{"id":5369,"date":"2022-11-28T11:10:50","date_gmt":"2022-11-28T10:10:50","guid":{"rendered":"https:\/\/samovar.telecom-sudparis.eu\/?p=5369"},"modified":"2022-11-28T11:13:14","modified_gmt":"2022-11-28T10:13:14","slug":"avis-de-soutenance-de-madame-souha-masmoudi","status":"publish","type":"post","link":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/2022\/11\/28\/avis-de-soutenance-de-madame-souha-masmoudi\/","title":{"rendered":"\u00a0AVIS DE SOUTENANCE de Madame Souha MASMOUDI"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">L&rsquo;Ecole doctorale : Ecole Doctorale de l&rsquo;Institut Polytechnique de Paris<br>et le Laboratoire de recherche SAMOVAR &#8211; Services r\u00e9partis, Architectures, MOd\u00e9lisation, Validation, Administration des R\u00e9seaux<\/h2>\n\n\n\n<p>pr\u00e9sentent<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">l\u2019AVIS DE SOUTENANCE de Madame Souha MASMOUDI<\/h2>\n\n\n\n<p>Autoris\u00e9e \u00e0 pr\u00e9senter ses travaux en vue de l\u2019obtention du Doctorat de l&rsquo;Institut Polytechnique de Paris, pr\u00e9par\u00e9 \u00e0 T\u00e9l\u00e9com SudParis en :<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Informatique<\/h2>\n\n\n\n<h1 class=\"wp-block-heading\">\u00ab Des technologies mall\u00e9ables pr\u00e9servant la vie priv\u00e9e pour des syst\u00e8mes de gestion des identit\u00e9s respectueux de la vie priv\u00e9e \u00bb<\/h1>\n\n\n\n<p>le vendredi 9 d\u00e9cembre 2022 \u00e0 14h00<\/p>\n\n\n\n<p>Salle des conseils, b\u00e2timent Etoile<br>9 Rue Charles Fourier, 91011, Evry<\/p>\n\n\n\n<p><strong>Membres du jury :<\/strong><\/p>\n\n\n\n<p><strong>Mme Maryline\u00a0LAURENT<\/strong>, Professeure, T\u00e9l\u00e9com SudParis, FRANCE &#8211; Directrice de th\u00e8se<br><strong>M. S\u00e9bastien\u00a0CANARD<\/strong>, Ing\u00e9nieur de recherche, Orange Innovation Caen, FRANCE &#8211; Examinateur<br><strong>Mme Melek\u00a0ONEN<\/strong>, Ma\u00eetresse de conf\u00e9rences, EURECOM, FRANCE &#8211; Rapporteure<br><strong>M. Benjamin\u00a0NGUYEN<\/strong>, Professeur, INSA Centre Val de Loire, FRANCE &#8211; Examinateur<br><strong>Mme Estelle\u00a0CHERRIER <\/strong>, Ma\u00eetresse de conf\u00e9rences, ENSICAEN, FRANCE &#8211; Rapporteure<br><strong>M. Olivier\u00a0BLAZY<\/strong>, Professeur, Ecole Polytechnique, FRANCE &#8211; Examinateur<br><strong>Mme Nesrine\u00a0KAANICHE<\/strong>, Ma\u00eetresse de conf\u00e9rences, T\u00e9l\u00e9com SudParis, FRANCE &#8211; Co-encadrante de th\u00e8se<br><strong>M. Eric\u00a0TOTEL<\/strong>, Professeur, T\u00e9l\u00e9com SudParis, FRANCE &#8211; Examinateur<\/p>\n\n\n\n<p><br><strong>R\u00e9sum\u00e9 :<\/strong><\/p>\n\n\n\n<p>Les identit\u00e9s num\u00e9riques sont, de nos jours, utilis\u00e9es \u00e0 grande \u00e9chelle (par exemple, dans les services publics, les r\u00e9seaux sociaux, le travail, etc.). Cela n\u2019est pas sans poser des d\u00e9fis d&rsquo;utilisabilit\u00e9 car les utilisateurs sont contraints de g\u00e9rer de multiples identit\u00e9s et attributs pour des objectifs de contr\u00f4le d&rsquo;acc\u00e8s et de partage de donn\u00e9es. En outre, se posent des d\u00e9fis en s\u00e9curit\u00e9 et respect de la vie priv\u00e9e du fait que les entit\u00e9s en interaction, celles qui d\u00e9livrent, traitent et collectent ces identit\u00e9s peuvent du fait de leur comportement ou d\u2019insuffisances de s\u00e9curit\u00e9 aboutir aux vols d&rsquo;identit\u00e9, \u00e0 la collecte massive de donn\u00e9es et au tra\u00e7age des utilisateurs. Cette th\u00e8se vise \u00e0 trouver le meilleur compromis entre s\u00e9curit\u00e9, pr\u00e9servation de la vie priv\u00e9e et utilisabilit\u00e9 pour les syst\u00e8mes de gestion des identit\u00e9s, en s\u2019appuyant sur des primitives cryptographiques. Les deux premi\u00e8res contributions s\u2019int\u00e9ressent \u00e0 la gestion des identit\u00e9s pour le contr\u00f4le d\u2019acc\u00e8s et consid\u00e8rent des identit\u00e9s et attributs r\u00e9els qui contiennent des informations personnelles (ex : \u00e2ge) et