Article
Engineering, Civil
Pradip Kumar Sharma, Jong Hyuk Park
Summary: Conventional centralized architectures struggle with the exponential growth of IoT devices in Intelligent Transportation Systems, leading to the proposal of a secure distributed mist computing network architecture leveraging blockchain technology. Experimental analysis revealed an 81% reduction in median latency at local nodes, indicating the model's effective performance across various ITS applications.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2021)
Article
Chemistry, Analytical
Otuekong Umoren, Raman Singh, Shahid Awan, Zeeshan Pervez, Keshav Dahal
Summary: Advancements in IoT and cloud computing have led to an increased number of connected edge devices in smart cities, raising security concerns. This research proposes a secure authentication mechanism utilizing the Neo blockchain platform, which offers improved security and faster execution. The proposed mechanism is shown to be significantly faster and more efficient compared to existing methods.
Article
Computer Science, Theory & Methods
Yongjun Ren, Ding Huang, Wenhai Wang, Xiaofeng Yu
Summary: This paper designs a blockchain-based secure storage mechanism (BSMD) to address the storage issue of massive data. The mechanism adopts an on-chain and off-chain cooperative storage model and utilizes updatable subvector commitment for secure authentication protocol, ensuring consistency of on-chain and off-chain data, and batch processing capability. The correctness and security of the proposed protocol are proven, and the performance is analyzed.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2023)
Article
Telecommunications
Anichur Rahman, Md Jahidul Islam, Shahab S. Band, Ghulam Muhammad, Kamrul Hasan, Prayag Tiwari
Summary: Recent studies have highlighted the importance of new technologies such as Blockchain (BC), Software Defined Networking (SDN), and Smart Industrial Internet of Things (IIoT). These technologies offer data integrity, confidentiality, and integrity, particularly in industrial applications. Cloud computing, a well-established technology, is used to exchange sensitive information and provide remote access to computing and storage resources in the IIoT. However, cloud computing also presents significant security risks and challenges. To tackle these issues, this paper proposes a cloud computing platform for the IIoT that combines BC and SDN. The proposed architecture, named DistB-SDCloud, utilizes distributed BC for enhanced security, privacy, and integrity while maintaining flexibility and scalability. Furthermore, an SDN method is introduced to improve the durability, stability, and load balancing of the cloud infrastructure. The effectiveness of this implementation is experimentally tested using various parameters and monitoring attacks on the system.
DIGITAL COMMUNICATIONS AND NETWORKS
(2023)
Article
Computer Science, Information Systems
Jiaxing Li, Jigang Wu, Long Chen, Jin Li, Siew-Kei Lam
Summary: This paper proposes a blockchain-based key management scheme for MEC, enabling secure group communication among mobile devices as they move between subnetworks. The scheme uses lightweight key pairs and blockchain technology to provide encryption and identity verification, defending against attacks and protecting data privacy.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Computer Science, Information Systems
Yongkai Fan, Guanqun Zhao, Xia Lei, Wei Liang, Kuan-Ching Li, Kim-Kwang Raymond Choo, Chunsheng Zhu
Summary: The article proposes a secure Blockchain-based scheme to guarantee the credibility of nodes and data in IoT and fog environments, demonstrating its feasibility through experiments.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
William Pourmajidi, Lei Zhang, John Steinbacher, Tony Erwin, Andriy Miranskyy
Summary: This article proposes a blockchain-based log storage system called Logchain to ensure the performance of Cloud solutions. Logchain utilizes the immutability feature of blockchain to provide a tamper-resistant platform for log storage and adopts a hierarchical structure to address scalability issues. The solution can function on private and public blockchains, making it a suitable alternative for organizations that require secure and immutable log storage platforms.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2023)
Article
Computer Science, Information Systems
Dan Wang, Ning Zhao, Bin Song, Peng Lin, F. Richard Yu
Summary: The evolution of the Internet of Things has led to a reliance on cloud/edge computing for cyber-physical systems, with an emphasis on security through blockchain technology. Minimizing system latency is crucial, especially in blockchain-empowered systems, to ensure efficient decision making and data security.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
P. G. Shynu, Varun G. Menon, R. Lakshmana Kumar, Seifedine Kadry, Yunyoung Nam
Summary: Fog computing offers latency-aware and highly scalable services to geographically dispersed end-users, while Blockchain technology is being widely adopted in financial transactions and other domains. This paper proposes Blockchain-based secure healthcare services for disease prediction in fog computing, with experimental results demonstrating its efficiency and accuracy.
Article
Public, Environmental & Occupational Health
Amna Amanat, Muhammad Rizwan, Carsten Maple, Yousaf Bin Zikria, Ahmad S. Almadhor, Sung Won Kim
Summary: Healthcare information is crucial for service providers and patients, and secure sharing and maintenance of Electronic Healthcare Records (EHR) are essential. Blockchain, a distributed ledger technology, can provide secured, validated, and immutable data sharing facilities, ensuring the authenticity and security of healthcare records.
