4.3 Article

BCALS: Blockchain-based secure log management system for cloud computing

Publisher

WILEY
DOI: 10.1002/ett.4272

Keywords

-

Funding

  1. European Union's Horizon 2020 research and innovation programme under the Marie Skodowska-Curie [801522]
  2. Science Foundation Ireland
  3. European Regional Development Fund through the ADAPT Centre for Digital Content Technology [13/RC/2106_P2]

Ask authors/readers for more resources

A robust process to track user activities in a computing environment is crucial, with blockchain technology being proposed as an effective solution for audit log management to enhance security and trust in the system.
A computing environment requires a robust and comprehensive process to track and document user activities to uphold confidence in the system. Audit logs are used for this purpose to monitor the actions of administrators and users. However, these logs are vulnerable to multidimensional attacks, including modification of logs, erasability of logs, and privacy of the user. Since administrators have unprecedented access to these logs, they can modify, delete, and even destroy them. Securing these logs against malicious activities is the prime requirement of audit log management. Existing schemes have several limitations, including immutability, computational expensiveness, missing semantics, and are not verifiable. Various schemes have been proposed for this purpose, but a standard method is required to structure heterogeneous logs and their security semantically. To cope with these limitations, in this paper, we propose a Log Management System using blockchain. The proposed system will ensure audit logs' security, which will eventually strengthen users' trust in the computing environment and make it unbreachable even by the administrators. It has been evinced that our model performed better in terms of performance and features already mentioned when compared with existing schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.3
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Artificial Intelligence

VisTAS: blockchain-based visible and trusted remote authentication system

Ahmad Ali, Mansoor Ahmed, Abid Khan, Adeel Anjum, Muhammad Ilyas, Markus Helfert

Summary: The information security domain focuses on protecting security needs in various implementation methods for data, devices, services, and communication, with authentication and identity management being key topics, while distributed ledger technology ensures visible security and non-repudiation.

PEERJ COMPUTER SCIENCE (2021)

Article Multidisciplinary Sciences

Audit Logs Management and Security - A Survey

Ahmad Ali, Mansoor Ahmed, Abid Khan

Summary: Audit logs are crucial resources for examining system and user activities, playing a key role in system security and troubleshooting. The management and archival of audit logs are crucial for ensuring trouble-free availability of computing resources and meaningful forensic audit, facing various security threats and management challenges.

KUWAIT JOURNAL OF SCIENCE (2021)

Article Computer Science, Artificial Intelligence

A semantic rule based digital fraud detection

Mansoor Ahmed, Kainat Ansar, Cal B. Muckley, Abid Khan, Adeel Anjum, Muhammad Talha

Summary: Digital fraud has impacted ordinary consumers and the finance industry, leading to efforts to improve fraud detection and deterrence capabilities. The proposed solution in this study involves an Intimation Rule Based alert generation algorithm, utilizing a rich domain knowledge base and rule-based reasoning.

PEERJ COMPUTER SCIENCE (2021)

Article Automation & Control Systems

Energy Theft Detection in Smart Grids: Taxonomy, Comparative Analysis, Challenges, and Future Research Directions

Mohsin Ahmed, Abid Khan, Mansoor Ahmed, Mouzna Tahir, Gwanggil Jeon, Giancarlo Fortino, Francesco Piccialli

Summary: This article presents a detailed survey on the issue of electricity theft in developing countries, analyzing the strengths and limitations of state-of-the-art energy theft detection techniques. It introduces a taxonomy for classifying these techniques and summarizes the different types and consequences of energy theft. The article also extracts parameters from literature to benchmark the performance of proposed techniques and suggests challenges and mitigation strategies for future work. It highlights the lack of effective knowledge management techniques in the field of electricity theft detection, which should be further researched.

IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2022)

Article Computer Science, Information Systems

Deep-Confidentiality: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data

Syed Atif Moqurrab, Adeel Anjum, Abid Khan, Mansoor Ahmed, Awais Ahmad, Gwanggil Jeon

Summary: With the evolution of the Internet of Things, clinical data is growing exponentially and utilizing smart technologies. The generated big biomedical data is confidential due to containing personal information and findings of patients. While sharing such sensitive data helps uncover useful aspects, it also poses certain privacy threats. Current research studies on mitigating privacy breaches in textual clinical data have limitations and shortcomings. In this article, a novel framework called Deep-Confidentiality is proposed to enhance Medical Entity Recognition (MER) through deep neural networks and sanitization. Additionally, a new and generic utility metric is proposed to address the shortcomings of existing metrics. The effectiveness of the proposed framework is evaluated on the i2b2-2010 NLP challenge dataset, resulting in improvements in MER and data utility of sanitized documents.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2022)

Article Computer Science, Artificial Intelligence

Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends

Abid Khan, Awais Ahmad, Mansoor Ahmed, Jadran Sessa, Marco Anisetti

Summary: This article discusses the importance of scalable and secure authorization for smart things in the Internet of Things (IoT). It provides a comprehensive analysis of current IoT authorization schemes and highlights the challenges and threats in authorization. The article also suggests future research directions.

