM}: {Arabic} {Algerian} corpus for opinion mining},\n\tvolume = {Part F1306},\n\tabstract = {© 2017 Association for Computing Machinery. Nowadays, it is no more needed to do an enormous effort to distribute a lot of forms to thousands of people and collect them, then convert this from into electronic format to track people opinion about some subjects. A lot of web sites can today reach a large spectrum with less effort. The majority of web sites suggest to their visitors to leave backups about their feeling of the site or events. So, this makes for us a lot of data which need powerful mean to exploit. Opinion mining in the web becomes more and more an attracting task, due the increasing need for individuals and societies to track the mood of people against several subjects of daily life (sports, politics, television,...). A lot of works in opinion mining was developed in western languages especially English, such works in Arabic language still very scarce. In this paper, we propose our approach, for opinion mining in Arabic Algerian news paper.},\n\tbooktitle = {{ACM} {International} {Conference} {Proceeding} {Series}},\n\tauthor = {Rahab, Hichem and Zitouni, Abdelhafid and Djoudi, Mahieddine},\n\tyear = {2017},\n\tnote = {Type: inproceedings},\n\tkeywords = {Arabic comments, Machine learning, Natural language processing, Newspaper, Opinion mining, Sentiment analysis},\n\tpages = {1--5},\n}\n\n
\n
\n\n\n
\n © 2017 Association for Computing Machinery. Nowadays, it is no more needed to do an enormous effort to distribute a lot of forms to thousands of people and collect them, then convert this from into electronic format to track people opinion about some subjects. A lot of web sites can today reach a large spectrum with less effort. The majority of web sites suggest to their visitors to leave backups about their feeling of the site or events. So, this makes for us a lot of data which need powerful mean to exploit. Opinion mining in the web becomes more and more an attracting task, due the increasing need for individuals and societies to track the mood of people against several subjects of daily life (sports, politics, television,...). A lot of works in opinion mining was developed in western languages especially English, such works in Arabic language still very scarce. In this paper, we propose our approach, for opinion mining in Arabic Algerian news paper.\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n A Two-Tiers Framework for Cloud Data Storage (CDS) Security Based on Agent.\n \n \n \n\n\n \n Arki, O.; and Zitouni, A.\n\n\n \n\n\n\n In
Interactive Mobile Communication, Technologies and Learning, pages 814–823, 2017. Springer\n
Type: inproceedings\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{arki_two-tiers_2017,\n\ttitle = {A {Two}-{Tiers} {Framework} for {Cloud} {Data} {Storage} ({CDS}) {Security} {Based} on {Agent}},\n\tbooktitle = {Interactive {Mobile} {Communication}, {Technologies} and {Learning}},\n\tpublisher = {Springer},\n\tauthor = {Arki, Oussama and Zitouni, Abdelhafid},\n\tyear = {2017},\n\tnote = {Type: inproceedings},\n\tpages = {814--823},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n A New Framework of Authentication Over Cloud Computing.\n \n \n \n\n\n \n Megouache, L.; Zitouni, A.; and Djoudi, M.\n\n\n \n\n\n\n In
Silhavy R., Silhavy P., Prokopova Z. (eds) Cybernetics Approaches in Intelligent Systems. CoMeSySo 2017. Advances in Intelligent Systems and Computing, vol 661. Springer, Cham, pages 262–270, 2017. \n
Type: inproceedings\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{megouache_new_2017,\n\ttitle = {A {New} {Framework} of {Authentication} {Over} {Cloud} {Computing}},\n\tbooktitle = {Silhavy {R}., {Silhavy} {P}., {Prokopova} {Z}. (eds) {Cybernetics} {Approaches} in {Intelligent} {Systems}. {CoMeSySo} 2017. {Advances} in {Intelligent} {Systems} and {Computing}, vol 661. {Springer}, {Cham}},\n\tauthor = {Megouache, Leila and Zitouni, Abdelhafid and Djoudi, Mahieddine},\n\tyear = {2017},\n\tnote = {Type: inproceedings},\n\tpages = {262--270},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Applied Computational Intelligence and Mathematical Methods: Computational Methods in Systems and Software 2017, vol. 2.\n \n \n \n\n\n \n Bouaita, R.; Zitouni, A.; and Maamri, R.\n\n\n \n\n\n\n In Silhavy, R.; Silhavy, P.; and Prokopova, Z., editor(s), pages 50–61. Springer International Publishing, 2017.\n
