Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Dr. Shadab Alam
  • Department of Computer Science, Jazan University, Jazan, Saudi Arabia

Dr. Shadab Alam

  • Shadab Alam is an Associate Professor in the Department of Computer Science at Jazan University, Jazan, Saudi Arabia.... moreedit
Blockchain is a decentralized ledger that serves as the foundation of Bitcoin and has found applications in various domains due to its immutable properties. It has the potential to change digital transactions drastically. It has been... more
Blockchain is a decentralized ledger that serves as the foundation of Bitcoin and has found applications in various domains due to its immutable properties. It has the potential to change digital transactions drastically. It has been successfully used across multiple fields for record immutability and reliability. The consensus mechanism is the backbone of blockchain operations and validates newly generated blocks before they are added. To verify transactions in the ledger, various peer-to-peer (P2P) network validators use different consensus algorithms to solve the reliability problem in a network with unreliable nodes. The security and reliability of the inherent consensus algorithm used mainly determine blockchain security. However, consensus algorithms consume significant resources for validating new nodes. Therefore the safety and reliability of a blockchain system is based on the consensus mechanism's reliability and performance. Although various consensus mechanisms/algorithms exist, there is no unified evaluation criterion to evaluate them. Evaluating the consensus algorithm will explain system reliability and provide a mechanism for choosing the best consensus mechanism for a defined set of problems. This article comprehensively analyzes existing and recent consensus algorithms' throughput, scalability, latency, energy efficiency, and other factors such as attacks, Byzantine fault tolerance, adversary tolerance, and decentralization levels. The paper defines consensus mechanism criteria, evaluates available consensus algorithms based on them, and presents their advantages and disadvantages.
The Internet of Things (IoT) has radically transformed how patient information and healthcare monitoring are monitored and recorded and has revolutionized the area by ensuring regular 24 × 7 tracking without costly and restricted human... more
The Internet of Things (IoT) has radically transformed how patient information and healthcare monitoring are monitored and recorded and has revolutionized the area by ensuring regular 24 × 7 tracking without costly and restricted human resources and with a low mistake
probability. The Internet of Medical Things (IoMT) is a subsection of the Internet of things (IoT) that uses medical equipment as things or nodes to enable cost-effective and efficient patient monitoring and recording. The IoMT can cope with a wide range of problems, including observing patients in hospitals, monitoring patients in their homes, and assisting consulting physicians and nurses in monitoring health conditions at regular intervals and issuing warning signals if emergency care is
necessary. EEG signals, electrocardiograms (ECGs), blood sugar levels, blood pressure levels, and other conditions can be examined. In crucial situations, quick and real-time analysis is essential, and
failure to provide careful attention can be fatal. A cloud-based IoT platform cannot handle these latency-sensitive conditions. Fog computing (FC) is a novel paradigm for assigning, processing, and storing resources to IoT devices with limited resources. Where substantial processing power or storage is required, all nodes in a fog computing scheme can delegate their jobs to local fog nodes rather than forwarding them to the cloud module at a greater distance. Identifying potential security risks and putting in place adequate security measures are critical. This work aims to examine a blockchain (BC) as a potential tool for mitigating the impact of these difficulties in conjunction with fog computing. This research shows that blockchain can overcome fog computing’s privacy and security concerns. It also discusses blockchain’s issues and limitations from the perspective of fog computing (FC) and the IoMT.
The land registry system is one of the crucial aspects of any government. Proper and reliable land management is essential for economic growth and governance. The traditional land registry model lacks many essential requirements and is... more
The land registry system is one of the crucial aspects of any government. Proper and reliable land management is essential for economic growth and governance. The traditional land registry model lacks many essential requirements and is mired with a different type of malpractices and security concerns. Blockchain technology has been proposed as a possible solution to counter these malpractices and security concerns. Even though there are many advantages of using blockchain in the land registry, still there are some concerns and challenges that need to be reviewed and addressed for successful blockchain implementation in the land registry. This paper reviews the current state of blockchain implementation in the land registry and the existing project being implemented in different countries. It further highlights the requirements, implications, and challenges for successfully implementing blockchain in the land registry system. This paper provides a future direction for new implementations.
