Article
Computer Science, Information Systems
Wei Tong, Wenjie Chen, Bingbing Jiang, Fengyuan Xu, Qun Li, Sheng Zhong
Summary: Mobile edge computing (MEC) is proposed as an extension of cloud computing to provide better services in terms of response time for end devices. We propose two integrity checking protocols (ICE-basic and ICE-batch) for mobile edge storage, allowing third-party verification while preserving data privacy. The protocols are proven to be secure and privacy-preserving, and caching verification tags on end devices reduces communication costs. Extensive experiments demonstrate the efficiency of the proposed protocols.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Chemistry, Analytical
Elizabeth Nathania Witanto, Brian Stanley, Sang-Gon Lee
Summary: Most existing data integrity auditing protocols in cloud storage rely on proof of probabilistic data possession, resulting in a low sampling rate for data integrity verification to prevent costly expenses for the auditor. However, in a multi-cloud environment with a large amount of stored data, a higher sampling rate is needed, leading to increased costs for the auditor. Therefore, this paper proposes a blockchain-based distributed data integrity verification protocol in multi-cloud environments that enables data verification using multi-verifiers. The proposed scheme aims to increase the sampling rate of data verification without significantly increasing costs.
Article
Computer Science, Information Systems
Yanping Li, Zirui Li, Bo Yang, Yong Ding
Summary: With the rapid development of Internet of Things, the integration of IoT and cloud is considered an effective solution to the limited storage and computing capabilities of IoT devices. However, the security risks of outsourced data stored in the cloud need to be addressed. This article proposes a public data integrity verification scheme, AIVCI, that efficiently checks data integrity, protects privacy, and improves auditing efficiency in Cloud-IoT scenarios.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2023)
Article
Computer Science, Information Systems
Shanshan Li, Chunxiang Xu, Yuan Zhang, Yicong Du, Anjia Yang, Xinsheng Wen, Kefei Chen
Summary: This article analyzes existing smart contract-based public data integrity verification schemes and identifies weaknesses in them. The fair arbitration mechanism in these schemes fails to promptly notify users of data corruption or loss, which does not meet the users' requirements. The conventional encrypted method used by existing schemes to ensure data confidentiality leads to additional storage costs for the cloud server due to varying ciphertexts for the same data. Users' devices, if poorly designed or backdoored, can compromise the security of the schemes. To address these issues, a new backdoor-resistant public data integrity verification scheme called ASSIST is proposed, which introduces a whistleblower entity to monitor the verification results and ensure timely notification of data corruption. ASSIST uses message-locked encryption to motivate the production of the same ciphertext for the same data and reduces storage costs. A cryptographic reverse firewall is deployed to prevent exfiltration from users' devices. Security proofs and performance evaluation demonstrate the efficiency and security of ASSIST.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Telecommunications
Wei Song, Yu Wu, Yihui Cui, Qilie Liu, Yuan Shen, Zicheng Qiu, Jianjun Yao, Zhiyong Peng
Summary: Cloud data sharing service is popular in enterprises as it allows a group of people to access and modify shared data. Recently, there is a trend of enterprises moving their IT service to the cloud for easier management and cost reduction. However, existing research on data integrity verification in the cloud has security and efficiency issues when revoked users are involved in the resigning process. Therefore, it is crucial to design a practical and efficient integrity verification scheme to address this problem.
DIGITAL COMMUNICATIONS AND NETWORKS
(2022)
Article
Computer Science, Information Systems
Yanyan Ji, Bilin Shao, Jinyong Chang, Genqing Bian
Summary: This paper discusses an improved approach to the provable data possession protocol, reducing communication overhead through flexible data splitting and tag aggregating techniques, and introducing identity-based signatures to make the protocol completely identity-based.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Qingxuan Wang, Chi Cheng, Rui Xu, Jintai Ding, Zhe Liu
Summary: The authors introduce the DOPIV scheme, which allows a data owner to delegate a proxy to generate data signatures and outsource them to a cloud server. They use a third-party auditor to verify the integrity of the outsourced data. However, the authors discover vulnerabilities in DOPIV that enable the cloud server to delete data without being noticed. They propose a simple and efficient solution to thwart this attack while maintaining all the claimed features of DOPIV.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Information Systems
Yiran Zhang, Huizheng Geng, Li Su, Li Lu
Summary: This paper proposes an efficient data integrity verification scheme using blockchain technology, which solves the problems of traditional centralized verification methods and provides higher security and efficiency.
