, accès à l'information en clair durant tout le processus de collecte, chiffrement, transfert, stockage et puis partage des données

, La troisième contribution de notre thèse résulte de l'interaction des utilisateurs avec l'environnement de l'informatique en brouillard (Fog-Computing) et plus généralement avec les services d'externalisation des fonctionnalités informatiques (ex

, Pour se faire, nous avons fait appel aux outils de l'intelligence artificielle qui sont des cartes auto-organisatrices pour évaluer la similarité et les K-moyennes pour améliorer l'efficacité du filtrage collaboratif. Perspectives et travaux futurs Un travail préliminaire, a été initialisé durant cette thèse de doctorat. Ce travail consistait à explorer les possibilités offertes par l'algorithme d'optimisation par colonies de fourmis (ou ACO, pour Ant-colony Optimisation) pour détecter les noeuds vulnérables dans un réseau d'objets connectés. Ce travail que nous avons choisi de ne pas décrire dans cette thèse, Cette contribution consiste en la gestion de la confiance envers ces services. Cette gestion de la confiance, nous l'avons réalisée à travers un modèle de filtrage collaboratif avec détection des utilisateurs non fiables SOM-BTR

, Internet des objets, ce qui pourrait être une première perspective à notre travail. En effet, l'algorithme ACO est un algorithme inspiré du comportement social des fourmis pour la recherche du plus court chemin menant à la source de nourriture. L'idée que nous pourrions développer serait l'utilisation d'un graphe aléatoire, représentant les interconnexions des objets connectés, sur lequel les fourmis se déplaceraient. Le mouvement des fourmis serait influencé par certains paramètres caractérisant le noeud (temps d'accès, bande passante, etc.) et en observant leurs mouvements on pourrait détecter les noeuds sûrs de ceux présentant un risque pour la sécurité

. Concernant-notre-modèle-som-btr, évaluation de la similarité dans notre modèle SOM-BTR, un travail a été engagé en vue de permettre à l'algorithme des cartes auto-organisatrices de converger vers un minimum global au lieu d'un minimum local. CONCLUSION Pour se faire, une réflexion est en cours pour utiliser une stratégie hybride qui s'inspirerait du comportement des lucioles (firefly algorithm en anglais) pour initialiser de façon la plus optimale possible les paramètres

, Nous visons particulièrement à déporter l'exécution de l'algorithme récursif DecryptN ode, qui prend comme argument la clé secrète Sk. Or, pour rester dans l'esprit de notre modèle, le noeud de déportation ne devrait pas avoir accès à cette clé pour pouvoir accomplir ses calculs. Bibliographie [1] REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, Enfin, pour ouvrir d'autres possibilités d'application pour notre schéma de chiffrement FCCP-ABE, nous pourrions le faire évoluer pour qu'il puisse également prendre en charge la fonction de déchiffrement sur des objets contraints

J. H. Abawajy and M. M. Hassan, Federated Internet of Things and Cloud Computing Pervasive Patient Health Monitoring System, IEEE Communications Magazine, vol.55, p.38, 2017.

A. Mohammed-riyadh and D. Tandjaoui, An end-to-end secure key management protocol for e-health applications, In Comput. Electr. Eng, vol.44, p.38, 2015.

A. Ahmed and E. Ahmed, A survey on mobile edge computing, 10th IEEE International Conference on Intelligent Systems and Control, vol.28, p.31, 2016.

A. T. Akinola and M. O. , Adigun : Feedback-based service selection in ad-hoc mobile cloud computing, 2016 International Conference on Advances in Computing and Communication Engineering (ICACCE), p.52, 2016.

M. Ambrosin, A. Anzanpour, M. Conti, T. Dargahi, S. R. Moosavi et al., On the feasibility of attribute-based encryption on internet of things devices, IEEE Micro, vol.36, p.48, 2016.

M. Moreno-ambrosin, T. Conti, and . Dargahi, On the Feasibility of Attribute-Based Encryption on Smartphone Devices, Proceedings of the, 2015.

