Program. 2015 International Conference on Cloud Computing Technologies and Applications. June 2-4, 2015 Marrakech MOROCCO



Similar documents
Réf#Num Nom et Prénom Sessions Contribution: Université PC Or ABBASSI Abdellatif Physique - Chimie

Program JNS 5.

International Symposium ERVD' "Water, Recycling and Waste Valorisation ", ERVD 2 Conference center FMP-Fez, 2 and 3 June 2014.

July 9-15, 2011, Tlemcen University 9-15 Juillet 2011, Université de Tlemcen

A Fully Homomorphic Encryption Implementation on Cloud Computing

Cloud Courses Description

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

A Security Integrated Data Storage Model for Cloud Environment

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Day 1 : Wednesday May 7th, Time Room Program Schedule

SMART InTeRneT OF ThIngS

Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

DETAILED PROGRAM SCHEDULE

Cloud Courses Description

THE CONFERENCE PROGRAM

IEEE JAVA Project 2012

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

Environments, Services and Network Management for Green Clouds

List of Participants Arab Countries

Table of Contents. Abstract... Error! Bookmark not defined. Chapter 1... Error! Bookmark not defined. 1. Introduction... Error! Bookmark not defined.

On Applying Big Data and Cloud Computing for Quality Improvement in Higher Education

Conference Program. All meetings are in the AL MAJLISS room. All meetings are in English, unless specified.

A Survey Paper: Cloud Computing and Virtual Machine Migration

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April ISSN

Under the title: Quality in Higher Education, for meet the needs of Enterprise and the Moroccan Society: Approaches, Practices and Evaluation Systems

NSF Workshop on Big Data Security and Privacy

Privacy & Security of Mobile Cloud Computing (MCC)

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1

Lecture 02b Cloud Computing II

MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS

CLOUD COMPUTING AND SECURITY: VULNERABILITY ANALYSIS AND PREVENTIVE SOLUTIONS

What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era ( ) Workstation Era ( ) Xerox Star 1981!

Performance Gathering and Implementing Portability on Cloud Storage Data

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

Register. Now. 2 nd Dii DESERT ENERGY CONFERENCE CAIRO nd 3 rd November 2011

CHAPTER 8 CLOUD COMPUTING

Cloud Computing Security Issues And Methods to Overcome

Cloud Computing: Security Model Comprising Governance, Risk Management and Compliance.

Web Application Hosting Cloud Solution Architecture.

It s all about Europe s future with Cloud. EUROCLOUD FORUM th EuroCloud Congress Barcelona, October 7 9

Microsoft Research Windows Azure for Research Training

Cloud Resilient Architecture (CRA) -Design and Analysis. Hamid Alipour Salim Hariri Youssif-Al-Nashif

Improving Data Processing Speed in Big Data Analytics Using. HDFS Method

Security Issues in Cloud Computing

5-Layered Architecture of Cloud Database Management System

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

Internet of Things (IoT): A vision, architectural elements, and future directions

Standard Big Data Architecture and Infrastructure

Chapter 6: Fundamental Cloud Security

Data management using Virtualization in Cloud Computing

Big Data - Security and Privacy

Microsoft Research Microsoft Azure for Research Training

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

Security Considerations for Public Mobile Cloud Computing

Management of Security Information and Events in Future Internet

Third International Conference of Faculty of Pharmacy Cairo University Entitled Good Pharmacy Practice

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad

Big Data Mining Services and Knowledge Discovery Applications on Clouds

Challenges in Delivering Large-scale Services over Cloud Environments

Big-Data Computing with Smart Clouds and IoT Sensing

FINAL REPORT OF THE PROGRAM WORKSHOP ON PRACTICAL APPROACH TOWARDS CLOUD COMPUTING

Multilevel Communication Aware Approach for Load Balancing

THE TASKS ALLOCATION BASED ON THE PRE- ESTIMATION OF THE PROCESSING TIME IN THE CLOUD ENVIRONMENT

A Review On Various Attack Detection Techniques In cloud Architecture

Cryptographic Data Security over Cloud

Hands-on Information Technology Virtual Laboratory Powered by Cloud Computing. Peng Li East Carolina University Global Collaboratory Consortium

International Symposium "Water, Recycling and Waste Valorisation ", ERVD 3 Conference center FMP-Fez, Morocco, 28 and 29 October 2015.

