Tesis sobre el tema "Stockage sécurisé"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 29 mejores tesis para su investigación sobre el tema "Stockage sécurisé".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Ton, That Dai Hai. "Gestion efficace et partage sécurisé des traces de mobilité". Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLV003/document.
Texto completoNowadays, the advances in the development of mobile devices, as well as embedded sensors have permitted an unprecedented number of services to the user. At the same time, most mobile devices generate, store and communicate a large amount of personal information continuously. While managing personal information on the mobile devices is still a big challenge, sharing and accessing these information in a safe and secure way is always an open and hot topic. Personal mobile devices may have various form factors such as mobile phones, smart devices, stick computers, secure tokens or etc. It could be used to record, sense, store data of user's context or environment surrounding him. The most common contextual information is user's location. Personal data generated and stored on these devices is valuable for many applications or services to user, but it is sensitive and needs to be protected in order to ensure the individual privacy. In particular, most mobile applications have access to accurate and real-time location information, raising serious privacy concerns for their users.In this dissertation, we dedicate the two parts to manage the location traces, i.e. the spatio-temporal data on mobile devices. In particular, we offer an extension of spatio-temporal data types and operators for embedded environments. These data types reconcile the features of spatio-temporal data with the embedded requirements by offering an optimal data presentation called Spatio-temporal object (STOB) dedicated for embedded devices. More importantly, in order to optimize the query processing, we also propose an efficient indexing technique for spatio-temporal data called TRIFL designed for flash storage. TRIFL stands for TRajectory Index for Flash memory. It exploits unique properties of trajectory insertion, and optimizes the data structure for the behavior of flash and the buffer cache. These ideas allow TRIFL to archive much better performance in both Flash and magnetic storage compared to its competitors.Additionally, we also investigate the protect user's sensitive information in the remaining part of this thesis by offering a privacy-aware protocol for participatory sensing applications called PAMPAS. PAMPAS relies on secure hardware solutions and proposes a user-centric privacy-aware protocol that fully protects personal data while taking advantage of distributed computing. For this to be done, we also propose a partitioning algorithm an aggregate algorithm in PAMPAS. This combination drastically reduces the overall costs making it possible to run the protocol in near real-time at a large scale of participants, without any personal information leakage
Vasilopoulos, Dimitrios. "Reconciling cloud storage functionalities with security : proofs of storage with data reliability and secure deduplication". Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS399.
Texto completoIn this thesis we study in depth the problem of verifiability in cloud storage systems. We study Proofs of Storage -a family of cryptographic protocols that enable a cloud storage provider to prove to a user that the integrity of her data has not been compromised- and we identify their limitations with respect to two key characteristics of cloud storage systems, namely, reliable data storage with automatic maintenance and data deduplication. To cope with the first characteristic, we introduce the notion of Proofs of Data Reliability, a comprehensive verification scheme that aims to resolve the conflict between reliable data storage verification and automatic maintenance. We further propose two Proofs of Data Reliability schemes, namely POROS and PORTOS, that succeed in verifying reliable data storage and, at the same time, enable the cloud storage provider to autonomously perform automatic maintenance operations. As regards to the second characteristic, we address the conflict between Proofs of Storage and deduplication. More precisely, inspired by previous attempts in solving the problem of deduplicating encrypted data, we propose message-locked PoR, a solution that combines Proofs of Storage with deduplication. In addition, we propose a novel message-locked key generation protocol which is more resilient against off-line dictionary attacks compared to existing solutions
Qiu, Han. "Une architecture de protection des données efficace basée sur la fragmentation et le cryptage". Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0049.
Texto completoIn this thesis, a completely revisited data protection scheme based on selective encryption is presented. First, this new scheme is agnostic in term of data format, second it has a parallel architecture using GPGPU allowing performance to be at least comparable to full encryption algorithms. Bitmap, as a special uncompressed multimedia format, is addressed as a first use case. Discrete Cosine Transform (DCT) is the first transformation for splitting fragments, getting data protection, and storing data separately on local device and cloud servers. This work has largely improved the previous published ones for bitmap protection by providing new designs and practical experimentations. General purpose graphic processing unit (GPGPU) is exploited as an accelerator to guarantee the efficiency of the calculation compared with traditional full encryption algorithms. Then, an agnostic selective encryption based on lossless Discrete Wavelet Transform (DWT) is presented. This design, with practical experimentations on different hardware configurations, provides strong level of protection and good performance at the same time plus flexible storage dispersion schemes. Therefore, our agnostic data protection and transmission solution combining fragmentation, encryption, and dispersion is made available for a wide range of end-user applications. Also a complete set of security analysis are deployed to test the level of provided protection
Jemel, Mayssa. "Stockage des données locales : sécurité et disponibilité". Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0053.