, BIBLIOGRAPHIE Workshop on IoT Challenges in Mobile and Industrial Systems, vol.47, p.78, 2015.

D. Arthur and . Vassilvitskii, How slow is the k-means method ?, Proceedings of the Annual Symposium on Computational Geometry, p.122, 2006.

M. Asim, . Petkovic, and . Ignatenko, Attribute-based encryption with encryption and decryption outsourcing, Proceedings of the 19th Conference on Innovations in Clouds, Internet and Networks, vol.78, p.103, 2014.

A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman, Medrec : Using blockchain for medical data access and permission management, 2016 2nd International Conference on Open and Big Data (OBD), p.55, 2016.

S. Balaji and . Rajkumar, A personalized cloud service recommendation system using collaborative filtering, International Journal of Pure and Applied Mathematics, vol.119, p.52, 2018.

B. Balamurugan and . Krishna, Extensive survey on usage of attribute based encryption in cloud, Journal of Emerging Technologies in Web Intelligence, vol.6, pp.263-272, 2014.

E. B. Barker, W. C. Barker, W. E. Burr, W. , T. Polk et al., Sp 800-57. recommendation for key management, p.67, 2007.

A. Beimel, Secure Schemes for Secret Sharing and Key Distribution, p.64, 1996.

R. Bell, Y. Koren, and C. Volinsky, Modeling relationships at multiple scales to improve accuracy of large recommender systems, Proceedings of the 13th

, ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '07, pp.95-104, 2007.

. Bibliographie,

M. Bellare, Practice-oriented provable-security, Lectures on Data Security Lecture Notes in Computer Science, vol.1396, p.179, 1999.

J. Benaloh and J. Leichter, Generalized secret sharing and monotone functions, Proceedings on Advances in Cryptology, CRYPTO '88, pp.27-35, 1990.

K. Benouaret, I. Benouaret, M. Barhamgi, and D. Benslimane, Top-k cloud service plans using trust and qos, 2017 IEEE International Conference on Services Computing (SCC), vol.39, p.52, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01857544

J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy AttributeBased Encryption, Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP '07, vol.46, p.179, 2007.
URL : https://hal.archives-ouvertes.fr/hal-01788815

F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, Fog computing and its role in the internet of things, Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, MCC '12, p.77, 2012.

J. S. Breese, D. Heckerman, and C. Kadie, Empirical analysis of predictive algorithms for collaborative filtering, Proceedings of the Fourteenth Conference on Uncertainty in Artificial Intelligence, UAI'98, pp.43-52, 1998.

, CGTN : Jorf no 0129 du 6 juin 2010 p. texte no 42. vocabulaire de l'informatique et de l'internet

S. Praveen, . Challagidad, S. Vani, . Reshmi, and N. Mahantesh, Birje : Reputation based trust model in cloud computing, Internet of Things and Cloud Computing, vol.5, p.53, 2017.

Y. Chandu, K. S. Kumar, N. V. Prabhukhanolkar, A. N. Anish, and S. , Design and implementation of hybrid encryption for security of iot data, 2017 BIBLIOGRAPHIE International Conference On Smart Technologies For Smart Nation (SmartTechCon), vol.42, p.80, 2017.

A. Charif, Les systèmes de recommandation à base de confiance, p.113, 2014.

Z. Chen, L. Shen, and F. Li, Exploiting web service geographical neighborhood for collaborative qos prediction, Future Generation Computer Systems, vol.68, p.144, 2017.

M. Chiregi, J. Nima, and . Navimipour, A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the effect of troll entities, Computers in Human Behavior, vol.60, pp.280-292, 2016.

R. Chowdhury, H. Ould-slimane, C. Talhi, and M. Cheriet, Attribute-based encryption for preserving smart home data privacy, Mounir Mokhtari, Bessam Abdulrazak et Hamdi Aloulou, éditeurs : Enhanced Quality of Life and Smart Living, pp.185-197, 2017.