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

Intrusion Detection for Grid and Cloud Computing

CFET 2008 Conference Schedule

CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas

Cloud-Security: Show-Stopper or Enabling Technology?

CDBMS Physical Layer issue: Load Balancing

Toward a Unified Ontology of Cloud Computing

A Cloud-Assisted Internet of Things Framework for Pervasive Healthcare in Smart City Environment

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA

Invitation to Host Academy Event

Current and Future Research into Network Security Prof. Madjid Merabti

Studying Performance in Supply Chain Management Using Data Mining Software

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

Journal of Internet Banking and Commerce

Cloud based Conceptual Framework of Service Level Agreement for University

COMP9321 Web Application Engineering

Transcription:

Moroccan Association of Cloud Computing 2015 International Conference on Cloud Computing Technologies and Applications June 2-4, 2015 Marrakech MOROCCO Program Session Topics A Cloud Security(I) S-I B Cloud Services(I) C International Workshop on Big Data- IWBD 15 A Cloud Architecture S-II B Data Management and Big Data C Cloud Services(II) A Management and Scheduling in Clouds S-III B Cloud Applications C Cloud Security(II) A Cloud Environment S-IV B Mobile and Cloud computing C International Workshop WVNT 15 A Cloud Management S-V B Short Communication: Cloud, Big Data and Applications C Short Communication: Cloud Management, Security and Applications

08:00 08:30 09:00 09:00 09:10 09:30 09:30 09:50 10:10 Tuesday Wednesday Thursday Welcome/Registration (in Kenzi Farah hotel lobby) Opening Ceremony Keynote 1 (Maria Fasli) 10:10 Keynote2 (Andrew Harrison) 10:50 10:50 Coffee Break 11:10 11:10 11:50 12:10 S-I (A) S-I (B) S-I (C) 12:20 Room 2 Room 3 12:30 12:30 12:50 13:00 13:10 13:10 13:20 13:30 13:30 14:00 14:00 14:40 14:40 15:00 15:20 15:20 16:40 16:40 17:00 17:00 17:20 17:40 18:00 19:30 23:00 Registration (in Kenzi Farah hotel lobby) Lunch Break Keynote 3 (Hugh Shanahan) Keynote 4 (Chunming Rong) S-II (A) S-III (A) S-II (B) Room 2 Coffee Break S-III(B) Room 2 Gala Dinner S-II (C) Room 3 S-III (C) Room 3 Keynote 5 (Tarek El-Ghazawi) S-IV (A) S-V (A) Keynote 8 (Jalel Ben Othmane) Keynote 6 (Wissam Halabi) Coffee Break Keynote 7 (Erik Elmroth) S-IV (B) Room 2 S-V (B) Room 2 Closing Session Lunch Break Visit of Marrakech City S-IV (C) Room 3 S-V (C) Room 3

Program of International Workshop on Big Data, IWBD 15 S-I (C) 9h00 9h30 9h30 10h10 Opening Ceremony International Workshop on Big Data IWBD'15 Exploring Complex Datasets: Challenges and Perspectives Keynote 1 : Prof. Maria Fasli, Institute for Analytics and Data Science, School of Computer Science and Electronic Engineering University of Essex, UK. 10h10 10h50 Public Data Education: starting from the solution and working backwards Keynote 2 : Dr. Andrew Harrison, Department of Mathematical Sciences, University of Essex, UK. 10H50 11H10 Coffee Break Communications Big Data in healthcare: Challenges and Opportunities (ID-144) Hajar Mousannif, Hiba Asri,, Hassan Al Moatassime and Thomas Noel 11H10 12H30 Some tools of QSAR/QSPR and drug development: Wiener and Terminal Wiener indices(id-145) Meryam Zeryouh, Mohamed El Marraki and Mohamed Essalih 12H30 14H00 Lunch 14H00 14H40 Big Data Open Platform for Water Resources Management (ID-146) Ridouane Chalh, Zohra Bakkoury, Driss Ouazar and Moulay Idriss Hasnaoui Cloud computing for research in low and middle income countries. Keynote 2 : Dr. Hugh Shanahan, Department of Computer Science Centre for Systems and Synthetic Biology, University of London, UK. 14H40 16H40 Round Table Discussion : The Big Data Education 16H40-17H00 Coffee break 17H00 17H30 Workshop Conclusion