Texto completoDue to technological advancements, people are constantly manipulating multiple connected and smart devices in their daily lives. Cross-device data management, therefore, remains the concern of several academic and industrial studies. The proposed frameworks are mainly based on proprietary solutions called private or closed solutions. This strategy has shown its deficiency on security issues, cost, developer support and customization. In recent years, however, the Web has faced a revolution in developing standardized solutions triggered by the significant improvements of HTML5. With this new version, innovative features and APIs are introduced to follow business and user requirements. The main purpose is to provide the web developer with a vendor-neutral language that enables the implementation of competing application with lower cost. These applications are related neither to the used devices nor to the installed software. The main motivation of this PhD thesis is to migrate towards the adoption of standardized solutions to ensure secure and reliable cross-device data management in both the client and server side. There is already a proposed standardized Cloud Digital Safe on the server side storage that follows the AFNOR specification while there is no standardized solution yet on the client-side. This thesis is focused on two main areas : 1) the proposal of a standardized Client Digital Safe where user data are stored locally and 2) the synchronization of these data between the Client and the Cloud Digital Safe and between the different user devices. We contribute in this research area in three ways. First, we propose a Client Digital Safe based on HTML5 Local Storage APIs. We start by strengthening the security of these APIs to be used by our Client Digital Safe. Second, we propose an efficient synchronization protocol called SyncDS with minimum resource consumption that ensures the synchronization of user data between the Client and the Cloud Digital Safe. Finally, we address security concerns, in particular, the access control on data sharing following the Digital Safe requirements
Chiquet, Pierre. "Mécanismes thermophysiques déterminant la sécurité du stockage géologique du CO2". Pau, 2006. http://www.theses.fr/2006PAUU3045.
Texto completoCO2 underground storage as an option for reducing greenhouse gases emissions consists of trapping industrial CO2 and injecting it into deep geological formations such as saline aquifers and hydrocarbons reservoirs. This study aims at assessing leakage processes and evaluating storage capacities. To this end, two leakage phenomena were considered, caprock capillary breakthrough and diffusional transport. The former involves interfacial properties of the brine/CO2/mineral system: brine/CO2 interfacial tension and rock wettability under dense CO2. Chapter one presents a series of IFT measurements performed at temperatures and pressures up to 45 MPa-110°C. Results show a great decrease of IFT with pressure in the 0-to-20 MPa range beyond what it tends to stabilize at values in the order of 25-30 mN. M-1. Chapter two deals with rock wettability. Dynamic contact angles were measured on muscovite mica and quartz up to 10 MPa. Results highlight an alteration of wettability with pressure that was accounted for by means of a DLVO based model. Direct capillary entry pressures on a clay stone sample are proposed in chapter three. Diffusion, is treated in chapter four. We used the Taylor dispersion method to measure D up to 40 MPa. Results indicate low values in the order of 2. 10-9 m2. S-1. Chapter five discuses the consequences of the previous parameters in terms of storage capacity
Shah, Virenkumar. "Propriétés interfaciales contrôlant la sécurité du stockage géologique des gaz acides". Pau, 2008. http://www.theses.fr/2008PAUU3015.