K. Christidis and M. Devetsikiotis, Blockchains and Smart Contracts for the Internet of Things, IEEE Access, vol.4, pp.2292-2303, 2016.

M. Conoscenti, A. Vetrã, and J. C. De-martin, Blockchain for the internet of things : A systematic literature review, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), p.56, 2016.

F. Corradini and F. D. Angelis, Fabrizio Ippoliti et Fausto Marcantoni : A survey of trust management models for cloud computing, CLOSER 2015 -5th International Conference on Cloud Computing and Services, pp.5-2015

R. Cramer and V. Shoup, Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack, SIAM Journal on Computing, vol.33, issue.1, pp.167-226, 2003.

. Bibliographie,

M. Crucianu and M. Yacoub, Cours sur la reconnaissance des formes et méthodes neuronales (rcp208) du conservatoire nationale des arts et métiers

C. Desrosiers and G. Karypis, A comprehensive survey of neighborhoodbased recommendation methods, éditeurs : Recommender Systems Handbook, pp.107-144

U. S. Springer, , 2011.

C. Hoang-dinh-thai and . Lee, Dusit Niyato et Ping Wang : A survey of mobile cloud computing : Architecture, applications, and approaches, Wireless Communications and Mobile Computing, vol.13, pp.12-2013

D. Dolev and A. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983.

C. Doukas, T. Pliakas, and I. Maglogiannis, Mobile healthcare information management utilizing Cloud Computing and Android OS, Conference proceedings : Annual International Conference of the IEEE Engineering in Medicine and Biology Society, vol.2010, p.27, 2010.

A. E. El-barbary, L. A. El-sayed, H. H. Aly, and M. , El-Derini : A cloudlet architecture using mobile devices, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), p.77, 2015.

P. Fouque, Cours de cryptographie. URL www.di.ens.fr, p.61

D. Gambetta, Trust. making and breaking cooperative relations. Tijdschrift Voor Filosofie, vol.52, p.50, 1990.
URL : https://hal.archives-ouvertes.fr/hal-00849413

A. Gatzioura and M. Sã-nchez-marrã, A case-based recommendation approach for market basket data, IEEE Intelligent Systems, vol.30, issue.1, pp.20-27, 2015.

K. Goldberg, T. Roeder, D. Gupta, and C. Perkins, Eigentaste : A constant time collaborative filtering algorithm, Information Retrieval, vol.4, issue.2, p.116, 2001.

T. Gong, H. Huang, P. Li, K. Zhang, and H. Jiang, A Medical Healthcare System for Privacy Protection Based on IoT, Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), p.38, 2015.

P. Gope and T. Hwang, BSN-Care : A Secure IoT-Based Modern Healthcare System Using Body Sensor Network, IEEE Sensors Journal, vol.16, p.77, 2016.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based Encryption for Fine-grained Access Control of Encrypted Data, Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS '06, p.86, 2006.

O. M. Guillen, T. Appelmann, J. M. Bermudo-mera, E. F. Bongenaar, G. Sigl et al., Towards post-quantum security for iot endpoints with ntru, Design, Automation Test in Europe Conference Exhibition, p.44, 2017.

F. Guo, Y. Mu, W. Susilo, D. S. Wong, and V. Varadharajan, CP-ABE With Constant-Size Keys for Lightweight Devices, IEEE Transactions on Information Forensics and Security, vol.9, p.78, 2014.

L. Guo, X. Zheng, C. Ding, D. Mu, and Z. Li, Cloud service recommendation : State of the art and research challenges, 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, p.118, 2015.

Y. Gupta, R. Shorey, D. Kulkarni, and J. Tew, The applicability of blockchain in the internet of things, 10th International Conference on Communication Systems Networks (COMSNETS), p.55, 2018.

D. Hankerson, A. Menezes, . Scott-vanstone, and . Springer, Guide to Elliptic Curve Cryptography, vol.332, pp.1-2004

S. H. Hashemi, F. Faghri, P. Rausch, and R. H. Campbell, World of empowered iot users, 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), vol.55, p.56, 2016.

