Security and Trust Optimization in Cloud and Web Services

Introduction

The aim of this project is to address security and trust gaps in cloud and web services. We first proposed a business-oriented community formation model that accounts for the business potential of the services in the formation process to motivate the participation of services of all business capabilities. Then, we introduced an inter-cloud trust framework that allows services deployed in one or disparate cloud centers to build credible trust relationships toward each other. We then designed a trust-based game theoretical model that enables services to form trustworthy multi-cloud communities. Afterwards, we proposed an intra-cloud trust framework that allows the cloud system to build credible trust relationships toward the guest Virtual Machines (VMs) running cloud-based services using objective and subjective trust sources. Finally, we completed this project by designing and solving a trust-based game theoretical model to optimally distribute the detection load among VMs within a limited budget of resources and putting forward a resource-aware comprehensive detection and prevention system.

Contributions

FScaler: Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions pdf

Authors: Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabab Mizouni, Jamal Bentahar

AI-based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach Deep reinforcement Learning for proactive horizontal and vertical resource scaling. pdf

Authors: Hani Sami, Hadi Otrok, Jamal Bentahar, Azzam Mourad

Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement Deep Reinforcement Learning for Service Placement pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

Reinforcement R-learning Model for Time Scheduling of On-demand Fog Placement On-demand Fog Scheduling pdf

Authors: Peter Farhat, Hani Sami, Azzam Mourad

Vehicular-OBUs-As-On-Demand-Fogs: Resource and Context Aware Deployment of Containerized Micro-Services On-demand Vehicular Fog pdf

Authors: Hani Sami, Azzam Mourad, Wassim El-Hajj

Dynamic On-Demand Fog Formation Offering On-the-Fly IoT Service Deployment On-demand Fog Formation pdf

Authors: Hani Sami, Azzam Mourad

A survey on trust and reputation models for Web services: Single, composite, and communities pdf

Authors: Omar AbdelWahab, JamalBentahar, HadiOtrok, AzzamMourad

A Stackelberg game for distributed formation of business-driven services communities pdf

Authors: Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad

Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud pdf

Authors: Omar Abdel Wahab; Jamal Bentahar; Hadi Otrok; Azzam Mourad

Towards Trustworthy Multi-Cloud Services Communities: A Trust-Based Hedonic Coalitional Game pdf

Authors: Omar Abdel Wahab; Jamal Bentahar; Hadi Otrok; Azzam Mourad

An endorsement-based trust bootstrapping approach for newcomer cloud services pdf

Authors: Omar Abdel Wahab, Robin Cohen, Jamal Bentahar, Hadi Otrok,Azzam Mourad, Gaith Rjoub

Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection pdf

Authors: Azzam Mourad; Hanine Tout; Omar Abdel Wahab; Hadi Otrok; Toufic Dbouk

AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions pdf

Authors: Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabab Mizouni, Jamal Bentahar

VANET QoS-OLSR: QoS-based Clustering Protocol for Vehicular Ad Hoc Networks pdf

Authors: Omar Abdel Wahab, Hadi Otrok, Azzam Mourad

Reputation-based cooperative detection model of selfish nodes in cluster-based QoS-OLSR protocol. pdf

Authors: Nadia Moati · Hadi Otrok · Azzam Mourad · Jean-Marc Robert

CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks pdf

Authors: Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Jamal Bentahar

Towards Trustworthy Multi-Cloud Services Communities: A Trust-Based Hedonic Coalitional Game pdf

Authors: Omar Abdel Wahab; Jamal Bentahar; Hadi Otrok; Azzam Mourad

An endorsement-based trust bootstrapping approach for newcomer cloud services pdf

Authors: Omar Abdel Wahab, Robin Cohen, Jamal Bentahar, Hadi Otrok,Azzam Mourad, Gaith Rjoub

A novel aspect-oriented BPEL framework for the dynamic enforcement of web services security pdf

Authors: Azzam Mourad, Sara Ayoubi, Hamdi Yahyaoui, Hadi Otrok

New XACML-AspectBPEL approach for composite web services security pdf

Authors: Sara Ayoubi, Azzam Mourad, Hadi Otrok, Ahmad Shahin

Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies pdf

Authors: Hussein Jebbaoui, Azzam Mourad, Hadi Otrok, Ramzi Haraty

AOMD approach for context-adaptable and conflict-free Web-services composition pdf

Authors: Hanine Tout, Azzam Mourad, Chamseddine Talhi, Hadi Otrok

From model-driven specification to design-level set-based analysis of XACML policies pdf

Authors: AzzamMourad, Hanine Tout, Chamseddine Talhi, Hadi Otrok, Hamdi Yahyaoui

Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud pdf

Authors: Omar Abdel Wahab; Jamal Bentahar; Hadi Otrok; Azzam Mourad

An endorsement-based trust bootstrapping approach for newcomer cloud services pdf

Authors: Omar Abdel Wahab, Robin Cohen, Jamal Bentahar, Hadi Otrok,Azzam Mourad, Gaith Rjoub

Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach pdf

Authors: Bahia Halawi; Azzam Mourad; Hadi Otrok; Ernesto Damiani

Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection pdf

Authors: Azzam Mourad; Hanine Tout; Omar Abdel Wahab; Hadi Otrok; Toufic Dbouk

Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection pdf

Authors: Azzam Mourad; Hanine Tout; Omar Abdel Wahab; Hadi Otrok; Toufic Dbouk

FScaler: Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions pdf

Authors: Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabab Mizouni, Jamal Bentahar

AI-based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach Deep reinforcement Learning for proactive horizontal and vertical resource scaling. pdf

