4.7 Article

Protection of records and data authentication based on secret shares and watermarking

Publisher

ELSEVIER
DOI: 10.1016/j.future.2019.01.050

Keywords

-

Funding

  1. Deanship of Scientific Research, King Saud University, Riyadh, Saudi Arabia [RG-1439-036]
  2. BTIIC (BT Ireland Innovation Centre) - BT
  3. Invest Northern Ireland, UK

Ask authors/readers for more resources

The rapid growth in communication technology facilitates the health industry in many aspects from transmission of sensor's data to real-time diagnosis using cloud-based frameworks. However, the secure transmission of data and its authenticity become a challenging task, especially, for health-related applications. The medical information must be accessible to only the relevant healthcare staff to avoid any unfortunate circumstances for the patient as well as for the healthcare providers. Therefore, a method to protect the identity of a patient and authentication of transmitted data is proposed in this study. The proposed method provides dual protection. First, it encrypts the identity using Shamir's secret sharing scheme without the increase in dimension of the original identity. Second, the identity is watermarked using zero-watermarking to avoid any distortion into the host signal. The experimental results show that the proposed method encrypts, embeds and extracts identities reliably. Moreover, in case of malicious attack, the method distorts the embedded identity which provides a clear indication of fabrication. An automatic disorder detection system using Mel-frequency cepstral coefficients and Gaussian mixture model is also implemented which concludes that malicious attacks greatly impact on the accurate diagnosis of disorders. (C) 2019 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Engineering, Electrical & Electronic

SOS: Socially omitting selfishness in IoT for smart and connected communities

Ghani Ur Rehman, Anwar Ghani, Muhammad Zubair, Muhammad Imran Saeed, Dhananjay Singh

Summary: Smart and connected communities (SCC) is an emerging field of internet of things (IoT) that has the potential to improve human life in terms of preservation, revitalization, livability, and sustainability of a community. To encourage cooperation and discourage selfish behavior, a novel mechanism called socially omitting selfishness (SOS) has been proposed, which utilizes a socially oriented election process and an extended version of the Dempster Shafer model.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

A smart healthcare framework for detection and monitoring of COVID-19 using IoT and cloud computing

Nidal Nasser, Qazi Emad-ul-Haq, Muhammad Imran, Asmaa Ali, Imran Razzak, Abdulaziz Al-Helali

Summary: This study proposes an intelligent healthcare system based on IoT-cloud technologies for real-time patient tracking and reliable COVID-19 detection. By utilizing deep learning algorithms and state-of-the-art classification techniques, the system achieves high accuracy and effectiveness in processing CT scan images.

NEURAL COMPUTING & APPLICATIONS (2023)

Article Computer Science, Information Systems

Formal Modeling and Verification of a Blockchain-Based Crowdsourcing Consensus Protocol

Hamra Afzaal, Muhammad Imran, Muhammad Umar Janjua, Sarada Prasad Gochhayat

Summary: This paper proposes a secure and trustworthy blockchain-based crowdsourcing consensus protocol, which is verified for correctness through model checking and formal methods to prevent security attacks.

IEEE ACCESS (2022)

Article Computer Science, Artificial Intelligence

Automated methods for diagnosis of Parkinson's disease and predicting severity level

Zainab Ayaz, Saeeda Naz, Naila Habib Khan, Imran Razzak, Muhammad Imran

Summary: The recent advancements in information technology and bioinformatics have significantly contributed to medical sciences. Artificial intelligence has been widely utilized in the diagnosis of Parkinson's disease, with promising results achieved using different datasets and techniques.

NEURAL COMPUTING & APPLICATIONS (2023)

Article Computer Science, Hardware & Architecture

Framework for Effective Utilization of Distributed Scrum in Software Projects

Basit Shahzad, Wardah Naeem Awan, Fazal-E-Amin, Ahsanullah Abro, Muhammad Shoaib, Sultan Alyahya

Summary: This study investigates the challenges and mitigation strategies of using Scrum in Global Software Development (GSD) through a systematic literature review and an industrial survey. The findings are consolidated into a research framework that is validated by experts and deemed helpful in addressing the identified challenges in distributed Scrum.