S. R. Hemalatha and . Manickachezian, Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing, In International Journal of Innovative Research in Computer and Communication Engineering, vol.45, p.78, 2014.

M. S. Henriques and N. K. Vernekar, Using symmetric and asymmetric cryptography to secure communication between devices in iot, 2017 International Conference on IoT and Application (ICIOT), p.42, 2017.

R. Henry, A. Herzberg, and A. Kate, Blockchain access privacy : Challenges and directions, IEEE Security Privacy, vol.16, issue.4, pp.38-45, 2018.

J. Herrera-joancomartí and C. Pérez-solà, Privacy in bitcoin transactions : New challenges from blockchain scalability solutions. In Modeling Decisions for Artificial Intelligence, pp.26-44, 2016.

J. Hoffstein, J. Pipher, H. Joseph, and . Silverman, Ntru : A ring-based public key cryptosystem, Lecture Notes in Computer Science, pp.267-288

. Springer-verlag, , p.44, 1998.

R. Hu, W. Dou, and J. Liu, A hybrid collaborative filtering approach for multifunctional service recommendation, 2013 International Conference on Cloud and Green Computing, p.52, 2013.

J. Huang and D. M. Nicol, Trust mechanisms for cloud computing, Journal of Cloud Computing : Advances, Systems and Applications, vol.2, issue.1, p.9, 2013.

S. Huang, X. Jiang, N. Zhang, C. Zhang, and D. Dang, Collaborative filtering of web service based on mapreduce, International Conference on Service Sciences, vol.52, p.118, 2014.

. Bibliographie,

J. H. Jeon, K. Kim, and J. Kim, Block chain based data security enhanced iot server platform, 2018 International Conference on Information Networking (ICOIN), p.56, 2018.

S. J. Johnston, M. Scott, and S. J. Cox, Recommendations for securing internet of things devices using commodity hardware, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), p.44, 2016.

A. Josang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007.

A. Joux, A one round protocol for tripartite diffie-hellman, Algorithmic Number Theory Symposium, p.64, 2000.

S. R. Kakakhel, L. Mukkala, T. Westerlund, and J. Plosila, Virtualization at the network edge : A technology perspective, 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC), p.39, 2018.

M. S. Karunarathne, S. A. Jones, S. W. Ekanayake, and P. N. Pathirana, Remote Monitoring System Enabling Cloud Technology upon Smart Phones and Inertial Sensors for Human Kinematics, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, p.27

J. Katz and Y. Lindell, Introduction to Modern Cryptography, Second Edition, p.72, 2014.

H. Khemissa and D. Tandjaoui, A Lightweight Authentication Scheme for EHealth Applications in the Context of Internet of Things, 9th International Conference on Next Generation Mobile Applications, Services and Technologies, p.38, 2015.

O. Kocabas, T. Soyata, K. Mehmet, and . Aktas, Emerging Security Mechanisms for Medical Cyber Physical Systems, IEEE/ACM transactions on computational biology and bioinformatics, vol.13, issue.3, p.78, 2016.

, Teuvo Kohonen : Essentials of the self-organizing map, Neural Networks, vol.69, p.120, 2013.

P. Koshy, D. Koshy, and P. D. Mcdaniel, An analysis of anonymity in bitcoin using p2p network traffic, Financial Cryptography, p.57, 2014.

K. Djamel-eddine, Abdelmadjid Bouabdallah et Hicham Lakhlef : Internet of things security : A top-down survey, Computer Networks, vol.141, pp.199-221, 2018.

L. Kuang, L. Yu, L. Huang, Y. Wang, and P. Ma, Chuanbin Li et Yujia Zhu : A personalized qos prediction approach for cps service recommendation based on reputation and location-aware collaborative filtering, Sensors, vol.53, p.144, 2018.

K. M. Kumar and A. R. Reddy, A fast k-means clustering using prototypes for initial cluster center selection, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), p.122, 2015.