Texto completoAcid gas geological storage is a process under which acid gas (CO2, H2S) is injected in a geological formation and thus stored away from the atmosphere for a long time (hundreds of years). It is a promising process to reduce CO2 atmospheric emissions and an alternative to the transformation of H2S into sulphur by the Claus process. In this process, the acid gas buoyantly rises to the top of the formation and accumulates beneath the caprock, a low permeable medium imbibed with water. This thesis investigates the interfacial properties involved in capillary failure of the caprock: water/acid gas interfacial tension (IFT) and caprock’s water-wettability. It presents the first ever systematic IFT and contact angle measurements under storage conditions (up to 150 bar and 120°C) with H2S-rich acid gases, as well as a model to predict IFTs between water and non-polar or slightly-polar compounds. Water/H2S IFT decreases with increasing pressure and levels off at around 9-10 mN/m at high pressure and temperature (T ≥ 70°C, P > 120 bar). However, wettability alteration due to the presence of dense acid gas is limited in the case of natural and model substrates typically present in the caprock, except in the case of mica, which exhibits pronounced alteration in the presence of H2S. These properties have a strong impact on various quantities of practical interest in geological storage, such as the maximum injection and storage pressure and potential storage capacity of a given formation. These quantities are significantly lowered in the case of H2S-rich gas as compared to CH4 and even CO2; they should be carefully determined when planning an acid gas geological storage operation
Oualha, Nouha. "Sécurité et coopération pour le stockage de donnéees pair-à-pair". Paris, ENST, 2009. http://www.theses.fr/2009ENST0028.
Texto completoSelf-organizing algorithms and protocols have recently received a lot of interest in mobile ad-hoc networks as well as in peer-to-peer (P2P) systems, as illustrated by file sharing or VoIP. P2P storage, whereby peers collectively leverage their storage resources towards ensuring the reliability and availability of user data, is an emerging field of application. P2P storage however brings up far-reaching security issues that have to be dealt with, in particular with respect to peer selfishness, as illustrated by free-riding attacks. The continuous observation of the behavior of peers and monitoring of the storage process is an important requirement to secure a storage system against such attacks. Detecting peer misbehavior requires appropriate primitives like proof of data possession, a form of proof of knowledge whereby the holder interactively tries to convince the verifier that it possesses some data without actually retrieving them or copying them at the verifier. We propose and review several proof of data possession protocols. We in particular study how data verification and maintenance can be handed over to volunteers to accommodate peer churn. We then propose two mechanisms, one based on reputation and the other on remuneration, for enforcing cooperation by means of such data possession verification protocols, as periodically delivered by storage peers. We assess the effectiveness of such incentives with game theoretical techniques. We in particular discuss the use of non-cooperative one-stage and repeated Bayesian games as well as that of evolutionary games
Sanchez, Bernard. "Insécurité des approvisionnements pétroliers et effet externe : le cas du stockage de sécurité". Montpellier 1, 1997. http://www.theses.fr/1997MON10007.
Texto completoChaou, Samira. "Modélisation et analyse de la sécurité dans un système de stockage pair-à-pair". Phd thesis, Université d'Evry-Val d'Essonne, 2013. http://tel.archives-ouvertes.fr/tel-00877094.
Texto completoCavalcante, Janaide. "Traitement des sables à la bentonite pour la constitution de la barrière de sécurité passive des centres de stockage de déchets". Lyon, INSA, 1995. http://www.theses.fr/1995ISAL0027.
Texto completo[This work is carry out on impervious barriers destined for landfill engineering composed by compacted sand-bentonite mixtures. French regulations require a barrier with a permeability less than lE-09rn/s. Standard tests often used in geotechnical engineering has allowed possible the establishment of a methodology to verify the behavoiur of this barrier during the presence of leachate. In the first part we have sought to define from swell tests and Atterberg limits tests the interactions bentonite-leachates. We realised the permeability testing to water and leachate for various samples constituted of compacted sand-bentonite mixtures. Emperical models allowed to estimate the permeability, tests results, experimental results and tests methods are proposed. ]
Kircheva, Nina. "Contribution de l'émission acoustique pour la gestion et la sécurité des batteries Li-ion". Phd thesis, Université de Grenoble, 2013. http://tel.archives-ouvertes.fr/tel-00960011.
Texto completoHernandez-Guevara, Hector. "Contribution à la simulation de systèmes chimiques orientée vers l’analyse de sécurité : application à la prévention de l’explosion thermique". Compiègne, 1987. http://www.theses.fr/1987COMPD078.
Texto completoCarpen-Amarie, Alexandra. "Utilisation de BlobSeer pour le stockage de données dans les Clouds: auto-adaptation, intégration, évaluation". Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2011. http://tel.archives-ouvertes.fr/tel-00696012.
Texto completoRelaza, Théodore Jean Richard. "Sécurité et disponibilité des données stockées dans les nuages". Thesis, Toulouse 3, 2016. http://www.theses.fr/2016TOU30009/document.