Keynote 1 Keynote 2 Keynote 3 Keynote 4 Keynote 5 Keynote 6 IWBG 15 Keynote 7 Keynote 8 WVNT 15 Keynote talks Complex Datasets: Challenges and Perspectives Maria Fasli, University of Essex, UK Public Data Education: starting from the solution and working backwards Andrew Harrison, University of Essex, UK Cloud computing for research in low and middle income countries Hugh Shanahan, University of London, UK Secure Future Services in Cloud Chunming Rong, University of Stavanger, Norway Mobile Cloud Computing Tarek El-Ghazawi, The George Washington University, USA Getting Ready for IoT by Building your Cloud Computing and your Big Data Wissam Halabi, EMC 2 Corporation, Massachusetts, USA Cloud Control: Guided Tour through a Cloud Datacenter, addressing the Resource Management Challenges of the Future Erik Elmroth, Umeå University, Sweden DoS in VANETS issue or fatality? Jalel Ben Othmane, University of Paris 13, France Wednesday 09:30-10:10 Wednesday 10:10 10:50 Wednesday 14:00 14:40 Wednesday 14:40 15:20 Thursday 08:30 09:10 Thursday 09:10 09:50 Thursday 10:10 10:50 Thursday 12:50 13:10 Presentation guidelines: All presentations should be in English. The time provided for Full oral presentations is 20 min (presentation and discussion). The time provided for Short oral presentations is 10 min (presentation and discussion). The speakers should give their slides to the session chair before the beginning of each session.

S-I (A) 10:10 12:30 Cloud Security (I) Chair: - Chunming Rong, University of Stavanger, Norway A Cloud Security Framework Based on Trust Model and Mobile Agent (ID-66) Saddek Benabied, Abdelhafid Zitouni and Mahieddine Djoudi How can we Design a Cost-Effective Model that Ensures a High Level of Data Integrity Protection? (ID-26) Nour-Eddine Alouane, Jaafar Abouchabaka and Najat Rafalia An efficient secure platform for storage in MCC (ID-83) Karim Zkik, Maha Tebaa, Ghizlane Orhanou and Said El Hajji Security, Privacy and Trust in Cloud Computing: Requirements and Approaches (ID-94) Meryeme Alouane and Hanan El Bakkali S-I (B) 10:10 12:30 Cloud Services (I) Chair: - Erik Elmroth, Umeå University, Sweden Nu@ge: Towards a solidary and responsible cloud computing service (ID-53) Daniel Balouek-Thomert, Eddy Caron, Pascal Gallard and Laurent Lefevre Connectivity-Aware Service Provision in Vehicular Cloud (ID-60) Rayane El Sibai, Talar Atechian, Jacques Demerjian, Jacques Bou Abdo and Rami Tawil A Cloud Service Template for Enabling Accurate Cloud Adoption and Migration (ID-120) Charafeddine El Houssaini, Mahmoud Nassar and Abdelaziz Kriouile Towards Deployment of a User-Aware Tenancy Using Rich-Variant Components for SaaS Applications (ID-56) Houda Kriouile, Bouchra El Asri, M'Barek El Haloui and Asmae Benali S-I (C) 10:10 12:30 International Workshop on Big Data- IWBD 15 Chair: - Maria Fasli, University of Essex, UK Big Data in healthcare: Challenges and Opportunities (ID-144) Hajar Mousannif, Hiba Asri,, Hassan Al Moatassime and Thomas Noel Some tools of QSAR/QSPR and drug development: Wiener and Terminal Wiener indices (ID-145) Meryam Zeryouh, Mohamed El Marraki and Mohamed Essalih Big Data Open Platform for Water Resources Management (ID-146) Ridouane Chalh, Zohra Bakkoury, Driss Ouazar and Moulay Idriss Hasnaoui