e internet of medical things (IoMT) is a smart medical device structure that includes apps, health services, and systems. ese medical equipment and applications are linked to healthcare systems via the internet. Because IoT devices lack... more
e internet of medical things (IoMT) is a smart medical device structure that includes apps, health services, and systems. ese medical equipment and applications are linked to healthcare systems via the internet. Because IoT devices lack computational power, the collected data can be processed and analyzed in the cloud by more computationally intensive tools. Cloud computing in IoMT is also used to store IoT data as part of a collaborative e ort. Cloud computing has provided new avenues for providing services to users with better user experience, scalability, and proper resource utilization compared to traditional platforms. However, these cloud platforms are susceptible to several security breaches evident from recent and past incidents. Trust management is a crucial feature required for providing secure and reliable service to users. e traditional trust management protocols in the cloud computing situation are centralized and result in single-point failure. Blockchain has emerged as the possible use case for the domain that requires trust and reliability in several aspects. Di erent researchers have presented various blockchain-based trust management approaches. is study reviews the trust challenges in cloud computing and analyzes how blockchain technology addresses these challenges using blockchain-based trust management frameworks. ere are ten (10) solutions under two broad categories of decentralization and security. ese challenges are centralization, huge overhead, trust evidence, less adaptive, and inaccuracy. is systematic review has been performed in six stages: identifying the research question, research methods, screening the related articles, abstract and keyword examination, data retrieval, and mapping processing. Atlas.ti software is used to analyze the relevant articles based on keywords. A total of 70 codes and 262 quotations are compiled, and furthermore, these quotations are categorized using manual coding. Finally, 20 solutions under two main categories of decentralization and security were retrieved. Out of these ten (10) solutions, three (03) fell in the security category, and the rest seven (07) came under the decentralization category.
Providing a system user with a unique and secure identity is a prerequisite for authentication and authorization aspects of a security system. It is generally understood that the existing digital identity systems store the identity... more
Providing a system user with a unique and secure identity is a prerequisite for authentication and authorization aspects of a security system. It is generally understood that the existing digital identity systems store the identity details in centralized databases, and users store the identity details in centralized databases in which users do not have any control over them. These vulnerabilities in the traditional digital identities make them susceptible to various malicious assaults and modifications. Users’ personally identifiable information (PII) may leak through these identity solutions that can consequently affect other applications being used by the users, and they have no control over them. Land registration is a major domain of governance that defines civilians’ well-being and needs to be handled properly to avoid conflict and to support Environmental Sustainability. These traditional land registry applications also lack identity parameters due to weaknesses in identity solutions. A secure and reliable digital identity solution is the need of the hour. Self-sovereign identity (SSI), a new concept, is becoming more popular as a secure and reliable identity solution for users based on identity principles. SSI provides users with a way to control their personal information and consent for it to be used in various ways. In addition, the user’s identity details are stored in a decentralized manner, which helps to overcome the problems with digital identity solutions. This article reviews existing SSI solutions and analyzes them using SSI principles. It also assesses the SSI components required for constructing SSI frameworks that adhere to the SSI principles. Furthermore, it defines the procedures for establishing an SSI ecosystem, explores the laws governing digital identity that governments have adopted, and identifies SSI applications in several fields. Finally, a review of SSI applications in the domain of land registry systems is given in order to propose an SSI-based land registry framework for a secure and reliable land registry system.
Providing an identity solution is essential for a reliable blockchain-based land registry system. A secure, privacy-preserving, and efficient identity solution is essential but challenging. This paper examines the current literature and... more
Providing an identity solution is essential for a reliable blockchain-based land registry system. A secure, privacy-preserving, and efficient identity solution is essential but challenging. This paper examines the current literature and provides a systematic literature review in three stages based on the three research questions (RQ) that show the assessment and interpretation process step by step. Based on the parameters and RQ specified in the research methodology section, a total of 43 primary articles have been selected from the 251 articles extracted from various scientific databases. The majority of these articles are concerned with evaluating the existing self-sovereign identity (SSI) solutions and their role in the blockchain-based land registry system to address the compliance issues in the existing SSI solutions with SSI principles and find the best possible SSI solution to address the identity problems in the land registry. The existing digital identity solutions cannot handle the requirements of the identity principle and are prone to various limitations like centralization and dependency on third parties that further augment the chance of security threats. SSI has been designed to overcome these limitations and provide a secure, reliable, and efficient identity solution that gives complete control to the users over their personal identity information (PII). This paper reviews the existing SSI solutions, evaluates them based on the SSI principles, and comes up with the best possible SSI solution for a blockchain-based land registry system. It further provides a detailed investigation of each SSI solution to present its functionalities and limitations for further improvement.