COMPUTER SYSTEMS SCIENCE AND ENGINEERING (2023)

Article Automation & Control Systems

Data Evolution Governance for Ontology-Based Digital Twin Product Lifecycle Management

Zijie Ren, Jianhua Shi, Muhammad Imran

Summary: Product lifecycle management is an effective method for enhancing the market competitiveness of modern manufacturing industries. The digital twin, with its integration of physics and information systems, provides a technical means to integrate multisource information and overcome communication barriers in the lifecycle. However, there is a lack of focus on twin data and its evolution mechanisms, limiting the full potential of digital twin technology in global data resource management.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Information Systems

Malicious Node Detection Using Machine Learning and Distributed Data Storage Using Blockchain in WSNs

Muhammad Nouman, Umar Qasim, Hina Nasir, Abdullah Almasoud, Muhammad Imran, Nadeem Javaid

Summary: In this study, blockchain is used to register nodes and address security issues at Base Stations and Cluster Heads. A Machine Learning classifier called HGB is used to classify nodes as malicious or legitimate. Malicious nodes are revoked from the network, while legitimate nodes have their data stored in IPFS with their hashes stored in blockchain. Performance evaluation shows that HGB outperforms other classifiers and VBFT performs better than PoW. Furthermore, the proposed model efficiently detects malicious nodes and ensures secure data storage.

IEEE ACCESS (2023)

Article Automation & Control Systems

A Data Reporting Protocol With Revocable Anonymous Authentication for Edge-Assisted Intelligent Transport Systems

Yanping Wang, Xiaofen Wang, Hong-Ning Dai, Xiaosong Zhang, Muhammad Imran

Summary: Intelligent Transport Systems (ITS) have attracted attention due to advances in the Industrial Internet of Vehicles (IIoV). However, existing data reporting protocols for ITS have limitations in terms of storage, computation costs, and revocation of malicious users. This paper proposes a novel data reporting protocol for edge-assisted ITS that addresses these issues, achieving better performance and security.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Green & Sustainable Science & Technology

A Content Poisoning Attack Detection and Prevention System in Vehicular Named Data Networking

Arif Hussain Magsi, Leanna Vidya Yovita, Ali Ghulam, Ghulam Muhammad, Zulfiqar Ali

Summary: A threshold-based content caching mechanism is proposed to detect and prevent content poisoning attacks, along with the integration of a blockchain system for privacy protection and network extension. Experimental results show that the mechanism achieves a 100% accuracy in identifying and preventing attackers, while effectively filtering out malicious blocks.

SUSTAINABILITY (2023)

Article Chemistry, Multidisciplinary

Impact of Traditional and Embedded Image Denoising on CNN-Based Deep Learning

Roopdeep Kaur, Gour Karmakar, Muhammad Imran

Summary: This paper investigates the importance of denoising in digital image processing and compares the performance of traditional and embedded denoising methods. The experimental results show that traditional denoising methods have better accuracy, while embedded denoising methods have lower computational time.

APPLIED SCIENCES-BASEL (2023)

Article Computer Science, Information Systems

Effective Multitask Deep Learning for IoT Malware Detection and Identification Using Behavioral Traffic Analysis

Sajid Ali, Omar Abusabha, Farman Ali, Muhammad Imran, Tamer Abuhmed

Summary: Despite the increasing threat of IoT-specific malware, assessing IoT systems' security and developing mitigation measures are critical. This study proposes a multitask DL model using LSTM for detecting IoT malware, achieving high accuracy in tasks of determining benign/malicious traffic and identifying malware types. Traffic data from 18 IoT devices were used for training and feature selection enhanced the model's performance.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2023)

Article Mathematics

An Optimized Hybrid Deep Intrusion Detection Model (HD-IDM) for Enhancing Network Security

Iftikhar Ahmad, Muhammad Imran, Abdul Qayyum, Muhammad Sher Ramzan, Madini O. Alassafi

Summary: This research proposes a new hybrid deep learning intrusion detection model called HD-IDM, which combines GRU and LSTM classifiers for analyzing network traffic. HD-IDM achieves remarkable performance on multiple datasets, with outstanding accuracy and precision for classification tasks. However, it has limitations such as the need for labeled data and potential challenges in handling new intrusion methods.