sensibles (ex : caract\u00e9ristiques biom\u00e9triques). La premi\u00e8re contribution propose un syst\u00e8me de gestion des identit\u00e9s centr\u00e9 sur l&rsquo;utilisateur et respectueux de la vie priv\u00e9e dans lequel les utilisateurs gardent le contr\u00f4le sur leurs attributs. Un utilisateur, qui re\u00e7oit des attributs certifi\u00e9s par un fournisseur d&rsquo;identit\u00e9, peut interagir de fa\u00e7on pseudonymis\u00e9e avec un fournisseur de services et lui prouver l\u2019authenticit\u00e9 des attributs pr\u00e9sent\u00e9s tout en minimisant le nombre de ces attributs. Cette solution s\u2019appuie sur un nouveau sch\u00e9ma de signature mall\u00e9able qui permet aux utilisateurs de transformer le certificat issu du fournisseur d\u2019identit\u00e9s sur ses attributs de fa\u00e7on restreinte et contr\u00f4l\u00e9e. Elle pr\u00e9serve aussi la vie priv\u00e9e en satisfaisant les propri\u00e9t\u00e9s de non-associabilit\u00e9 entre des fournisseurs de services curieux qui tenteraient d\u2019associer diff\u00e9rentes transactions \u00e0 un m\u00eame utilisateur. La deuxi\u00e8me contribution porte sur un nouveau sch\u00e9ma d&rsquo;authentification biom\u00e9trique qui offre des garanties de robustesse et de respect de la vie priv\u00e9e. Trois \u00e9tapes sont n\u00e9cessaires. Tout d\u2019abord, l&rsquo;utilisateur se rend physiquement chez le fournisseur d\u2019identit\u00e9s qui pousse le mod\u00e8le biom\u00e9trique chiffr\u00e9 et certifi\u00e9 sur son smartphone. Puis il s\u2019enregistre \u00e0 distance aupr\u00e8s d&rsquo;un fournisseur de services, de fa\u00e7on anonyme. Enfin, il s\u2019authentifie hors ligne aupr\u00e8s du fournisseur de services qui capture la modalit\u00e9 biom\u00e9trique, cette modalit\u00e9 \u00e9tant v\u00e9rifi\u00e9e localement via le smartphone. En s&rsquo;appuyant sur des signatures mall\u00e9ables, la solution propos\u00e9e emp\u00eache l&rsquo;utilisation de fausses identit\u00e9s biom\u00e9triques et garantit la fiabilit\u00e9 de l&rsquo;authentification. La non-associabilit\u00e9 et l&rsquo;anonymat, sont aussi pr\u00e9serv\u00e9es. La troisi\u00e8me contribution apporte une solution au besoin de partager des donn\u00e9es dans un syst\u00e8me de gestion d\u2019identit\u00e9s, et en particulier \u00e9tudie la gestion des attributs \u00e9ph\u00e9m\u00e8res des utilisateurs dans le contexte du tra\u00e7age de proximit\u00e9 pour les syst\u00e8mes d\u2019e-sant\u00e9. La solution propos\u00e9e assure la coh\u00e9rence et l&rsquo;int\u00e9grit\u00e9 des donn\u00e9es et pr\u00e9serve la vie priv\u00e9e des utilisateurs qui partagent leurs informations de contact avec les personnes \u00e0 proximit\u00e9. Des alertes sont \u00e9mises vers les personnes ayant \u00e9t\u00e9 en contact avec des personnes infect\u00e9es. L\u2019architecture hybride utilis\u00e9e qui repose sur un serveur centralis\u00e9 et des proxies d\u00e9centralis\u00e9s emp\u00eache les utilisateurs malveillants d&rsquo;injecter de fausses alertes, et emp\u00eache de relier toute information de contact \u00e0 un m\u00eame utilisateur et de r\u00e9identifier les utilisateurs impliqu\u00e9s dans un contact avec une personne infect\u00e9e.<\/p>\n\n\n\n<p><br><strong>Abstract : \u00ab\u00a0Malleable Privacy-Enhancing-Technologies for Privacy-Preserving Identity Management Systems\u00a0\u00bb<\/strong><\/p>\n\n\n\n<p>Digital identities are, nowadays, used at a large scale (i.e., in public services, social medias, at work, online shopping, etc.). This brings usability issues as users are constrained to deal with multiple identities and attributes for access control and data sharing objectives. In addition, security and privacy challenges have arisen as the interacting entities, those that issue, process and collect these identities can, due to their behavior or security deficiencies, lead to identity theft, massive data collection and tracking of users&rsquo; behaviors on the Internet. This thesis aims at finding the best trade-off between security, privacy