Early detection of vessels from fundus images can effectively prevent the permanent retinal damages caused by retinopathies such as glaucoma, hyperextension, and diabetes. Concerning the red color of both retinal vessels and background... more
Early detection of vessels from fundus images can effectively prevent the permanent retinal damages caused by retinopathies such as glaucoma, hyperextension, and diabetes. Concerning the red color of both retinal vessels and background and the vessel's morphological variations, the current vessel detection methodologies fail to segment thin vessels and discriminate them in the regions where permanent retinopathies mainly occur. This research aims to suggest a novel approach to take the benefit of both traditional template-matching methods with recent deep learning (DL) solutions. These two methods are combined in which the response of a Cauchy matched filter is used to replace the noisy red channel of the fundus images. Consequently, a U-shaped fully connected convolutional neural network (U-net) is employed to train end-to-end segmentation of pixels into vessel and background classes. Each preprocessed image is divided into several patches to provide enough training images and speed up the training per each instance. The DRIVE public database has been analyzed to test the proposed method, and metrics such as Accuracy, Precision, Sensitivity and Specificity have been measured for evaluation. The evaluation indicates that the average extraction accuracy of the proposed model is 0.9640 on the employed dataset.
e land registry system is one of the essential components of any governance model required to ascertain the ownership records uniquely. is paper reviews the existing literature and provides a detailed literature review consisting of 3... more
e land registry system is one of the essential components of any governance model required to ascertain the ownership records uniquely. is paper reviews the existing literature and provides a detailed literature review consisting of 3 stages based on three research questions (RQ) that highlight the step by step evaluation and analysis. We selected 48 primary articles out of 477 extracted from different scientific databases based on criteria and RQ defined in the research method section. e majority of these papers focus on assessing the identity issues related to the land registry system and reviewing the existing identity models to find the best possible identity model to resolve the identified identity problems in the land registry. is paper examines the current land registry model and its shortcomings. It explains the various blockchain types and their characteristics. It further evaluates the usability of blockchain technology in different aspects of the land registry. Identity management is one of such weaknesses in the blockchain-based land registry model that has been assessed in detail. Identity issues of blockchain-based models have been further evaluated on defined criteria. e paper ends with a discussion on possible identity models and their comparative analysis to ascertain the most suitable identity model to resolve the identity issues of land registry systems.
Blockchain is considered a distributed ledger that can transact securely and trustfully without involving any third party. It has caused a lot of interest in various sectors, like government, finance, banking, etc. Blockchain technology... more
Blockchain is considered a distributed ledger that can transact securely and trustfully without involving any third party. It has caused a lot of interest in various sectors, like government, finance, banking, etc. Blockchain technology is suitable for areas where multiple data storage and transaction types generally require the third party to authenticate the transactions involving transaction cost and authentication issues. In this paper, various aspects of Blockchain technology applications in public concern sectors have been analyzed in detail. This paper also reviews the multiple case studies and implementations of Blockchain technology in these sectors and their current status that provide a detailed insight into all the aspects of its application. This paper finally comes up with various implementation requirements in Government, Health, Finance, Economics, and Energy. Further, it identifies the challenges in successfully implementing Blockchain technology in these mentioned sectors to provide a reference for future deployments.
The recent corona virus disease (COVID-19) pandemic has brought the issues of technological deficiencies and challenges of security and privacy, validating and maintaining anonymity, user control over records while fully utilizing the... more
The recent corona virus disease (COVID-19) pandemic has brought the issues of technological deficiencies and challenges of security and privacy, validating and maintaining anonymity, user control over records while fully utilizing the available records etc., that can be encountered in an emergency or pandemic condition. Blockchain technology has evolved as a promising solution in conditions that necessitate immutability, record integrity, and proper records authentication. Blockchain can effectively resolve the technical barriers and effectively utilize the available resources and infrastructure in pandemic situations like the current COVID-19. This paper provides an extensive review of various possible use cases of blockchain and available solutions for protection against the COVID-19 like situation. It gives an insight into the benefits and shortcomings of available solutions. It further provides the issues and challenges of adopting blockchain in a situation like COVID-19 and suggest future directions that can offer a platform for further improved and better solutions.
The recent corona virus disease (COVID-19) pandemic has brought the issues of technological deficiencies and challenges of security and privacy, validating and maintaining anonymity, user control over records while fully utilizing the... more
The recent corona virus disease (COVID-19) pandemic has brought the issues of technological deficiencies and challenges of security and privacy, validating and maintaining anonymity, user control over records while fully utilizing the available records etc., that can be encountered in an emergency or pandemic condition. Blockchain technology has evolved as a promising solution in conditions that necessitate immutability, record integrity, and proper records authentication. Blockchain can effectively resolve the technical barriers and effectively utilize the available resources and infrastructure in pandemic situations like the current COVID-19. This paper provides an extensive review of various possible use cases of blockchain and available solutions for protection against the COVID-19 like situation. It gives an insight into the benefits and shortcomings of available solutions. It further provides the issues and challenges of adopting blockchain in a situation like COVID-19 and suggest future directions that can offer a platform for further improved and better solutions.