MATHEMATICS (2023)

Article Computer Science, Information Systems

Multi-Slope Path Loss Model-Based Performance Assessment of Heterogeneous Cellular Network in 5G

Safia Amir Dahri, Muhammad Mujtaba Shaikh, Musaed Alhussein, Muhammad Afzal Soomro, Khursheed Aurangzeb, Muhammad Imran

Summary: The coverage and capacity required for 5G and beyond can be achieved using heterogeneous wireless networks. This study explores various factors such as distance, line of sight, idle mode capability, and path loss models to improve the performance of 5G networks. The installation of directional antennas at macro base stations and omnidirectional antennas at pico base stations significantly improves coverage and area spectral efficiency.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

A Blockchain-Based Deep-Learning-Driven Architecture for Quality Routing in Wireless Sensor Networks

Zahoor Ali Khan, Sana Amjad, Farwa Ahmed, Abdullah M. Almasoud, Muhammad Imran, Nadeem Javaid

Summary: Wireless sensor networks (WSNs) have gained great importance in various domains like healthcare, military, and social products, but they are vulnerable to attacks due to their heterogeneous nature. This research proposes a network with deep learning (DL) techniques and a blockchain-based real-time message content validation (RMCV) scheme to detect malicious nodes (MNs) in WSNs. DL models are trained on a dataset generated from the routing protocols, and a decentralized blockchain is deployed on cluster heads (CHs) and the base station (BS) to overcome single point of failure. RMCV and DL techniques are used to remove MNs, and legitimate nodes (LNs) are registered using a proof-of-authority consensus protocol. The routing results are compared with original protocols, and the accuracy of different DL techniques is evaluated. Oyente is used for formal security analysis of the smart contract, proving the resilience of the blockchain network against vulnerabilities.

IEEE ACCESS (2023)

Article Engineering, Multidisciplinary

Second-law analysis of nanofluid-based photovoltaic/thermal system modeling and forecasting model based on artificial neural network

Amjad Ali, Khursheed Aurangzeb, Muhammad Shoaib, Musaed Alhussein, Muhammad Zeeshan Malik

Summary: This paper examines the irreversibilities of the Al2O3-Cu/water hybrid nanofluid in a PVT solar collector. The results show that the double serpentine (DS) channel has lower frictional and thermal entropy generation rates compared to the single serpentine (SS) channel. Additionally, nanoparticle concentration and fluid velocity also affect the entropy generation rates.

ENGINEERING ANALYSIS WITH BOUNDARY ELEMENTS (2023)

Editorial Material Computer Science, Theory & Methods

Artificial intelligence in biomedical big data and digital healthcare

Kiho Lim, Christian Esposito, Tian Wang, Chang Choi

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Editorial Material Computer Science, Theory & Methods

Cluster and cloud computing for life sciences

Jesus Carretero, Dagmar Krefting

Summary: Computational methods play a crucial role in bioinformatics and biomedicine, especially in managing large-scale data and simulating complex models. This special issue focuses on security and performance aspects in infrastructure, optimization for popular applications, and the integration of machine learning and data processing platforms to improve the efficiency and accuracy of bioinformatics.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Adaptive asynchronous federated learning

Renhao Lu, Weizhe Zhang, Qiong Li, Hui He, Xiaoxiong Zhong, Hongwei Yang, Desheng Wang, Zenglin Xu, Mamoun Alazab

Summary: Federated Learning allows collaborative training of AI models with local data, and our proposed FedAAM scheme improves convergence speed and training efficiency through an adaptive weight allocation strategy and asynchronous global update rules.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

METSM: Multiobjective energy-efficient task scheduling model for an edge heterogeneous multiprocessor system

Qiangqiang Jiang, Xu Xin, Libo Yao, Bo Chen

Summary: This paper proposes a multi-objective energy-efficient task scheduling technique (METSM) for edge heterogeneous multiprocessor systems. A mathematical model is established for the task scheduling problem, and a problem-specific algorithm (IMO) is designed for optimizing task scheduling and resource allocation. Experimental results show that the proposed algorithm can achieve optimal Pareto fronts and significantly save time and power consumption.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Editorial Material Computer Science, Theory & Methods

Preface of special issue on heterogeneous information network embedding and applications

Weimin Li, Lu Liu, Kevin I. K. Wang, Qun Jin

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Group key management in the Internet of Things: Handling asynchronicity

Mohammed Riyadh Abdmeziem, Amina Ahmed Nacer, Nawfel Moundji Deroues

Summary: Internet of Things (IoT) devices have become ubiquitous and brought the need for group communications. However, security in group communications is challenging due to the asynchronous nature of IoT devices. This paper introduces an innovative approach using blockchain technology and smart contracts to ensure secure and scalable group communications.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Multi-task peer-to-peer learning using an encoder-only transformer model