Section: An Autonomous Architecture for Managing Vertical Elasticity in the IaaS Cloud Using Memory Over-Subscription Type: inbook\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@incollection{bouaita_applied_2017,\n\ttitle = {Applied {Computational} {Intelligence} and {Mathematical} {Methods}: {Computational} {Methods} in {Systems} and {Software} 2017, vol. 2},\n\tabstract = {Elasticity is one of the essential properties in Cloud Computing that meets changeable needs of customers, and improves resource utilization for providers. In this context, oversubscription is a very powerful technique to increase resource utilization level as much as possible, which leads to a maximization of the profit of cloud providers. In this paper, we propose an autonomous architecture based on the MAPE-K control loop and using memory oversubscription to improve operating performance in a cloud infrastructure. The overload caused by oversubscription is mitigated by the live migration technique of VMs as well as the use of the network memory of the various physical machines of the cluster through the network. This latter technique is usually used as a replacement technique for the swapping disc as it has more performance.},\n\tpublisher = {Springer International Publishing},\n\tauthor = {Bouaita, Riad and Zitouni, Abdelhafid and Maamri, Ramdane},\n\teditor = {Silhavy, Radek and Silhavy, Petr and Prokopova, Zdenka},\n\tyear = {2017},\n\tnote = {Section: An Autonomous Architecture for Managing Vertical Elasticity in the IaaS Cloud Using Memory Over-Subscription\nType: inbook},\n\tpages = {50--61},\n}\n\n
\n
\n\n\n
\n Elasticity is one of the essential properties in Cloud Computing that meets changeable needs of customers, and improves resource utilization for providers. In this context, oversubscription is a very powerful technique to increase resource utilization level as much as possible, which leads to a maximization of the profit of cloud providers. In this paper, we propose an autonomous architecture based on the MAPE-K control loop and using memory oversubscription to improve operating performance in a cloud infrastructure. The overload caused by oversubscription is mitigated by the live migration technique of VMs as well as the use of the network memory of the various physical machines of the cluster through the network. This latter technique is usually used as a replacement technique for the swapping disc as it has more performance.\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Software Engineering Trends and Techniques in Intelligent Systems: Proceedings of the 6th Computer Science On-line Conference 2017 (CSOC2017), Vol 3.\n \n \n \n\n\n \n Beldjezzar, L.; Zitouni, A.; and Djoudi, M.\n\n\n \n\n\n\n In Silhavy, R.; Silhavy, P.; Prokopova, Z.; Senkerik, R.; and Kominkova Oplatkova, Z., editor(s), pages 44–52. Springer International Publishing, 2017.\n
Section: New Framework Model to Secure Cloud Data Storage Type: inbook\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@incollection{beldjezzar_software_2017,\n\ttitle = {Software {Engineering} {Trends} and {Techniques} in {Intelligent} {Systems}: {Proceedings} of the 6th {Computer} {Science} {On}-line {Conference} 2017 ({CSOC2017}), {Vol} 3},\n\tabstract = {Nowadays companies are increasingly adopting the technology of cloud computing. This technology is subject to a lot of research and continuous advances are made. The use of cloud computing in the companies advantages such as: reducing costs, sharing and exchange of information between institutions, but the data in the Cloud computing are susceptible to be compromised and the companies are exposing to see their data loss. In this study, we address the subject of security in cloud computing; we expose and discuss some researches that had been proposed to secure the data stored in the cloud. And then we will present our new frameworks that ensure confidentiality of data storage in the cloud environment.},\n\tpublisher = {Springer International Publishing},\n\tauthor = {Beldjezzar, Leila and Zitouni, Abdelhafid and Djoudi, Mahieddine},\n\teditor = {Silhavy, Radek and Silhavy, Petr and Prokopova, Zdenka and Senkerik, Roman and Kominkova Oplatkova, Zuzana},\n\tyear = {2017},\n\tnote = {Section: New Framework Model to Secure Cloud Data Storage\nType: inbook},\n\tpages = {44--52},\n}\n\n
\n
\n\n\n
\n Nowadays companies are increasingly adopting the technology of cloud computing. This technology is subject to a lot of research and continuous advances are made. The use of cloud computing in the companies advantages such as: reducing costs, sharing and exchange of information between institutions, but the data in the Cloud computing are susceptible to be compromised and the companies are exposing to see their data loss. In this study, we address the subject of security in cloud computing; we expose and discuss some researches that had been proposed to secure the data stored in the cloud. And then we will present our new frameworks that ensure confidentiality of data storage in the cloud environment.\n
\n\n\n
\n\n\n\n\n\n