Texto completoWith the development of Internet, Information Technology was essentially based on communications between servers, user stations, networks and data centers. Both trends "making application available" and "infrastructure virtualization" have emerged in the early 2000s. The convergence of these two trends has resulted in a federator concept, which is the Cloud Computing. Data storage appears as a central component of the problematic associated with the move of processes and resources in the cloud. Whether it is a simple storage externalization for backup purposes, use of hosted software services or virtualization in a third-party provider of the company computing infrastructure, data security is crucial. This security declines according to three axes: data availability, integrity and confidentiality. The context of our work concerns the storage virtualization dedicated to Cloud Computing. This work is carried out under the aegis of SVC (Secured Virtual Cloud) project, financed by the National Found for Digital Society "Investment for the future". This led to the development of a storage virtualization middleware, named CloViS (Cloud Virtualized Storage), which is entering a valorization phase driven by SATT Toulouse-Tech-Transfer. CloViS is a data management middleware developped within the IRIT laboratory. It allows virtualizing of distributed and heterogeneous storage resources, with uniform and seamless access. CloViS aligns user needs and system availabilities through qualities of service defined on virtual volumes. Our contribution in this field concerns data distribution techniques to improve their availability and the reliability of I/O operations in CloViS. Indeed, faced with the explosion in the amount of data, the use of replication can not be a permanent solution. The use of "Erasure Resilient Code" or "Threshold Schemes" appears as a valid alternative to control storage volumes. However, no data consistency protocol is, to date, adapted to these new data distribution methods. For this reason, we propose to adapt these different data distribution techniques. We then analyse these new protocols, highlighting their respective advantages and disadvantages. Indeed, the choice of a data distribution technique and the associated data consistency protocol is based on performance criteria, especially the availability and the number of messages exchanged during the read and write operations or the use of system resources (such as storage space used)
Curt, Corinne. "Evaluation de la performance des barrages en service basée sur une formalisation et une agrégation des connaisssances". Clermont-Ferrand 2, 2008. http://www.theses.fr/2008CLF21819.
Texto completoContiu, Stefan. "Applied Cryptographic Access Control for Untrusted Cloud Storage". Thesis, Bordeaux, 2019. http://www.theses.fr/2019BORD0215.
Texto completoPublic clouds enable storing and sharing data with efficient cost and high availability. Nevertheless the benefits, cloud providers are recurrently breached by malicious users exposing sensitive user content. To mitigate the lack of security guarantees, users can impose end-to-end security by encrypting the data before remotely storing it.Access control mechanisms specify the users who are allowed to produce or consume the re-mote data. As data is encrypted, access control is performed cryptogrpahically, concealed from the cloud storage. Cryptographic key management is used for regulating user access while re-encryption techniques are used for key updates. State-of-the-art key management often trades computational time for storage footprint, while re-encryption techniques exchange great security guarantees for speed. In the context of very large and highly dynamic cloud specific workloads,state-of-the-art cryptographic access control is generally inefficient.This thesis proposes a minimal integration of Trusted Execution Environments (TEE) to achieve efficient access control. Leveraging TEE, we perform a change in assumptions of traditional key distribution schemes, deriving a confidential and an anonymous scheme, both achieving efficient computational latency and low storage footprint. End-users servicing time is further optimized by partitioning and indexing techniques. In addition, we propose a lightweight data re-encryption method by processing only portions of the data in TEE directly at the provider side. We carry out a comprehensive implementation and evaluation using Intel Software Guard Extensions (SGX) as TEE. Benchmarking results highlight that our key management and re-encryption schemes can be few orders of magnitude better than state-of-the-art
Viguier, Françoise. "Écoulements diphasiques lors de la vidange d'un réservoir de gaz liquéfiés sous pression. Comparaison Eau - CFC11-CFC113". Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 1992. http://tel.archives-ouvertes.fr/tel-00844457.
Texto completoKyoni, Idriss. "Contribution à l'amélioration de la fiabilitédu réseau électrique de la province du Katanga/RD Congo". Doctoral thesis, Universite Libre de Bruxelles, 2018. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/269651.
Texto completoDoctorat en Sciences de l'ingénieur et technologie
info:eu-repo/semantics/nonPublished
Gérard, Bruno. "Contribution des couplages mécanique-chimie : transfert dans la tenue à long terme des ouvrages de stockage de dechets radioactifs". Cachan, Ecole normale supérieure, 1996. http://www.theses.fr/1996DENS0017.