Robert Sajina, Nikola Tankovic, Ivo Ipsic

Summary: This paper presents and evaluates a novel approach that utilizes an encoder-only transformer model to enable collaboration between agents learning two distinct NLP tasks. The evaluation results demonstrate that collaboration among agents, even when working towards separate objectives, can result in mutual benefits.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

On the impact of event-driven architecture on performance: An exploratory study

Hebert Cabane, Kleinner Farias

Summary: Event-driven architecture has been widely adopted in the software industry for its benefits in software modularity and performance. However, there is a lack of empirical evidence to support its impact on performance. This study compares the performance of an event-driven application with a monolithic application and finds that the monolithic architecture consumes fewer computational resources and has better response times.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Federated Deep Learning for Wireless Capsule Endoscopy Analysis: Enabling Collaboration Across Multiple Data Centers for Robust Learning of Diverse Pathologies

Haroon Wahab, Irfan Mehmood, Hassan Ugail, Javier Del Ser, Khan Muhammad

Summary: Wireless capsule endoscopy (WCE) is a revolutionary diagnostic method for small bowel pathology. However, the manual analysis of WCE videos is cumbersome and the privacy concerns of WCE data hinder the adoption of AI-based diagnoses. This study proposes a federated learning framework for collaborative learning from multiple data centers, demonstrating improved anomaly classification performance while preserving data privacy.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

A sustainable Bitcoin blockchain network through introducing dynamic block size adjustment using predictive analytics

Maruf Monem, Md Tamjid Hossain, Md. Golam Rabiul Alam, Md. Shirajum Munir, Md. Mahbubur Rahman, Salman A. AlQahtani, Samah Almutlaq, Mohammad Mehedi Hassan

Summary: Bitcoin, the largest cryptocurrency, faces challenges in broader adaption due to long verification times and high transaction fees. To tackle these issues, researchers propose a learning framework that uses machine learning to predict the ideal block size in each block generation cycle. This model significantly improves the block size, transaction fees, and transaction approval rate of Bitcoin, addressing the long wait time and broader adaption problem.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Leveraging a visual language for the awareness-based design of interaction requirements in digital twins

Rafael Duque, Crescencio Bravo, Santos Bringas, Daniel Postigo

Summary: This paper introduces the importance of user interfaces for digital twins and presents a technique called ADD for modeling requirements of Human-DT interaction. A study is conducted to assess the feasibility and utility of ADD in designing user interfaces, using the virtualization of a natural space as a case study.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Performance analysis of parallel composite service-based applications in clouds

Xiulin Li, Li Pan, Wei Song, Shijun Liu, Xiangxu Meng

Summary: This article proposes a novel multiclass multi-pool analytical model for optimizing the quality of composite service applications deployed in the cloud. By considering embarrassingly parallel services and using differentiated parallel processing mechanisms, the model provides accurate prediction results and significantly reduces job response time.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Unraveling the MEV enigma: ABI-free detection model using Graph Neural Networks

Seongwan Park, Woojin Jeong, Yunyoung Lee, Bumho Son, Huisu Jang, Jaewook Lee

Summary: In this paper, a novel MEV detection model called ArbiNet is proposed, which offers a low-cost and accurate solution for MEV detection without requiring knowledge of smart contract code or ABIs.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

ExDe: Design space exploration of scheduler architectures and mechanisms for serverless data-processing

Sacheendra Talluri, Nikolas Herbst, Cristina Abad, Tiziano De Matteis, Alexandru Iosup

Summary: Serverless computing is increasingly used in data-processing applications. This paper presents ExDe, a framework for systematically exploring the design space of scheduling architectures and mechanisms, to help system designers tackle complexity.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

FedBnR: Mitigating federated learning Non-IID problem by breaking the skewed task and reconstructing representation

Chao Wang, Hui Xia, Shuo Xu, Hao Chi, Rui Zhang, Chunqiang Hu

Summary: This paper introduces a Federated Learning framework called FedBnR to address the issue of potential data heterogeneity in distributed entities. By breaking up the original task into multiple subtasks and reconstructing the representation using feature extractors, the framework improves the learning performance on heterogeneous datasets.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)