Article
Computer Science, Information Systems
Miao Tian, Yushu Zhang, Youwen Zhu, Liangmin Wang, Yong Xiang
Summary: Cloud service is essential in people's lives for data storage, but it poses security risks as data owners lose control and possession of their data. The existing audit schemes are threatened by quantum computers, calling for a post-quantum secure data audit scheme.
COMPUTERS & SECURITY
(2023)
Article
Chemistry, Analytical
Xiuguang Li, Zhengge Yi, Ruifeng Li, Xu-An Wang, Hui Li, Xiaoyuan Yang
Summary: With the development of cloud storage and cloud computing technology, scholars have proposed cloud data integrity verification schemes to protect users' data security. The storage environment of the Internet of Things requires higher functionality of data integrity verification schemes, especially in the context of big data and medical big data. We have designed an SM2-based offline/online efficient data integrity verification scheme that uses the SM4 block cryptography algorithm to protect data privacy and a dynamic hash table for data updating. The scheme has been proven to be safe and efficient in security proof and efficiency analysis, suitable for various application scenarios.
Article
Computer Science, Theory & Methods
Lanxiang Chen, Qingxiao Fu, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Min-Shiang Hwang
Summary: This study proposes a blockchain-based random auditor committee (BRAC) scheme for integrity verification of outsourced data. The scheme utilizes a verifiable random function to select a third-party auditor committee for contract verification, and improves security through the randomness of leader election.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2022)
Article
Computer Science, Information Systems
Yangfei Lin, Jie Li, Shigetomo Kimura, Yuanyuan Yang, Yusheng Ji, Yangjie Cao
Summary: The applications of IoT have had a significant impact on various aspects of people's lives, creating a large volume of data. To ensure the integrity of cloud-stored data, a consortium blockchain-based public integrity verification system is proposed, in which the behaviors of third-party auditors are recorded on the blockchain for auditing purposes.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Business
Yi Li, Jian Shen, Sai Ji, Ying-Hsun Lai
Summary: With the rapid development of AIoT technology, the cloud-edge computing system provides convenient storage and computing services to reduce computing requirements in the cloud environment. However, data integrity verification remains a critical issue in AIoT cloud-edge computing. This research proposes a blockchain-based data integrity verification scheme to improve the verification rate in cloud-edge computing environment.
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT
(2023)
Article
Computer Science, Hardware & Architecture
Yilin Yuan, Jianbiao Zhang, Wanshan Xu, Zheng Li
Summary: In this paper, a novel integrity verification scheme based on blockchain is proposed. The scheme utilizes identity-based encryption and introduces an audit log to ensure the secure and efficient storage and retrieval of tags and files.
JOURNAL OF SUPERCOMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Lianhai Wang, Yannan Li, Qiming Yu, Yong Yu
Summary: The edge-cloud continuum is a new paradigm in cloud computing that brings data storage and compute power closer to users or devices, eliminating lag time and saving bandwidth. However, ensuring secure storage and computation is challenging due to the separation of data ownership and control. This article proposes a framework for outsourced data integrity checking with practical key update in the edge-cloud resilient network. A prototype system was implemented to demonstrate the feasibility of the proposed solution.
IEEE WIRELESS COMMUNICATIONS
(2022)
Article
Computer Science, Information Systems
Fakhri Alam Khan, Attaur Rahman, Mafawez Alharbi, Yousef Kamel Qawqzeh
MULTIMEDIA TOOLS AND APPLICATIONS
(2020)
Article
Telecommunications
Fakhri Alam Khan, Mona Jamjoom, Awais Ahmad, Muhammad Asif
Summary: This article introduces the concept of database-as-a-service (DaaS) and discusses its architecture, security and privacy, and query processing. It also evaluates the query performance of encrypted data on DaaS through an analytic study. The evaluation shows that data encryption and decryption require significant processing power and time, and there are several query execution problems with encrypted data. Parallel query execution with maximum possible threads can greatly improve query performance.