R. Lamdani, N. Bennacer, G. Polaillon, and Y. Bourda, A collaborative and semantic-based approach for recommender systems, 10th International Conference on Intelligent Systems Design and Applications, p.114, 2010.

A. Bassam, G. Latif, and . Mercier, Self-organizing maps for processing of data with missing values and outliers : Application to remote sensing images, Self-Organizing Maps, chapitre 12. IntechOpen, p.121, 2010.

C. Lee, P. Chung, and M. Hwang, A survey on attributebased encryption schemes of access control in cloud environments, I. J. Network Security, vol.15, p.46, 2013.

B. Li, R. Song, L. Liao, and C. Liu, A user-oriented trust model for web services, IEEE Seventh International Symposium on Service-Oriented System Engineering, p.132, 2013.

. Bibliographie,

M. Li, S. Yu, K. Ren, and W. Lou, Securing personal health records in cloud computing : Patient-centric and fine-grained data access control in multiowner settings, Security and Privacy in Communication Networks, pp.89-106

H. Springer-berlin, , vol.38, p.47, 2010.

M. Li, S. Yu, K. Ren, and W. Lou, Securing Personal Health Records in Cloud Computing : Patient-Centric and Fine-Grained Data Access Control in

M. Settings, Security and Privacy in Communication Networks, vol.45, p.81, 2010.

X. Li, H. Ma, F. Zhou, and X. Gui, Service operator-aware trust scheme for resource matchmaking across multiple clouds, IEEE Transactions on Parallel and Distributed Systems, vol.26, issue.5, pp.1419-1429, 2015.

H. Lin, J. Shao, C. Zhang, and Y. , Fang : CAM : Cloud-Assisted Privacy Preserving Mobile Health Monitoring, IEEE Transactions on Information Forensics and Security, vol.8, p.78, 2013.

S. Lloyd, Least squares quantization in pcm, IEEE Transactions on Information Theory, vol.28, issue.2

Z. Longshuai and Y. Shengqi, He Jian et Huang Zhangqin : An optimized collaborative filtering recommendation algorithm, 2nd International Conference on Cloud Computing and Internet of Things (CCIOT), p.52, 2016.

B. Lynn, On the implementation of pairing-based cryptosystems, p.99, 2007.

J. Macqueen, Some methods for classification and analysis of multivariate observations, 5-th Berkeley Symposium on Mathematical Statistics and Probability, p.121, 1967.

R. Mahmud, R. Kotagiri, and R. Buyya, Fog Computing : A Taxonomy, Survey and Future Directions, pp.103-130, 2018.

. Bibliographie,

J. Mai, Y. Fan, and Y. Shen, A neural networks-based clustering collaborative filtering algorithm in e-commerce recommendation system, 2009 International Conference on Web Information Systems and Mining, p.120, 2009.

P. D. Sheba-kezia-malarchelvi, S. S. Manikandasaran, and L. Arockiam, Moncrypt : A technique to ensure the confidentiality of outsourced data in cloud storage, International Journal of Information and Computer Security, vol.11, issue.1, p.78, 2019.

C. Mao, R. Lin, and C. Xu, He : Towards a trust prediction framework for cloud services based on pso-driven neural network, IEEE Access, vol.5, pp.2187-2199, 2017.

J. Melka and J. Mariage, Efficient implementation of self-organizing map for sparse input data, Proceedings of the 9th International Joint Conference on Computational Intelligence, vol.1, p.121, 2017.

J. Raheel-ahmed-memon and . Ahmed, Simulation model for blockchain systems using queuing theory. Electronics, vol.8, 2019.

S. Victor and . Miller, Use of elliptic curves in cryptography, Advances in Cryptology -CRYPTO'85 Proceedings, p.66, 1985.

M. Mrabet, Y. B. Saied, and L. A. Saidane, A new trust evaluation approach for cloud computing environments, 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), vol.51, p.53, 2016.