FRONTIERS IN PUBLIC HEALTH
(2022)
Article
Computer Science, Artificial Intelligence
C. Edward Jaya Singh, C. Adline Sunitha
Summary: This paper proposes a secure image sharing method called BC-PMA, which uses blockchain technology to ensure the integrity and security of image data in a cloud computing environment. The method includes registration, authentication, and image sharing steps, ensuring accuracy and security through the use of chaotic and Paillier mapping techniques. Experimental results show that this method has high authentication accuracy and low false positive rates and computational costs.
EXPERT SYSTEMS WITH APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Jiahao Li, Dongmei Li, Xiaomei Zhang
Summary: IoT-based smart healthcare system enables remote monitoring and diagnosis of patients, alleviating overcrowding in hospitals. A blockchain-based access control scheme is proposed to protect patient privacy, and computational tasks are outsourced to fog nodes, enhancing system security and performance.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Automation & Control Systems
Xinyue Pei, Hua Yu, Xiaojie Wang, Yingyang Chen, Miaowen Wen, Yik-Chung Wu
Summary: The article proposes a NOMA-based PEC power allocation framework to minimize system latency in IoV, taking into account the presence of eavesdroppers, queuing models, imperfect channel state information, and vehicle speeds. By deriving suboptimal closed-form expressions for power allocation coefficients and introducing a Frank-and-Wold algorithm, the optimal total power is achieved, demonstrating superior performance of the proposed NOMA scheme through simulation results.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Computer Science, Information Systems
Fatemeh Ghovanlooy Ghajar, Axel Sikora, Dominik Welte
Summary: Industrial companies can use a blockchain-based architecture to enhance trust and security in the IoT. This architecture relies on trust management and reputation to improve nodes' trustworthiness, and it features a fully distributed system where decisions are made by consensus. The significance and authority of nodes are determined by their behavior in the network, based on game theory and an incentive mechanism for reputation. This system design can be implemented on legacy machines at a low cost, providing effective security for industrial IoT and existing blockchain frameworks.
Article
Computer Science, Information Systems
Aparna Kumari, Sudeep Tanwar
Summary: The proposed Q-SDRM scheme utilizes reinforcement learning and Ethereum blockchain technology to reduce energy consumption and costs effectively. Experimental results demonstrate significant reductions in energy consumption and costs, as well as secure real-time access to energy data.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Artificial Intelligence
Ahmad Ali, Mansoor Ahmed, Abid Khan, Adeel Anjum, Muhammad Ilyas, Markus Helfert
Summary: The information security domain focuses on protecting security needs in various implementation methods for data, devices, services, and communication, with authentication and identity management being key topics, while distributed ledger technology ensures visible security and non-repudiation.
PEERJ COMPUTER SCIENCE
(2021)
Article
Multidisciplinary Sciences
Ahmad Ali, Mansoor Ahmed, Abid Khan
Summary: Audit logs are crucial resources for examining system and user activities, playing a key role in system security and troubleshooting. The management and archival of audit logs are crucial for ensuring trouble-free availability of computing resources and meaningful forensic audit, facing various security threats and management challenges.
KUWAIT JOURNAL OF SCIENCE
(2021)
Article
Computer Science, Artificial Intelligence
Mansoor Ahmed, Kainat Ansar, Cal B. Muckley, Abid Khan, Adeel Anjum, Muhammad Talha
Summary: Digital fraud has impacted ordinary consumers and the finance industry, leading to efforts to improve fraud detection and deterrence capabilities. The proposed solution in this study involves an Intimation Rule Based alert generation algorithm, utilizing a rich domain knowledge base and rule-based reasoning.
PEERJ COMPUTER SCIENCE
(2021)
Article
Automation & Control Systems
Mohsin Ahmed, Abid Khan, Mansoor Ahmed, Mouzna Tahir, Gwanggil Jeon, Giancarlo Fortino, Francesco Piccialli
Summary: This article presents a detailed survey on the issue of electricity theft in developing countries, analyzing the strengths and limitations of state-of-the-art energy theft detection techniques. It introduces a taxonomy for classifying these techniques and summarizes the different types and consequences of energy theft. The article also extracts parameters from literature to benchmark the performance of proposed techniques and suggests challenges and mitigation strategies for future work. It highlights the lack of effective knowledge management techniques in the field of electricity theft detection, which should be further researched.
