4.6 Article

Provenance based data integrity checking and verification in cloud environments

期刊

PLOS ONE
卷 12, 期 5, 页码 -

出版社

PUBLIC LIBRARY SCIENCE
DOI: 10.1371/journal.pone.0177576

关键词

-

向作者/读者索取更多资源

Cloud computing is a recent tendency in IT that moves computing and data away from desktop and hand-held devices into large scale processing hubs and data centers respectively. It has been proposed as an effective solution for data outsourcing and on demand computing to control the rising cost of IT setups and management in enterprises. However, with Cloud platforms user's data is moved into remotely located storages such that users lose control over their data. This unique feature of the Cloud is facing many security and privacy challenges which need to be clearly understood and resolved. One of the important concerns that needs to be addressed is to provide the proof of data integrity, i.e., correctness of the user's data stored in the Cloud storage. The data in Clouds is physically not accessible to the users. Therefore, a mechanism is required where users can check if the integrity of their valuable data is maintained or compromised. For this purpose some methods are proposed like mirroring, checksumming and using third party auditors amongst others. However, these methods use extra storage space by maintaining multiple copies of data or the presence of a third party verifier is required. In this paper, we address the problem of proving data integrity in Cloud computing by proposing a scheme through which users are able to check the integrity of their data stored in Clouds. In addition, users can track the violation of data integrity if occurred. For this purpose, we utilize a relatively new concept in the Cloud computing called Data Provenance. Our scheme is capable to reduce the need of any third party services, additional hardware support and the replication of data items on client side for integrity checking.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

Awareness and willingness to use PHR: a roadmap towards cloud-dew architecture based PHR framework

Fakhri Alam Khan, Attaur Rahman, Mafawez Alharbi, Yousef Kamel Qawqzeh

MULTIMEDIA TOOLS AND APPLICATIONS (2020)

Article Telecommunications

An analytic study of architecture, security, privacy, query processing, and performance evaluation of database-as-a-service

Fakhri Alam Khan, Mona Jamjoom, Awais Ahmad, Muhammad Asif

Summary: This article introduces the concept of database-as-a-service (DaaS) and discusses its architecture, security and privacy, and query processing. It also evaluates the query performance of encrypted data on DaaS through an analytic study. The evaluation shows that data encryption and decryption require significant processing power and time, and there are several query execution problems with encrypted data. Parallel query execution with maximum possible threads can greatly improve query performance.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2022)

Article Computer Science, Information Systems

Computer-aided diagnosis for burnt skin images using deep convolutional neural network

Fakhri Alam Khan, Ateeq Ur Rehman Butt, Muhammad Asif, Waqar Ahmad, Muhammad Nawaz, Mona Jamjoom, Eatedal Alabdulkreem

MULTIMEDIA TOOLS AND APPLICATIONS (2020)

Article Computer Science, Information Systems

Countering Malicious URLs in Internet of Things Using a Knowledge-Based Approach and a Simulated Expert

Sajid Anwar, Feras Al-Obeidat, Abdallah Tubaishat, Sadia Din, Awais Ahmad, Fakhri Alam Khan, Gwanggil Jeon, Jonathan Loo

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Construction & Building Technology

Blockchain technology, improvement suggestions, security challenges on smart grid and its application in healthcare for sustainable development

Fakhri Alam Khan, Muhammad Asif, Awais Ahmad, Mafawez Alharbi, Hanan Aljuaid

SUSTAINABLE CITIES AND SOCIETY (2020)

Article Computer Science, Information Systems

Convolutional neural network-based person tracking using overhead views

Misbah Ahmad, Imran Ahmed, Fakhri Alam Khan, Fawad Qayum, Hanan Aljuaid

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2020)

Article Computer Science, Information Systems

Trust-based energy-efficient routing protocol for Internet of things-based sensor networks

Muhammad Ilyas, Zahid Ullah, Fakhri Alam Khan, Muhammad Hasanain Chaudary, Muhammad Sheraz Arshed Malik, Zafar Zaheer, Hamood Ur Rehman Durrani

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2020)

Article Computer Science, Artificial Intelligence

Intrusion detection in networks using cuckoo search optimization

Muhammad Imran, Sangeen Khan, Helmut Hlavacs, Fakhri Alam Khan, Sajid Anwar

Summary: The study introduces a novel method for anomaly detection using artificial neural networks and cuckoo search algorithm, and demonstrates its superiority in network intrusion detection through empirical research.