M. Mrabet, Y. Saied, and L. A. , Saidane : A new trust evaluation approach for cloud computing environments, 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), vol.50, p.53, 2016.

L. Mui, M. Mohtashemi, and A. Halberstadt, A computational model of trust and reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, p.51, 2002.

R. Nagarajan, S. Selvamuthukumaran, and R. Thirunavukarasu, A fuzzy logic based trust evaluation model for the selection of cloud services, 2017 International Conference on Computer Communication and Informatics (ICCCI), p.39, 2017.

S. Nakamoto, Bitcoin : A peer-to-peer electronic cash system, vol.54, p.99, 2008.

, Suyel Namasudra : An improved attribute-based encryption technique towards the data security in cloud computing, Concurrency and Computation : Practice and Experience, pp.12-2017

K. Neal, Elliptic curve cryptosystems, Mathematics of computation, vol.48, p.66, 1987.

M. Kim-thuat-nguyen, N. Laurent, and . Oualha, Internet of Things security and privacy : design methods and optimization, Ad Hoc Networks, vol.32, p.44, 2015.

N. Kim-thuat-nguyen, M. Oualha, and . Laurent, Securely outsourcing the ciphertext-policy attribute-based encryption, World Wide Web, vol.21, issue.1, p.180, 2018.

H. Talal, . Noor, Z. Quan, S. Sheng, J. Zeadally et al., Trust management of services in cloud environments : Obstacles and solutions, ACM Comput. Surv, vol.46, issue.1

B. Oniga, S. H. Farr, A. Munteanu, and V. Dadarlat, Iot infrastructure secured by tls level authentication and pki identity system, 2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), p.44, 2018.

F. Sarah-ouada and M. Omar, Abdelmadjid Bouabdallah et Abdelkamel Tari : Lightweight identity-based authentication protocol for wireless sensor networks, International Journal of Information and Computer Security, vol.8, issue.2, p.78, 2016.

A. Ouaddah, Anas Abou Elkalam et Abdellah Ait Ouahman : Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT, p.55, 2017.

N. Oualha and K. T. Nguyen, Lightweight attribute-based encryption for the internet of things, 25th International Conference on Computer Communication and Networks (ICCCN), vol.45, p.48, 2016.
URL : https://hal.archives-ouvertes.fr/cea-01841672

Y. Ould-yahia, S. Bouzefrane, and H. Boucheneb, Towards privacy and ownership preserving of outsourced health data in iot-cloud context, 2018 International Symposium on Programming and Systems (ISPS), vol.44, p.78, 2018.

Y. Ould-yahia and P. Paradinas, Applications e-santé, le contrôle des données personnelles un enjeu majeur pour la protection de la vie privée, Computer and Electronics Security Applications Rendez-vous (C&ESAR2017), vol.40, p.77, 1927.

Y. Ould-yahia and S. Banerjee, Samia Bouzefrane et Hanifa Boucheneb : Exploring formal strategy framework for the security in iot towards e-health context using computational intelligence. Internet of Things and Big Data Technologies for Next Generation Healthcare, p.152, 2017.

J. Michael, D. Pazzani, and . Billsus, Content-Based Recommendation Systems, p.114, 2007.

J. M. Pollard, Monte carlo methods for index computation mod p. Mathematics of Computation, vol.32, pp.7-1978

G. Premsankar, M. Di-francesco, and T. Taleb, Edge computing for the internet of things : A case study, IEEE Internet of Things Journal, vol.5, p.77, 2018.

H. S. Pussewalage and V. Oleshchuk, A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud BIBLIOGRAPHIE Computing, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), vol.37, p.78, 2016.

P. Resnick, N. Iacovou, M. Suchak, P. Bergstrom, and J. Riedl, Grouplens : An open architecture for collaborative filtering of netnews, Proceedings of the 1994 ACM Conference on Computer Supported Cooperative Work, CSCW '94, vol.116, p.144, 1994.