IEEE-CAA JOURNAL OF AUTOMATICA SINICA
(2022)
Article
Computer Science, Information Systems
Syed Atif Moqurrab, Adeel Anjum, Abid Khan, Mansoor Ahmed, Awais Ahmad, Gwanggil Jeon
Summary: With the evolution of the Internet of Things, clinical data is growing exponentially and utilizing smart technologies. The generated big biomedical data is confidential due to containing personal information and findings of patients. While sharing such sensitive data helps uncover useful aspects, it also poses certain privacy threats. Current research studies on mitigating privacy breaches in textual clinical data have limitations and shortcomings. In this article, a novel framework called Deep-Confidentiality is proposed to enhance Medical Entity Recognition (MER) through deep neural networks and sanitization. Additionally, a new and generic utility metric is proposed to address the shortcomings of existing metrics. The effectiveness of the proposed framework is evaluated on the i2b2-2010 NLP challenge dataset, resulting in improvements in MER and data utility of sanitized documents.
ACM TRANSACTIONS ON INTERNET TECHNOLOGY
(2022)
Article
Computer Science, Artificial Intelligence
Abid Khan, Awais Ahmad, Mansoor Ahmed, Jadran Sessa, Marco Anisetti
Summary: This article discusses the importance of scalable and secure authorization for smart things in the Internet of Things (IoT). It provides a comprehensive analysis of current IoT authorization schemes and highlights the challenges and threats in authorization. The article also suggests future research directions.
COMPLEX & INTELLIGENT SYSTEMS
(2022)
Article
Chemistry, Multidisciplinary
Kausar-Nasreen Khattak, Mansoor Ahmed, Naeem Iqbal, Murad-Ali Khan, Imran, Jungsuk Kim
Summary: Due to the significance of outsourcing, the software development industry is increasingly adopting global software development practices. However, a lack of understanding customer perspective leads to many challenges and risks. Therefore, CRM is a crucial challenge in the success of software projects in the GSD environment. This research aims to address the negative factors influencing CRM implementation and proposes a conceptual model for enhancing software product quality.
APPLIED SCIENCES-BASEL
(2022)
Review
Chemistry, Analytical
Mansoor Ahmed, Amil Rohani Dar, Markus Helfert, Abid Khan, Jungsuk Kim
Summary: Data provenance is a method of recording data origins and the history of data generation and processing. In healthcare, it is important to implement data provenance to track the sources and reasons behind any issues with user data. This systematic review explores the impacts of data provenance in healthcare and GDPR-compliance-based data provenance, discussing the technologies and methodologies used to achieve it. The study identifies research gaps and suggests future directions.
Article
Chemistry, Analytical
Muhammad Irfan Khalid, Mansoor Ahmed, Jungsuk Kim
Summary: Dynamic consent management systems allow individuals to dynamically control access to their data. Security and privacy guarantees are crucial for the adoption of such systems, with specific data protection requirements needed for compliance with regulations like the GDPR. This paper explores data protection issues in dynamic consent management systems, identifying key security and privacy properties and discussing limitations in existing systems. It proposes using tools and technologies like differential privacy, blockchain, zero-knowledge proofs, and cryptogrpahic procedures to build secure and private dynamic consent management systems.
Article
Computer Science, Information Systems
Mansoor Ahmed, Naeem Iqbal, Faraz Hussain, Murad-Ali Khan, Markus Helfert, Jungsuk Kim, Imran
Summary: This article proposes a Blockchain-Based Software Effort Estimation (BBSEE) methodology to enhance software effort estimation. Through several case studies and analysis of expert opinions, the superiority of the proposed method in software effort estimation is demonstrated.
Article
Computer Science, Information Systems
Syeda Javeria Shoukat, Humaira Afzal, Muhammad Rafiq Mufti, Muhammad Khalid Sohail, Dost Muhammad Khan, Nadeem Akhtar, Shahid Hussain, Mansoor Ahmed
Summary: The study found a substantial impact of the COVID-19 pandemic on the productivity of researchers, particularly in terms of mental disturbance, lack of regular meetings, and field visits for data collection. It concluded that regular meetings with supervisors and colleagues are crucial for maintaining researchers' productivity. These findings can aid decision makers in devising successful organizational strategies.
CMC-COMPUTERS MATERIALS & CONTINUA
(2021)
Article
Computer Science, Information Systems
Huma, Muhammad Khalid Sohail, Nadeem Akhtar, Dost Muhammad, Humaira Afzal, Muhammad Rafiq Mufti, Shahid Hussain, Mansoor Ahmed
Summary: This study aims to explore the potential association between mental health and social media forums during the COVID-19 pandemic. The excessive use of social media and misinformation have adversely affected mental health globally. Doctors are struggling to treat mental illnesses caused by the pandemic.
CMC-COMPUTERS MATERIALS & CONTINUA
(2021)
Article
Computer Science, Information Systems
Muhammad Azeem Sarwar, Mansoor Ahmed, Asad Habib, Muhammad Khalid, M. Akhtar Ali, Mohsin Raza, Shahid Hussain, Ghufran Ahmed
Summary: The proposed framework introduces an ontology recommendation system using text categorization and unsupervised learning techniques to address the challenges of selecting appropriate ontologies. It organizes ontologies based on domain expert opinions and recommends them according to user requirements.