Texto completoPerlot, Céline. "Influence de la décalcification de matériaux cimentaires sur les propriétés de transfert : application au stockage profond de déchets radioactifs". Toulouse 3, 2005. http://www.theses.fr/2005TOU30211.
Texto completoCementitious materials have been selected to compose engineering barrier system (EBS) of the french radioactive waste deep repository, because of concrete physico-chemical properties: the hydrates of the cementitious matrix and the pH of the pore solution contribute to radionuclides retention; furthermore the compactness of these materials limits elements transport. The confinement capacity of the system has to be assessed while a period at least equivalent to waste activity (up to 100. 000 years). His durability was sustained by the evolution of transfer properties in accordance with cementitious materials decalcification, alteration that expresses structure long-term behavior. Then, two degradation modes were carried out, taking into account the different physical and chemical interactions imposed by the host formation. The first mode, a static one, was an accelerated decalcification using nitrate ammonium solution. It replicates EBS alteration dues to underground water. Degradation kinetic was estimated by the amount of calcium leached and the measurement of the calcium hydroxide dissolution front. To evaluate the decalcification impact, samples were characterized before and after degradation in term of microstructure (porosity, pores size distribution) and of transfer properties (diffusivity, gas and water permeability). The influence of cement nature (ordinary Portland cement, blended cement) and aggregates type (lime or siliceous) was observed: experiments were repeated on different mortars mixes. On this occasion, an essential reflection on this test metrology was led. The second mode, a dynamical degradation, was performed with an environmental permeameter. It recreates the EBS solicitations ensured during the resaturation period, distinguished by the hydraulic pressure imposed by the geologic layer and the waste exothermicity. This apparatus, based on triaxial cell functioning, allows to applied on samples pressure drop between 2 and 10 MPa and temperature from 20 to 80°C. Water permeability evolution relating to experimental parameters, uncoupled or coupled, was relied to mortars microstructural modifications
Baklouti, Malika. "Détermination de la conductivité thermique effective de milieux poreux granulaires par la méthode du fil chaud en régime transitoire : modélisation et expériences : application à la sureté des stockages". Vandoeuvre-les-Nancy, INPL, 1997. http://www.theses.fr/1997INPL010N.
Texto completoGlatron, Sandrine. "L'évaluation des risques technologiques majeurs en milieu urbain : approche géographique : le cas de la distribution des carburants dans la région Ile-de-France". Paris 1, 1997. http://www.theses.fr/1997PA010684.
Texto completoTechnological hasards have now a societal dimension, as shown by the necessity for the town planner to consider them, since the French law of 1987. During the elaboration of urban plans, local (Land of urban, local (Land Use Plan) or regional, the technological hazards must be taken into account. An original assesment method is built, using this legal constraint - the control of urban development around dangerous industrial sites. It consists in counting the potential damages wihin the area concerned by the consequences of an accident. This area is calculated for the most serious accident, called "penalizing" accident, because of the determinist assessment method we use in France. This assessment doesn't concern only the dangerous plants. It is implemented for the hole steps of an industrial branch, including the transport. Flows are very closely linked to the spatial firm organisation. The assessing method elaborated takes account of this close link, when it proposes a common evaluation for plant - hazards and transport - hazards. It allows the verification of the following hypothesis : there might be risks transferts from the plant to the dangerous substances transports if the georgraphy of the firm was changed, as the storage or production plant is localized elsewhere. The evaluation method is undertaken for the end of the petroleum industrial branch, i. E. Storage and retail road distribution of fuel oils, in the Ile-de-France Region. It uses the spatial analysis described in the land use map worked out by the IAURIF (Town Planning Institut of the Ile-de-France Region)
Dimbour, Jean-Philippe. "Contribution à l'étude expérimentale et à la modélisation de l'influence de dispositifs de protection de type rideau d'eau sur la dispersion atmosphérique d'un rejet de gaz lourd se produisant depuis un local de stockage de chlore liquiéfié sous pression". Aix-Marseille 1, 2003. http://www.theses.fr/2003AIX11036.