S-II (A) 15:20 16:40 Cloud Architecture Chair: - Tarek El-Ghazawi, The George Washington University, USA Enterprise architecture approach for agility evaluation (ID-101) Jihane Lakhrouit, Meriem Benhaddi and Karim Baïna A Cloud-Based Architecture for Transactional Services Adaptation (ID-100) Widad Ettazi, Hatim Hafiddi, Mahmoud Nassar and Sophie Ebersold A multi-criteria analysis of intrusion detection architectures in cloud environments (ID-98) Rachid Cherkaoui and Mostapha Zbakh Management platform for Cloud Computing (ID-27) Omar Sefraoui, Mohammed Aissaoui and Mohsine Eleuldj S-II (B) 15:20 16:40 Data Management and Big Data Chair: - Pierre Manneback, University of Mons, Belgium Log-based Change Data Capture from Schema-free Document Stores using MapReduce (ID-12) Kun Ma and Bo Yang Friendship based Storage Allocation for Online Social Networks Cloud Computing (ID-128) Mohamed Esam Elsaid and Christoph Meinel Building virtual anonymized databases for the Cloud (ID-30) Salheddine Kabou and Sidi Mohamed Benslimane Data Extraction for User Profile Management based on behavior (ID-41) Loubna Cherrat and Mostafa Ezziyyani S-II (C) 15:20 16:40 Cloud Services (II) Chair: - Claude Tadonki, Mines ParisTech, France Security Model for Cloud Database as a Service (DBaaS) (ID-1) Kashif Munir Combining Multi-agent systems and MDE approach for Monitoring SLA violations in the Cloud Computing (ID-25) Adil Maarouf, Mahmoud El Hamlaoui, Abderrahim Marzouk and Abdelkrim Haqiq An Overview of Variability Management in Cloud Services (ID-21) Khadija Aouzal, Hatim Hafiddi and Mohamed Dahchour Cloud SaaS Using MDA Approach on a Multiview Models (ID-50) Zeddari Abderrazzak and Ettalbi Ahmed

S-III(A) 17:00 18:00 Chair: - Kun Ma, University of Jinan, China Management and Scheduling in Clouds A secured load balancing architecture for cloud computing based on multiple clusters (ID-103) Mohamed Belkhouraf, Hamza Kamal Idrissi, Ali Kartit, Mohamed El Marraki, Hassan Ouahmane and Zaid Kartit Adopting a Clustering Approach Toward a Scalable IaaS Cloud Datacenters (ID-104) Jamal Talbi and Abdelkrim Haqiq A pareto-based Artificial Bee Colony and Product Line for Optimizing Scheduling of VM on Cloud Computing (ID-126) Asmae Benali, Bouchra El Asri and Houda Kriouile S-III (B) 17:00 18:00 Cloud Applications Chair: - Munir Kashif, King Fahd University of Petroleum & Minerals, Saudi Arabia Evaluating FLOODIS: Mobile Sensing for a Flood Emergency Service in the Cloud (ID-55) Claudio Rossi, Alfredo Favenza, Francesco Scullino, Vito Macchia, Giovanni Luca Spoto and Fabrizio Dominici A privacy-ensuring scheme for health data outsourcing (ID-90) Ricardo Gonçalves, Ekaterina Leonova, Ricardo Puttini and Anderson Nascimento An approach for privacy policies negotiation in mobile health-cloud environments (ID-125) Souad Sadki and Hanan El Bakkali S-III (C) 17:00 18:00 Cloud Security (II) Chair: - Karim Baïna, ENSIAS, Mohammed V University, Rabat, Morocco Decentralized Attribute-Based Encryption Scheme with Scalable Revocation for Sharing Data in Public Cloud Servers (ID-44) Adel Binbusayyis and Ning Zhang Malicious virtual machines detection through a clustering approach (ID-47) Mohamad Mahdi Bazm, Lyes Khoukhi, Rida Khatoun, Youcef Begriche, Ahmed Serhrouchni and Xiuzhen Chen Use of O-MaSE Methodology for Designing Efficient Intrusion Detection Based on MAS to Learn new Attacks (ID-29) Mohssine El Ajjouri, Siham Benhadou and Hicham Medromi