COMPLEX & INTELLIGENT SYSTEMS (2022)

Article Chemistry, Multidisciplinary

A Conceptual Model of Factors Influencing Customer Relationship Management in Global Software Development: A Client Perspective

Kausar-Nasreen Khattak, Mansoor Ahmed, Naeem Iqbal, Murad-Ali Khan, Imran, Jungsuk Kim

Summary: Due to the significance of outsourcing, the software development industry is increasingly adopting global software development practices. However, a lack of understanding customer perspective leads to many challenges and risks. Therefore, CRM is a crucial challenge in the success of software projects in the GSD environment. This research aims to address the negative factors influencing CRM implementation and proposes a conceptual model for enhancing software product quality.

APPLIED SCIENCES-BASEL (2022)

Review Chemistry, Analytical

Data Provenance in Healthcare: Approaches, Challenges, and Future Directions

Mansoor Ahmed, Amil Rohani Dar, Markus Helfert, Abid Khan, Jungsuk Kim

Summary: Data provenance is a method of recording data origins and the history of data generation and processing. In healthcare, it is important to implement data provenance to track the sources and reasons behind any issues with user data. This systematic review explores the impacts of data provenance in healthcare and GDPR-compliance-based data provenance, discussing the technologies and methodologies used to achieve it. The study identifies research gaps and suggests future directions.

SENSORS (2023)

Article Chemistry, Analytical

Enhancing Data Protection in Dynamic Consent Management Systems: Formalizing Privacy and Security Definitions with Differential Privacy, Decentralization, and Zero-Knowledge Proofs

Muhammad Irfan Khalid, Mansoor Ahmed, Jungsuk Kim

Summary: Dynamic consent management systems allow individuals to dynamically control access to their data. Security and privacy guarantees are crucial for the adoption of such systems, with specific data protection requirements needed for compliance with regulations like the GDPR. This paper explores data protection issues in dynamic consent management systems, identifying key security and privacy properties and discussing limitations in existing systems. It proposes using tools and technologies like differential privacy, blockchain, zero-knowledge proofs, and cryptogrpahic procedures to build secure and private dynamic consent management systems.

SENSORS (2023)

Article Computer Science, Information Systems

Blockchain-Based Software Effort Estimation: An Empirical Study

Mansoor Ahmed, Naeem Iqbal, Faraz Hussain, Murad-Ali Khan, Markus Helfert, Jungsuk Kim, Imran

Summary: This article proposes a Blockchain-Based Software Effort Estimation (BBSEE) methodology to enhance software effort estimation. Through several case studies and analysis of expert opinions, the superiority of the proposed method in software effort estimation is demonstrated.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

Analyzing COVID-19 Impact on the Researchers Productivity through Their Perceptions

Syeda Javeria Shoukat, Humaira Afzal, Muhammad Rafiq Mufti, Muhammad Khalid Sohail, Dost Muhammad Khan, Nadeem Akhtar, Shahid Hussain, Mansoor Ahmed

Summary: The study found a substantial impact of the COVID-19 pandemic on the productivity of researchers, particularly in terms of mental disturbance, lack of regular meetings, and field visits for data collection. It concluded that regular meetings with supervisors and colleagues are crucial for maintaining researchers' productivity. These findings can aid decision makers in devising successful organizational strategies.

CMC-COMPUTERS MATERIALS & CONTINUA (2021)

Article Computer Science, Information Systems

Analyzing COVID-2019 Impact on Mental Health Through Social Media Forum

Huma, Muhammad Khalid Sohail, Nadeem Akhtar, Dost Muhammad, Humaira Afzal, Muhammad Rafiq Mufti, Shahid Hussain, Mansoor Ahmed

Summary: This study aims to explore the potential association between mental health and social media forums during the COVID-19 pandemic. The excessive use of social media and misinformation have adversely affected mental health globally. Doctors are struggling to treat mental illnesses caused by the pandemic.

CMC-COMPUTERS MATERIALS & CONTINUA (2021)

Article Computer Science, Information Systems

Exploiting Ontology Recommendation Using Text Categorization Approach

Muhammad Azeem Sarwar, Mansoor Ahmed, Asad Habib, Muhammad Khalid, M. Akhtar Ali, Mohsin Raza, Shahid Hussain, Ghufran Ahmed

Summary: The proposed framework introduces an ontology recommendation system using text categorization and unsupervised learning techniques to address the challenges of selecting appropriate ontologies. It organizes ontologies based on domain expert opinions and recommends them according to user requirements.

IEEE ACCESS (2021)

No Data Available