S. Ries, Trust in Ubiquitous Computing, p.50, 2009.

R. Roman, J. Lopez, M. Mambo, and ;. Fog, A survey and analysis of security threats and challenges, Future Generation Computer Systems, vol.78, pp.680-698, 2018.

S. Rouhani and R. Deters, Performance analysis of ethereum transactions in private blockchain, 8th IEEE International Conference on Software Engineering and Service Science (ICSESS), vol.104, p.105, 2017.

P. Rousset, Applications des algorithmes d'auto-organisation à la classification et à la prévision, vol.1, p.113, 1999.

O. Saeed-et-riaz and A. Shaikh, A user-based trust model for cloud computing environment, International Journal of Advanced Computer Science and Applications, vol.9, issue.3, p.53, 2018.

A. Sahai and B. Waters, Fuzzy identity-based encryption, SpringerLink, vol.45, p.84, 2005.

Y. Ben-saied and A. Olivereau, Djamal Zeghlache et Maryline Laurent : Trust management system design for the internet of things : A context-aware and multi-service approach, Computers Security, vol.39, pp.351-365, 2013.

B. Sarwar, G. Karypis, J. Konstan, and J. Riedl, Item-based collaborative filtering recommendation algorithms, Proceedings of the 10th International Conference on World Wide Web, WWW '01, vol.117, p.144, 2001.

J. , B. Schafer, and D. Frankowski, Jon Herlocker et Shilad Sen : Collaborative Filtering Recommender Systems, p.118, 2007.

K. Shah, A. Salunke, S. Dongare, and K. Antala, Recommender systems : An overview of different approaches to recommendations, 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), vol.51, p.118, 2017.

A. Shamir, How to share a secret, Commun. ACM, vol.22, issue.11, p.83, 1979.

A. Shamir, How to share a secret, Commun. ACM, vol.22, issue.11, pp.612-613, 1979.

D. Shanks, Class number, a theory of factorization, and genera, 1969.

, Number Theory Institute (Proc. Sympos. Pure Math, vol.XX, p.67, 1969.

A. Sharma, T. Goyal, E. S. Pilli, A. P. Mazumdar, M. C. Govil et al., A Secure Hybrid Cloud Enabled architecture for Internet of Things, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), p.38, 2015.

A. Singla and E. Bertino, Blockchain-based pki solutions for iot, 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), p.56, 2018.

B. Stéphane, Ballet et Alexis : cours sur les courbes elliptiques application à la cryptographie. 5e année de systèmes informatiques critiques et applications

K. Su, B. Xiao, and B. Liu, Huaiqiang Zhang et Zongsheng Zhang : Tap : A BIBLIOGRAPHIE personalized trust-aware qos prediction approach for web service recommendation. Knowledge-Based Systems, vol.115, p.144, 2017.

X. Su, M. Taghi, and . Khoshgoftaar, A survey of collaborative filtering techniques, Adv. in Artif. Intell, vol.4, issue.2, p.138, 2009.

I. Sukhodolskiy and S. Zapechnikov, A blockchain-based access control system for cloud storage, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), vol.55, p.56, 2018.

B. Sung, K. Kim, and K. Shin, An aes-gcm authenticated encryption crypto-core for iot security, 2018 International Conference on Electronics, Information, and Communication (ICEIC), vol.42, p.44, 2018.

G. Takács and I. Pilászy, Bottyán Németh et Domonkos Tikk : Major components of the gravity recommendation system. SIGKDD Explorations, vol.9, p.115, 2007.

M. Till and M. Maier, Mobile edge computing : Challenges for future virtual network embedding algorithms, The Eighth International Conference on Advanced Engineering Computing and Applications in Sciences, p.29, 2014.

L. Touati, Y. Challal, and A. Bouabdallah, C-cp-abe : Cooperative ciphertext policy attribute-based encryption for the internet of things, 2014 International Conference on Advanced Networking Distributed Systems and Applications, vol.49, p.78, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01060169

L. M. Vaquero and L. Rodero-merino, Finding your way in the fog : Towards a comprehensive definition of fog computing, p.44, 1929.