S-IV (A) 10:50 11:50 Cloud Computing Environment Chair: - Mohamed Bakhouya, IUR, Morroco First responder help facilitated by the mobile cloud (ID-108) Hazzaa Alshareef and Dan Grigoras Comparative Study of Simulators for Cloud Computing (ID-15) Adil Maarouf, Abderrahim Marzouk and Abdelkrim Haqiq Performance Analysis of a Two Stage Security Approach in Cloud Computing (ID-116) Mehdi Ezzari, Hamid El Ghazi and Tayeb Sadiki S-IV (B) 10:50 11:50 Mobile Computing and Clouds Chair: - Francisco J. Quiles, North eastern University, Boston, MA, USA A Mobile Cloud Middleware for Data Storage and Data Integrity (ID-121) Khadija Akherfi, Hamid Harroud and Michael Gerndt A Conceptual Framework for Personalization of Mobile Cloud Services (ID-109) Elarbi Badidi and Hayat Routaib External sources for mobile computing: the state-of-the-art, challenges, and future research (ID-124) Hind Bangui, Said Rakrak and Said Raghay S-IV (C) 10:50 11:50 International Workshop WVNT 15 Chair: - Jalel Ben Othmane, University of Paris 13, France Cluster Head Selection Algorithm in Vehicular Ad Hoc Networks (ID-142) Bouchra Marzak, Hicham Toumi, Elhabib Benlahmar and Mohamed Talea SAIF: System for Aid to Increase Feedbacks in social networks with a reliable, credible and transparent way (ID-141) Mohcine Kodad, El Miloud Jaara and Mohammed Erramdani Security on RFID technology (ID-135) Nabil Kannouf, Youssef Douzi, Mohamed Benabdellah and Abdelmalek Azizi

S-V (A) 11:50 13:10 Cloud Management Chair: - Dan Grigoras, University College Cork (UCC), Ireland A Comprehensive Cloud-based IoT Software Infrastructure for Ambient Assisted Living (ID-148) Berto Gomes, Luiz Carlos Muniz, Francisco José Da Silva E Silva, Luis Eduardo Talavera Ríos and Markus Endler Towards a dynamic multi-level negotiation framework in Cloud computing (ID-115) Aya Omezzine, Said Tazi, Narjes Bellamine Ben Saoud, Khalil Drira and Gene Cooperman A SCA Based Model for Resolving Syntactic Heterogeneity among Clouds (ID-62) Meriem Thabet and Mahmoud Boufaida Short Communication: Cloud, Big Data and Applications S-V (B) 11:50 13:10 Chair: - Bouchaib Bounabet, Mohamed V university, Rabat, Morocco - Abdelkrim Haqiq, Hassan 1st University, Settat, Morocco From Big Data to Big Knowledge: The Art of making Big Data Alive (ID-110) Meryeme El Houari, Maryem Rhanoui and Bouchra El Asri Vulnerabilities and storage security in Cloud Computing (ID-87) Mostapha Derfouf Crop Management Using BIG DATA (ID-86) Younes Oulad Sayad, Hajar Mousannif and Michel Le Page Data Warehouse State of the art and future challenges (ID-32) Nawfal El Moukhi, Ikram Elazami and Aziz Mouloudi A Performance Comparison Between Parallel And Lazy Fetching in Vertically Distributed Cloud Databases (ID-18) Jens Kohler and Thomas Specht Cloud computing and the organizational performance: Different approach of assessment (ID-133) Abdelhamid El Alami, Hicham Sadouk and Naima Elhaoud Implementing Knowledge Management Systems in Cloud-Based Environments - A Case Study in a Computer Science High School (ID-91) Mohammed Amine Mostefai, Amina Annane, Lylia Kissoum and Ahmed Nacer Mohamed Big Data-as-a-Service Solution For Building Graph Social Networks (ID-69) Siham Yousfi and Dalila Chiadmi

Short Communication: Cloud Management, Security and Applications S-V (C) 11:50 13:10 Chair: - El Mostafa Daoudi, University Mohamed Premier, Oujda, Morocco - Mohsine Eleuldj, The Mohammadia School of engineering, Rabat, Morocco An Adaptive Anonymous Authentication for Cloud Environment (ID-113) Amina Djellalbia, Souad Benmeziane, Nadjib Badache and Sihem Bensimessaoud Challenges of using Homomorphic Encryption to secure Cloud Computing (ID-59) Abdellah Ezzati, Khalid El Makkaoui and Abderrahim Beni Hssane Security challenges in intrusion detection (ID-37) Mohammed Jouad, Hanane Houmani and Sara Diouani Toward a Trusted framework for Cloud Computing (ID-33) Hicham Toumi, Eddaoui Ahmed, Khadija Sabiri and Mohamed Talea Remote Virtual Labs as a Service in the Cloud Computing (ID-24) Naoual Boukil and Abdelali Ibriz An Ontology-based Guidance for Privacy Enforcement in a Multi-Authority Cloud Environment (ID-114) Maherzia Belaazi, Hanen Boussi Rahmouni and Adel Bouhoula Multiview SOA: extending SOA using a private cloud computing as SaaS (ID-54) Rida Boukour and Ahmed Ettalbi