and usability for identity management systems, based on cryptographic primitives. The first two contributions focus on identity management for access control and consider real identities and attributes that contain personal (e.g., age) and sensitive (e.g., biometric traits) information. The first contribution proposes a user-centric and privacy-preserving identity management system in which users keep control over their attributes. A user, that receives attributes certified by an identity provider, is able to interact, in a pseudonymized manner, with a service provider and prove the authenticity of the provided attributes while ensuring that he discloses only the minimum number of attributes. This solution is based on a new malleable signature scheme that allows users to modify the certificate issued by the identity provider on his attributes in a restricted and controlled manner. It also preserves privacy by satisfying the unlinkability property between curious service providers that try to link different transactions to the same user. The second contribution presents a new biometric authentication scheme that offers robustness and privacy guarantees. Three steps are required. First, the user physically visits the identity provider that pushes an encrypted and certified biometric template onto his smartphone. Then he remotely enrolls at a service provider, in an anonymous manner. Finally, he authenticates offline to the service provider that captures a new biometric template in order to be locally verified via the smartphone. By relying on malleable signatures, the proposed solution prevents the use of fake biometric identities and guarantees the authentication soundness. Unlinkability and anonymity are also preserved. The third contribution provides a solution to meet the need of data sharing in an identity management system. In particular, it studies the management of users ephemeral attributes in the context of proximity tracing for e-healthcare systems. The proposed solution ensures data consistency and integrity and preserves the privacy of users who share their contact information with people in proximity. Alerts are issued to users who have been in contact with infected persons. The use of a hybrid architecture, which relies on a centralized server and decentralized proxies, allows to prevent malicious users from injecting false alerts, and to prevent the linkability of contact information to the same user and the re-identification of users involved in contact with an infected person.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;Ecole doctorale : Ecole Doctorale de l&rsquo;Institut Polytechnique de Pariset le Laboratoire de recherche SAMOVAR &#8211; Services r\u00e9partis, Architectures, MOd\u00e9lisation, Validation, Administration des R\u00e9seaux pr\u00e9sentent l\u2019AVIS DE SOUTENANCE de Madame Souha MASMOUDI Autoris\u00e9e \u00e0 pr\u00e9senter ses travaux en vue de l\u2019obtention du Doctorat de l&rsquo;Institut Polytechnique de Paris, pr\u00e9par\u00e9 \u00e0 T\u00e9l\u00e9com SudParis en : Informatique [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"off","ocean_gallery_id":[],"footnotes":""},"categories":[286,603],"tags":[],"class_list":["post-5369","post","type-post","status-publish","format-standard","hentry","category-fractualites-ennews-fr","category-seminaire-scn","entry"],"_links":{"self":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts\/5369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/comments?post=5369"}],"version-history":[{"count":1,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts\/5369\/revisions"}],"predecessor-version":[{"id":5370,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts\/5369\/revisions\/5370"}],"wp:attachment":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media?parent=5369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/categories?post=5369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/tags?post=5369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}