SOFT COMPUTING (2022)

Article Computer Science, Artificial Intelligence

A word embedding technique for sentiment analysis of social media to understand the relationship between Islamophobic incidents and media portrayal of Muslim communities

Ishfaq Ali, Muhammad Asif, Isma Hamid, Muhammad Umer Sarwar, Fakhri Alam Khan, Yazeed Ghadi

Summary: This research examines the impact of mainstream news channel coverage on Islamophobic sentiments, using sentiment analysis and correlation analysis. It provides empirical evidence of how news stories can promote Islamophobic sentiments and atrocities towards Muslim communities.

PEERJ COMPUTER SCIENCE (2022)

Correction Computer Science, Information Systems

Computer-aided diagnosis for burnt skin images using deep convolutional neural network (vol 79, pg 34545, 2020)

Fakhri Alam Khan, Ateeq Ur Rehman Butt, Muhammad Asif, Waqar Ahmad, Muhammad Nawaz, Mona Jamjoom, Eatedal Alabdulkreem

MULTIMEDIA TOOLS AND APPLICATIONS (2022)

Article Computer Science, Artificial Intelligence

Energy optimization in smart urban buildings using bio-inspired ant colony optimization

Fakhri Alam Khan, Kifayat Ullah, Atta Ur Rahman, Sajid Anwar

Summary: This paper proposes a smart home energy management system using the HB-ACO algorithm to solve the scheduling problem in smart buildings. By shifting load from on-peak hours to off-peak hours, the system aims to reduce electricity cost and peak-to-average ratio. The HB-ACO algorithm shows better performance than other algorithms in terms of reducing electricity cost, PAR, and improving user comfort, as demonstrated by simulation results.

SOFT COMPUTING (2023)

Article Computer Science, Information Systems

Blockchain-Based Distributed Renewable Energy Management Framework

Shikah J. Alsunaidi, Fakhri Alam Khan

Summary: Many countries are focused on reducing harmful gas emissions, and Saudi Arabia has made significant efforts in utilizing renewable energy. Blockchain-based peer-to-peer networks can help overcome obstacles in managing distributed renewable energy systems, although scalability and productivity remain important considerations.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

Convolutional Neural Network for Histopathological Osteosarcoma Image Classification

Imran Ahmed, Humaira Sardar, Hanan Aljuaid, Fakhri Alam Khan, Muhammad Nawaz, Adnan Awais

Summary: This study proposes a compact CNN architecture, oversampling technique, and hierarchical CNN model to address the issue of class-imbalanced data in osteosarcoma histology images dataset, successfully improving generalization performance.

CMC-COMPUTERS MATERIALS & CONTINUA (2021)

Article Computer Science, Information Systems

Foreground detection using motion histogram threshold algorithm in high-resolution large datasets

Fakhri Alam Khan, Muhammad Nawaz, Muhammad Imran, Arif Ur Rahman, Fawad Qayum

Summary: The proposed algorithm achieves better accuracy in foreground detection by analyzing motion histograms to generate threshold values.

MULTIMEDIA SYSTEMS (2021)

Article Multidisciplinary Sciences

A word embedding technique for sentiment analysis of social media to understand the relationship between Islamophobic incidents and media portrayal of Muslim communities

Ishfaq Ali, Muhammad Asif, Isma Hamid, Muhammad Umer Sarwar, Fakhri Alam Khan, Yazeed Ghadi

Summary: This research investigates the correlation between how news stories covered by mainstream news channels impede the hate speech/Islamophobic sentiment, utilizing word embedding technique for sentiment analysis to reveal the impact of news reporting on promoting Islamophobic sentiments.
暂无数据