Authors: Hani Sami, Hadi Otrok, Jamal Bentahar, Azzam Mourad

Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement Deep Reinforcement Learning for Service Placement pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

Reinforcement R-learning Model for Time Scheduling of On-demand Fog Placement On-demand Fog Scheduling pdf

Authors: Peter Farhat, Hani Sami, Azzam Mourad

Vehicular-OBUs-As-On-Demand-Fogs: Resource and Context Aware Deployment of Containerized Micro-Services On-demand Vehicular Fog pdf

Authors: Hani Sami, Azzam Mourad, Wassim El-Hajj

Dynamic On-Demand Fog Formation Offering On-the-Fly IoT Service Deployment On-demand Fog Formation pdf

Authors: Hani Sami, Azzam Mourad

Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach pdf

Authors: Bahia Halawi; Azzam Mourad; Hadi Otrok; Ernesto Damiani

Sampling Online Social Networks with Tailored Mining Strategies Social Networks Analysis PDF

Authors: Mohamad Arafeh, Paolo Ceravolo, Azzam Mourad, Ernesto Damiani

Ontology Based Recommender System Using Social Network Data social network, data miner, big data, data analysis, data sampling, ontology, recommender system PDF

Authors: Mohamad Arafeh, Paolo Ceravolo, Azzam Mourad, Ernesto Damiani, Emanuele Bellini

Smart mobile computation offloading: Centralized selective and multi-objective approach pdf

Authors: Hanine Tout; Chamseddine Talhi; Nadjia Karaa; Azzam Mourad

Selective Mobile Cloud Offloading to Augment Multi-Persona Performance and Viability pdf

Authors: Hanine Tout; Chamseddine Talhi; Nadjia Kara; Azzam Mourad

A Stackelberg game for distributed formation of business-driven services communities pdf

Authors: Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad

Towards Trustworthy Multi-Cloud Services Communities: A Trust-Based Hedonic Coalitional Game pdf

Authors: Omar Abdel Wahab; Jamal Bentahar; Hadi Otrok; Azzam Mourad

A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond pdf

Authors: Sawsan Abdulrahman; Hanine Tout; Hakima Ould-Slimane; Azzam Mourad; Chamseddine Talhi; Mohsen Guizani

Internet of Things Intrusion Detection: Centralized, On-Device, or Federated Learning? pdf

Authors: Sawsan Abdul Rahman; Hanine Tout; Chamseddine Talhi; Azzam Mourad

FedMCCS: Multicriteria Client Selection Model for Optimal IoT Federated Learning pdf

Authors: Sawsan Abdulrahman; Hanine Tout; Azzam Mourad; Chamseddine Talhi

A Blockchain based Architecture for the Detection of Fake Sensing in Mobile Crowdsensing Crowdsensing, fake sensing, Blockchain, smart cities, citizens’ behavior monitoring PDF

Authors: Mohamad Arafeh, May El Barachi, Azzam Mourad, Fatna Belqasmi

FScaler: Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions pdf

Authors: Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabab Mizouni, Jamal Bentahar

AI-based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach Deep reinforcement Learning for proactive horizontal and vertical resource scaling. pdf

Authors: Hani Sami, Hadi Otrok, Jamal Bentahar, Azzam Mourad

Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement Deep Reinforcement Learning for Service Placement pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

Reinforcement R-learning Model for Time Scheduling of On-demand Fog Placement On-demand Fog Scheduling pdf

Authors: Peter Farhat, Hani Sami, Azzam Mourad

Vehicular-OBUs-As-On-Demand-Fogs: Resource and Context Aware Deployment of Containerized Micro-Services On-demand Vehicular Fog pdf

Authors: Hani Sami, Azzam Mourad, Wassim El-Hajj

Dynamic On-Demand Fog Formation Offering On-the-Fly IoT Service Deployment On-demand Fog Formation pdf

Authors: Hani Sami, Azzam Mourad

Stable federated fog formation: An evolutionary game theoretical approach Fog Federations

Authors: Ahmad Hammoud, Hadi Otrok, Azzam Mourad, Zbigniew Dziong

A Novel Federated Fog Architecture Embedding Intelligent Formation Fog Federations

Authors: Hala Shamseddine; Jana Nizam; Ahmad Hammoud; Azzam Mourad; Hadi Otrok; Haidar Harmanani; Zbigniew Dziong

Cloud federation formation using genetic and evolutionary game theoretical models Cloud Federations

Authors: Ahmad Hammoud, Azzam Mourad, Hadi Otrok, Omar Abdel Wahab, Haidar Harmanani

On the detection of passive malicious providers in cloud federations Cloud Federations

Authors: Ahmad Hammoud, Hadi Otrok, Azzam Mourad, Omar Abdel Wahab, Jamal Bentahar

A Blockchain based Architecture for the Detection of Fake Sensing in Mobile Crowdsensing Crowdsensing, fake sensing, Blockchain, smart cities, citizens’ behavior monitoring PDF

Authors: Mohamad Arafeh, May El Barachi, Azzam Mourad, Fatna Belqasmi

AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions pdf

Authors: Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabab Mizouni, Jamal Bentahar

FScaler: Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions pdf

Authors: Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabab Mizouni, Jamal Bentahar

AI-based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach Deep reinforcement Learning for proactive horizontal and vertical resource scaling. pdf

Authors: Hani Sami, Hadi Otrok, Jamal Bentahar, Azzam Mourad

Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement Deep Reinforcement Learning for Service Placement pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

Datasets

Dataset 1
Description + link
Dataset 1
Description + link
Dataset 1
Description + link