Title: Un peu de recherche
1Un peu de recherche
2LIRIS/DCS/DRIM
3Nostalgia an overview of the past10 years
- Some contributions to the management of data in
grids - Some contributions to Pervasive/Ubiquitous
Systems and other distributed systems (incl.
security and privacy)
4Some contributions to the management of data in
grids
5Computing/Data Grid (1)
- coordinated resource sharing and problem
solving in dynamic, multi-institutional virtual
organisations (I. Foster)
6Computing/Data Grids (2)
- Large scale
- Unpredictability, dynamicity
- Security, privacy
- Resource heterogeneity and usage diversity
- Decentralized administration
7Monitoring de grilles
- Where to place instances (replicas) of a service?
- What resource (set of resources) (what service)
use? - Condition monitor the grid state CPU load,
network load - Design and implementation of a grid service that
processes high-level information requests that
represent the users specific needs in terms of
resources
8NDS Network Distance Service
9Grid access control Sygn
- Permission Authorization Certificate (AC)
- Issuer
- Owner
- Capability (access control object authorized
action) - Validity
- Signature
Mechanisms for delegation of rights File group
operations
10Encrypted Storage for Data Grids Crypstore
10
11Management of a Cooperative Cache in Grids
- Monitoring operations
- data description
- processed requests
- transfers
- replacements
- used storage resource
- Etc.
- Management operations
- Set replacement method
- Set default time to live
- Set cache group
- Set cache coordinator
- Set collective work mode
- Etc.
12Data Integration
13Some Contributions to Pervasive/Ubiquitous
Systems and Other Distributed Systems (incl.
Security and Privacy)
14Pervasive, Ubiquitous, Mobile, Ambient, Ad Hoc ?
- Introduction to pervasive systems
- Hansel and Gretel are lost in the forest of PC
definitions - Basics (1)
- Mobility (wireless) / autonomy
- User (or device)-centric
- Context-awareness (user prefs, environment)
- Basics (2)
- Lightweight appliances and devices
- Proactivity
- ? Make the digital world/information omnipresent
but invisible
15PerSE
- Context-Awareness
- Proactivity
- Service Composition
16Architecture of a PerSE Base
17PerSE Layers
18Context Modeling and Context-Aware Pervasive
Applications
- Context ?
- User/Application centric context
- Context-aware application platform
19Access Control of Mobile Users
- Chains of trust certificates if A trusts B and B
trusts C then A trusts C to some level - Multi-layered adaptive certificates
- Trust computing and reputation
20Privacy-Preserving Reputation Systems
- Reputation aggregation of feedbacks
- Query agent, target agent, source agents
- Goal computing the reputation while not
revealing the individual feedbacks - Approach use trust relations in the reputation
protocol for enforce the privacy cut
feedbacks into pieces (shares) use
cryptographic tools
21Authentication and Trust in Pervasive Systems
22Mobile Requests
- Information exchange between mobile peers
(MANETs, VANETs) - Trajectory aware geocast request routing
- Construction for each query of an ad hoc overlay
of the peers that may participate to the delivery
of the requested data
23Data Replication in Small Worlds
24Replication in Ad Hoc Networks
- Issues instability, dynamicity,
faults/disconnections - Basic idea adapt the replication heuristics to
the actual usage of the data, e.g. - Data highly accessed gt replicate
- Rare data and planned disconnection gt replicate
- Overloaded peer gt replicate most accessed data
- Etc.
- Pre-requisite access logging exchange of
access data - Assumption no central coordination local
decisions - Question can local decisions lead to an
acceptable (good ?) situation ?
25Interface Adaptation and Context-Aware Browsing
of a Patient Medical Record
26Multimedia Content Adaptation
Adaptation of the interface wrt the end-user
device Ongoing Content Adaptation in MANETs
27Semantic Protection of Multimedia Data
- Multimedia gt access control is not a binary
decision - Access control ltgt content adaptation
- Coherence/Consistence of an adaptation
- Legality of an adaptation
- gt Access control semantic adaptation decision
28Semantic Clustering of Multimedia Queries From
Query Logging to Database Content and User
Profile Discovery
- Large number of data stores disseminated
- Lack of indexes
- Issues
- What are the pertinent/interesting data ?
- What are the users interest ?
- How to process a query ?
- Logging of the users queries clustering
communication of clustering info gt
identification of the community of users
interests - Logging of a the queries issued by a specific
user matching to the community clustering gt
identification of the users profile - Usage query optimization, data store management,
recommendation, social computing, etc.
29BAR-Tolerant Publish-subscribe P2P
SystemsCollaboration Modeling and Enhancing a
Game Theoretical Approach
- Byzantine-Altruistic-Rational
- Publish an information disseminate the
information to subscribers - Systems benchmarking tool
- GT modeling of collaborative systems
30Ambient Social Networks andMessage Routing in DTN
- Ambient social networks
- Delay Tolerant Networks (DTN) and Opportunistic
Networks - Mobility traces/model
- Message routing
31Ongoing workUser-centric Ubiquitous
Multi-ScaleDigital Ecosystems
- Information retrieval in P2P systems
- Privacy-preserving personal data mining (EEXCESS
project) - Privacy-preserving recommendation systems
(EEXCESS project) - Privacy-preserving multimedia data routing
- Open data and user-as-sensor based ambient social
services - Game-theory-based cooperation modeling and
enhancing in distributed systems - Trust and reputation in B2B networks
(AttestationLegale) - Information protection in clouds
- Social-aware event driven architectures
- Mobile Crowd Sourcing, Sensing, and Computing
Intelligence, Aggregation, Resilience - (if opportunity) Adaptive and information
value-based protection of business processes - (if opportunity) Security of the social web of
things - ???
32- Faites de la recherche
- (au moins un peu)
- ? !