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES
(2022)
Article
Computer Science, Information Systems
Fakhri Alam Khan, Ateeq Ur Rehman Butt, Muhammad Asif, Waqar Ahmad, Muhammad Nawaz, Mona Jamjoom, Eatedal Alabdulkreem
MULTIMEDIA TOOLS AND APPLICATIONS
(2020)
Article
Computer Science, Information Systems
Sajid Anwar, Feras Al-Obeidat, Abdallah Tubaishat, Sadia Din, Awais Ahmad, Fakhri Alam Khan, Gwanggil Jeon, Jonathan Loo
IEEE INTERNET OF THINGS JOURNAL
(2020)
Article
Construction & Building Technology
Fakhri Alam Khan, Muhammad Asif, Awais Ahmad, Mafawez Alharbi, Hanan Aljuaid
SUSTAINABLE CITIES AND SOCIETY
(2020)
Article
Computer Science, Information Systems
Misbah Ahmad, Imran Ahmed, Fakhri Alam Khan, Fawad Qayum, Hanan Aljuaid
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS
(2020)
Article
Computer Science, Information Systems
Muhammad Ilyas, Zahid Ullah, Fakhri Alam Khan, Muhammad Hasanain Chaudary, Muhammad Sheraz Arshed Malik, Zafar Zaheer, Hamood Ur Rehman Durrani
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS
(2020)
Article
Computer Science, Artificial Intelligence
Muhammad Imran, Sangeen Khan, Helmut Hlavacs, Fakhri Alam Khan, Sajid Anwar
Summary: The study introduces a novel method for anomaly detection using artificial neural networks and cuckoo search algorithm, and demonstrates its superiority in network intrusion detection through empirical research.
Article
Computer Science, Artificial Intelligence
Ishfaq Ali, Muhammad Asif, Isma Hamid, Muhammad Umer Sarwar, Fakhri Alam Khan, Yazeed Ghadi
Summary: This research examines the impact of mainstream news channel coverage on Islamophobic sentiments, using sentiment analysis and correlation analysis. It provides empirical evidence of how news stories can promote Islamophobic sentiments and atrocities towards Muslim communities.
PEERJ COMPUTER SCIENCE
(2022)
Correction
Computer Science, Information Systems
Fakhri Alam Khan, Ateeq Ur Rehman Butt, Muhammad Asif, Waqar Ahmad, Muhammad Nawaz, Mona Jamjoom, Eatedal Alabdulkreem
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Computer Science, Artificial Intelligence
Fakhri Alam Khan, Kifayat Ullah, Atta Ur Rahman, Sajid Anwar
Summary: This paper proposes a smart home energy management system using the HB-ACO algorithm to solve the scheduling problem in smart buildings. By shifting load from on-peak hours to off-peak hours, the system aims to reduce electricity cost and peak-to-average ratio. The HB-ACO algorithm shows better performance than other algorithms in terms of reducing electricity cost, PAR, and improving user comfort, as demonstrated by simulation results.
Article
Computer Science, Information Systems
Shikah J. Alsunaidi, Fakhri Alam Khan
Summary: Many countries are focused on reducing harmful gas emissions, and Saudi Arabia has made significant efforts in utilizing renewable energy. Blockchain-based peer-to-peer networks can help overcome obstacles in managing distributed renewable energy systems, although scalability and productivity remain important considerations.
Article
Computer Science, Information Systems
Imran Ahmed, Humaira Sardar, Hanan Aljuaid, Fakhri Alam Khan, Muhammad Nawaz, Adnan Awais
Summary: This study proposes a compact CNN architecture, oversampling technique, and hierarchical CNN model to address the issue of class-imbalanced data in osteosarcoma histology images dataset, successfully improving generalization performance.
CMC-COMPUTERS MATERIALS & CONTINUA
(2021)
Article
Computer Science, Information Systems
Fakhri Alam Khan, Muhammad Nawaz, Muhammad Imran, Arif Ur Rahman, Fawad Qayum
Summary: The proposed algorithm achieves better accuracy in foreground detection by analyzing motion histograms to generate threshold values.
MULTIMEDIA SYSTEMS
(2021)
Article
Multidisciplinary Sciences
Ishfaq Ali, Muhammad Asif, Isma Hamid, Muhammad Umer Sarwar, Fakhri Alam Khan, Yazeed Ghadi
Summary: This research investigates the correlation between how news stories covered by mainstream news channels impede the hate speech/Islamophobic sentiment, utilizing word embedding technique for sentiment analysis to reveal the impact of news reporting on promoting Islamophobic sentiments.