M. Wang, G. Wang, Y. Zhang, and Z. Li, A high-reliability multi-faceted reputation evaluation mechanism for online services, IEEE Transactions on Services Computing, pp.1-1, 2018.

. Bibliographie,

X. Wang, J. Zhang, and E. M. Schooler, Ion : Performance evaluation of attribute-based encryption : Toward data privacy in the iot, 2014 IEEE International Conference on Communications (ICC), vol.38, p.47, 2014.

X. Wang, J. Zhang, and E. M. Schooler, Ion : Performance evaluation of Attribute-Based Encryption : Toward data privacy in the IoT, 2014 IEEE International Conference on Communications (ICC), vol.48, p.78, 2014.

X. A. Wang, J. Ma, and F. Xhafa, Outsourcing Decryption of Attribute Based Encryption with Energy Efficiency, 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), p.39, 2015.

Y. Wang, -. Ing, D. Chen, and . Wang, A survey of mobile cloud computing applications : Perspectives and challenges, Wireless Personal Communications, vol.80, issue.4, pp.1607-1623, 1929.

B. Waters, ;. Catalano, N. Fazio, R. Gennaro, and A. Nicolosi, Ciphertext-policy attribute-based encryption : An expressive, efficient, and provably secure realization, éditeurs : Public Key Cryptography -PKC 2011, p.86, 2011.

A. Whitby, Audun Jøsang et Jadwiga Indulska : Filtering out unfair ratings in bayesian reputation systems, vol.4, p.132, 2005.

C. Wu, W. Qiu, Z. Zheng, X. Wang, and X. Yang, Qos prediction of web services based on two-phase k-means clustering, Proceedings of the 2015 IEEE International Conference on Web Services, ICWS '15, pp.161-168, 2015.

Z. Wu and Y. Zhou, Service trustworthiness evaluation using neural network and fuzzy logic, 2016 IEEE International Conference on Services Computing (SCC), vol.51, p.54, 2016.

. Bibliographie,

Y. Yang, P. Liu, L. Ding, B. Shen, and W. Wang, Servenet : A deep neural network for web service classification, vol.39, p.54, 2018.

X. Yao, Z. Chen, and Y. Tian, A lightweight attribute-based encryption scheme for the internet of things, Future Generation Computer Systems, p.50, 2014.

S. Yi, C. Li, and Q. Li, A survey of fog computing : Concepts, applications and issues, Proceedings of the 2015 Workshop on Mobile Big Data, Mobidata '15, pp.37-42, 2015.

W. Yu, F. Liang, X. He, W. G. Hatcher, C. Lu et al., A survey on the edge computing for the internet of things, IEEE Access, vol.6, pp.6900-6919, 2018.

J. Yuan and X. Li, A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion, IEEE Access, vol.6, p.51, 2018.

P. Zhang, Z. Chen, J. K. Liu, K. Liang, and H. Liu, An efficient access control scheme with outsourcing capability and attribute update for fog computing, Future Generation Computer Systems, vol.78, p.179, 2018.

X. Zheng, L. D. Xu, and S. Chai, Qos recommendation in cloud services, IEEE Access, vol.5, pp.5171-5177, 2017.

Z. Zheng, H. Ma, M. R. Lyu, and I. King, Wsrec : A collaborative filtering based web service recommender system, 2009 IEEE International Conference on Web Services, vol.52, p.144, 2009.

M. R. Zibin-zheng and . Lyu, Ws-dream : A distributed reliability assessment mechanism for web services, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN), vol.137, p.146, 1920.

. Bibliographie,

Z. Zhou and D. Huang, Efficient and secure data storage operations for mobile cloud computing, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm), vol.49, p.100, 2012.

G. Zyskind, O. Nathan, and A. &. Pentland, Decentralizing privacy : Using blockchain to protect personal data, 2015 IEEE Security and Privacy Workshops, p.55, 2015.