Papers by Bilel Zaghdoudi

International Journal of Wireless and Mobile Computing, 2016
Ad hoc mobile clouds would be suitable for spontaneous ad hoc networks created in situations wher... more Ad hoc mobile clouds would be suitable for spontaneous ad hoc networks created in situations where the mobile infrastructures are very pervasive and where the interconnection to an infrastructure network is very costly. The advantages of ad hoc mobile clouds are ubiquity, affordability, availability and spontaneity. The provision of an reliable ad hoc MCC framework has to cope with the specific features of spontaneous networks such as the dynamic topology and the scarcity of mobile device resources. The goal of this paper is to propose a protocol handling the setting up and the management of an ad hoc MCC over mobile ad hoc networks. We show by simulations that our proposal has acceptable overhead and energy consumption especially for small networks. The originality of this work consists in providing seamless communication services to mobile cloud frameworks regarding the underlying ad hoc network technology.
Lecture Notes in Computer Science, 2016
The goal of this paper is to propose an approach based on DHT toward access control for ad hoc MC... more The goal of this paper is to propose an approach based on DHT toward access control for ad hoc MCC and Fog computing. We rely on Chord DHTs to create a scalable, generic and robust access control solution. We use simulations to evaluate the performances of the proposal. We focus on a set of metrics to measure the overhead of the system. We considered a variable network size, a variable responsible nodes percentage and different hash function as simulation parameter. The obtained results show acceptable overhead for relatively average networks sizes. Simulations show that all the metrics increase with the nodes number and the number of responsible nodes.
2023 International Wireless Communications and Mobile Computing (IWCMC)
Annales Des Télécommunications, Jul 6, 2016
Access control systems are often seen as the most effective tool to address the security challeng... more Access control systems are often seen as the most effective tool to address the security challenges faced by cloud computing. Most of the proposed approaches are designed for specific application domains or service models. The goal of this paper is to propose a generic access control system for the cloud that is applicable to the different cloud service models. We rely on Kerberos as well as access control lists and authorization tickets for the implementation of access control and no replay. We use CloudSim to evaluate our proposal and show that it has an acceptable overhead. We also show that the architecture's elasticity has no significant impact on the access time. To prove its feasibility, we implemented the proposed solution over an Openstack cloud platform integrated within Kerberos.
Cryptology and Network Security, 2016
The goal of this paper is to propose an approach based on DHT toward access control for ad hoc MC... more The goal of this paper is to propose an approach based on DHT toward access control for ad hoc MCC and Fog computing. We rely on Chord DHTs to create a scalable, generic and robust access control solution. We use simulations to evaluate the performances of the proposal. We focus on a set of metrics to measure the overhead of the system. We considered a variable network size, a variable responsible nodes percentage and different hash function as simulation parameter. The obtained results show acceptable overhead for relatively average networks sizes. Simulations show that all the metrics increase with the nodes number and the number of responsible nodes.

2016 Cloudification of the Internet of Things (CIoT), 2016
Ad hoc mobile clouds would be suitable for spontaneous ad hoc networks created in situations wher... more Ad hoc mobile clouds would be suitable for spontaneous ad hoc networks created in situations where the mobile infrastructures are very pervasive and where the interconnection to an infrastructure network is very costly. The advantages of ad hoc mobile clouds are ubiquity, affordability, availability and spontaneity. The provision of an reliable ad hoc MCC framework has to cope with the specific features of spontaneous networks such as the dynamic topology and the scarcity of mobile device resources. The goal of this paper is to propose a protocol handling the setting up and the management of an ad hoc MCC over mobile ad hoc networks. We show by simulations that our proposal has acceptable overhead and energy consumption especially for small networks. The originality of this work consists in providing seamless communication services to mobile cloud frameworks regarding the underlying ad hoc network technology.

International Journal of Wireless and Mobile Computing, 2016
Ad hoc mobile clouds would be suitable for spontaneous ad hoc networks created in situations wher... more Ad hoc mobile clouds would be suitable for spontaneous ad hoc networks created in situations where the mobile infrastructures are very pervasive and where the interconnection to an infrastructure network is very costly. The advantages of ad hoc mobile clouds are ubiquity, affordability, availability and spontaneity. The provision of an reliable ad hoc MCC framework has to cope with the specific features of spontaneous networks such as the dynamic topology and the scarcity of mobile device resources. The goal of this paper is to propose a protocol handling the setting up and the management of an ad hoc MCC over mobile ad hoc networks. We show by simulations that our proposal has acceptable overhead and energy consumption especially for small networks. The originality of this work consists in providing seamless communication services to mobile cloud frameworks regarding the underlying ad hoc network technology.
Annals of Telecommunications, 2016
Access control systems are often seen as the most effective tool to address the security challeng... more Access control systems are often seen as the most effective tool to address the security challenges faced by cloud computing. Most of the proposed approaches are designed for specific application domains or service models. The goal of this paper is to propose a generic access control system for the cloud that is applicable to the different cloud service models. We rely on Kerberos as well as access control lists and authorization tickets for the implementation of access control and no replay. We use CloudSim to evaluate our proposal and show that it has an acceptable overhead. We also show that the architecture's elasticity has no significant impact on the access time. To prove its feasibility, we implemented the proposed solution over an Openstack cloud platform integrated within Kerberos.

Procedia Computer Science, 2015
Mobile and wireless networks permit to widen traditional internet applications to this kind of ne... more Mobile and wireless networks permit to widen traditional internet applications to this kind of networks. Furthermore, with the dramatic increase in their capabilities, mobile devices are becoming one of the main processing devices for users. However, they still lack resources compared to traditional processing devices. Integration between mobile devices over mobile ad hoc networks and Cloud computing is addressed in various studies. The goal of this paper is to propose a protocol for the deployment of an ad hoc mobile cloud over MANETs. This scenario has multiple advantages such as ubiquity, availability, affordability, opportunity and spontaneity. The proposed system is composed of two types of nodes: Providers and Customers. A group of nodes with sufficient resources (Providers) collaborate to set up an IAAS like cloud and provides their services to a set of nodes (Customers) requesting resources. The protocol permits a dynamic management of provider and customer nodes.
2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN), 2021
Uploads
Papers by Bilel Zaghdoudi