Texto completoGouel, Christophe. "Agricultural price instability and optimal stabilisation policies=Instabilité des prix agricoles et politiques optimales de stabilisation". Phd thesis, Ecole Polytechnique X, 2011. http://pastel.archives-ouvertes.fr/pastel-00584922.
Texto completoLeca, Denis. "Caractérisation des altérations du granite d'Auriat (Creuse). Étude de son espace poreux". Phd thesis, Ecole Nationale des Ponts et Chaussées, 1990. http://pastel.archives-ouvertes.fr/pastel-00569148.
Texto completoCarpen-Amarie, Alexandra. "BlobSeer as a data-storage facility for clouds : self-Adaptation, integration, evaluation". Thesis, Cachan, Ecole normale supérieure, 2011. http://www.theses.fr/2011DENS0066/document.
Texto completoThe emergence of Cloud computing brings forward many challenges that may limit the adoption rate of the Cloud paradigm. As data volumes processed by Cloud applications increase exponentially, designing efficient and secure solutions for data management emerges as a crucial requirement. The goal of this thesis is to enhance a distributed data-management system with self-management capabilities, so that it can meet the requirements of the Cloud storage services in terms of scalability, data availability, reliability and security. Furthermore, we aim at building a Cloud data service both compatible with state-of-the-art Cloud interfaces and able to deliver high-throughput data storage. To meet these goals, we proposed generic self-awareness, self-protection and self-configuration components targeted at distributed data-management systems. We validated them on top of BlobSeer, a large-scale data-management system designed to optimize highly-concurrent data accesses. Next, we devised and implemented a BlobSeer-based file system optimized to efficiently serve as a storage backend for Cloud services. We then integrated it within a real-world Cloud environment, the Nimbus platform. The benefits and drawbacks of using Cloud storage for real-life applications have been emphasized in evaluations that involved data-intensive MapReduce applications and tightly-coupled, high-performance computing applications
Kaaniche, Nesrine. "Cloud data storage security based on cryptographic mechanisms". Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0033/document.
Texto completoRecent technological advances have given rise to the popularity and success of cloud. This new paradigm is gaining an expanding interest, since it provides cost efficient architectures that support the transmission, storage, and intensive computing of data. However, these promising storage services bring many challenging design issues, considerably due to the loss of data control. These challenges, namely data confidentiality and data integrity, have significant influence on the security and performances of the cloud system. This thesis aims at overcoming this trade-off, while considering two data security concerns. On one hand, we focus on data confidentiality preservation which becomes more complex with flexible data sharing among a dynamic group of users. It requires the secrecy of outsourced data and an efficient sharing of decrypting keys between different authorized users. For this purpose, we, first, proposed a new method relying on the use of ID-Based Cryptography (IBC), where each client acts as a Private Key Generator (PKG). That is, he generates his own public elements and derives his corresponding private key using a secret. Thanks to IBC properties, this contribution is shown to support data privacy and confidentiality, and to be resistant to unauthorized access to data during the sharing process, while considering two realistic threat models, namely an honest but curious server and a malicious user adversary. Second, we define CloudaSec, a public key based solution, which proposes the separation of subscription-based key management and confidentiality-oriented asymmetric encryption policies. That is, CloudaSec enables flexible and scalable deployment of the solution as well as strong security guarantees for outsourced data in cloud servers. Experimental results, under OpenStack Swift, have proven the efficiency of CloudaSec in scalable data sharing, while considering the impact of the cryptographic operations at the client side. On the other hand, we address the Proof of Data Possession (PDP) concern. In fact, the cloud customer should have an efficient way to perform periodical remote integrity verifications, without keeping the data locally, following three substantial aspects : security level, public verifiability, and performance. This concern is magnified by the client’s constrained storage and computation capabilities and the large size of outsourced data. In order to fulfill this security requirement, we first define a new zero-knowledge PDP proto- col that provides deterministic integrity verification guarantees, relying on the uniqueness of the Euclidean Division. These guarantees are considered as interesting, compared to several proposed schemes, presenting probabilistic approaches. Then, we propose SHoPS, a Set-Homomorphic Proof of Data Possession scheme, supporting the 3 levels of data verification. SHoPS enables the cloud client not only to obtain a proof of possession from the remote server, but also to verify that a given data file is distributed across multiple storage devices to achieve a certain desired level of fault tolerance. Indeed, we present the set homomorphism property, which extends malleability to set operations properties, such as union, intersection and inclusion. SHoPS presents high security level and low processing complexity. For instance, SHoPS saves energy within the cloud provider by distributing the computation over multiple nodes. Each node provides proofs of local data block sets. This is to make applicable, a resulting proof over sets of data blocks, satisfying several needs, such as, proofs aggregation
Kaaniche, Nesrine. "Cloud data storage security based on cryptographic mechanisms". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0033.
Texto completoRecent technological advances have given rise to the popularity and success of cloud. This new paradigm is gaining an expanding interest, since it provides cost efficient architectures that support the transmission, storage, and intensive computing of data. However, these promising storage services bring many challenging design issues, considerably due to the loss of data control. These challenges, namely data confidentiality and data integrity, have significant influence on the security and performances of the cloud system. This thesis aims at overcoming this trade-off, while considering two data security concerns. On one hand, we focus on data confidentiality preservation which becomes more complex with flexible data sharing among a dynamic group of users. It requires the secrecy of outsourced data and an efficient sharing of decrypting keys between different authorized users. For this purpose, we, first, proposed a new method relying on the use of ID-Based Cryptography (IBC), where each client acts as a Private Key Generator (PKG). That is, he generates his own public elements and derives his corresponding private key using a secret. Thanks to IBC properties, this contribution is shown to support data privacy and confidentiality, and to be resistant to unauthorized access to data during the sharing process, while considering two realistic threat models, namely an honest but curious server and a malicious user adversary. Second, we define CloudaSec, a public key based solution, which proposes the separation of subscription-based key management and confidentiality-oriented asymmetric encryption policies. That is, CloudaSec enables flexible and scalable deployment of the solution as well as strong security guarantees for outsourced data in cloud servers. Experimental results, under OpenStack Swift, have proven the efficiency of CloudaSec in scalable data sharing, while considering the impact of the cryptographic operations at the client side. On the other hand, we address the Proof of Data Possession (PDP) concern. In fact, the cloud customer should have an efficient way to perform periodical remote integrity verifications, without keeping the data locally, following three substantial aspects : security level, public verifiability, and performance. This concern is magnified by the client’s constrained storage and computation capabilities and the large size of outsourced data. In order to fulfill this security requirement, we first define a new zero-knowledge PDP proto- col that provides deterministic integrity verification guarantees, relying on the uniqueness of the Euclidean Division. These guarantees are considered as interesting, compared to several proposed schemes, presenting probabilistic approaches. Then, we propose SHoPS, a Set-Homomorphic Proof of Data Possession scheme, supporting the 3 levels of data verification. SHoPS enables the cloud client not only to obtain a proof of possession from the remote server, but also to verify that a given data file is distributed across multiple storage devices to achieve a certain desired level of fault tolerance. Indeed, we present the set homomorphism property, which extends malleability to set operations properties, such as union, intersection and inclusion. SHoPS presents high security level and low processing complexity. For instance, SHoPS saves energy within the cloud provider by distributing the computation over multiple nodes. Each node provides proofs of local data block sets. This is to make applicable, a resulting proof over sets of data blocks, satisfying several needs, such as, proofs aggregation
Tanon, Affaud A. "Construction et validation de filtres de recherche bibliographique pour soutenir la prise de décisions basée sur les évidences : le cas de la sécurité des patients". Thèse, 2012. http://hdl.handle.net/1866/9892.
Texto completoOptimized bibliographic search filters are designed to facilitate information retrieval in bibliographic databases, which are almost always the most abundant source of scientific evidence. The purpose of such filters is to support evidence-based decision making. Many of the filters available in the literature are methodological search filters. To reach their full potential they need to be combined with subject filters that identify studies covering a particular topic. In the field of patient safety, it has been demonstrated that deficiencies in the information retrieval process can lead to tragic consequences. Optimized bibliographic search filters covering the field could thus be very useful. This study is intended to provide subject bibliographic search filters optimized for the field of patient safety, assess their validity, and offer a guide for developing optimized bibliographic search filters. We propose high-performing bibliographic search filters to retrieve papers dealing with patient safety in health care organizations, that have been explicitly defined as relevant to the patient safety field by their authors, in Medline, Embase and CINAHL. The main generalization issue lies in defining the boundaries of the patient safety field.