Smart healthcare has become a health policy services that utilize technologies including wearables, the Internet of things, smartphones, etc., to access information continuously and to link patients, equipment and medical facilities, and... more
Smart healthcare has become a health policy services that utilize technologies including wearables, the Internet of things, smartphones, etc., to access information continuously and to link patients, equipment and medical facilities, and then effectively handles and responds in an intelligent way to the needs of medical ecosystems. The smart healthcare management system digitally helps the patient to have used medical assistance and services like emergency response, diagnostic service, and surveillance services at any time and in any location. The evaluation of such a management system must be studied for innovative ideas similar to direct healthcare services. Therefore, this study proposes a Smart Healthcare Management Evaluation using Fuzzy Decision Making (SHME-FDM) method to assess the technological integration efficiency. This study thus evaluates the privacy protection of healthcare data of the smart healthcare management system using the Fuzzy Analytical Hierarchy Process- Te...
snafis@jazanu.edu.sa The focus has remained on determining and reviewing the interoperable standards in electronic health records (EHR) while determining which standard is best for interoperability. For this purpose, the research... more
snafis@jazanu.edu.sa The focus has remained on determining and reviewing the interoperable standards in electronic health records (EHR) while determining which standard is best for interoperability. For this purpose, the research identified that the current state of interoperability is not up to the required standard, so numerous issues are experienced in managing electronic health records. In addition, the research identified numerous standards being used for interoperability, including OpenEHR, OpenEMR, OpenMRS, GNU Health and OSHERA VistA. It can be argued that the use of HL7 and its different versions can play an instrumental role in the integration of the healthcare environment. It can be further advanced by harmonizing different standards in reference to Information Communication Technology and advanced technologies like Blockchain to ensure integration between healthcare systems and their respective applications. It will prove to be beneficial in the transparent exchange of h...
Abstract—Hardware based ciphers are most suitable for resource constrained environments to provide information security and confidentiality. Grain is one such hardware based synchronous stream cipher. The motive of this study is to... more
Abstract—Hardware based ciphers are most suitable for resource constrained environments to provide information security and confidentiality. Grain is one such hardware based synchronous stream cipher. The motive of this study is to present a comprehensive survey and review of Grain family of stream ciphers that is one of the portfolio candidates in the hardware based category of eSTREAM. Security features and different attacks on these ciphers have been studied in this paper to analyze the strengths and weaknesses of these designs. Index Terms—Information Security, Cryptography,
The focus has remained on determining and reviewing the interoperable standards in electronic health records (EHR) while determining which standard is best for interoperability. For this purpose, the research identified that the current... more
The focus has remained on determining and reviewing the interoperable standards in electronic health records (EHR) while determining which standard is best for interoperability. For this purpose, the research identified that the current state of interoperability is not up to the required standard, so numerous issues are experienced in managing electronic health records. In addition, the research identified numerous standards being used for interoperability, including OpenEHR, OpenEMR, OpenMRS, GNU Health and OSHERA VistA. It can be argued that the use of HL7 and its different versions can play an instrumental role in the integration of the healthcare environment. It can be further advanced by harmonizing different standards in reference to Information Communication Technology and advanced technologies like Blockchain to ensure integration between healthcare systems and their respective applications. It will prove to be beneficial in the transparent exchange of healthcare information.
Blockchain technology has emerged as a major technological platform that can record the various transaction and records in a secure and immutable format. It is being used in all sorts of transaction and record management in multiple... more
Blockchain technology has emerged as a major technological
platform that can record the various transaction and records in a secure and immutable format. It is being used in all sorts of transaction and record management in multiple fields. Social security is a domain that requires a system to correctly validate and store records in a secure and tamper-proof manner to avoid any case of fraud and to reach it to genuinely intended applicants. Blockchain technology can provide such a platform. In this paper, various existing projects in the field of social security have been reviewed and analysed that presents a futuristic approach for blockchain applications in the social security sector.
Skin cancer is a worldwide epidemic. A computerised instrument allows spotting small shifts to change the skin's functionality in an early stage. This paper utilises Convolutional Neural Network (CNN) to identify skin cancers. Threatened... more
Skin cancer is a worldwide epidemic. A computerised instrument allows spotting small shifts to change the skin's functionality in an early stage. This paper utilises Convolutional Neural Network (CNN) to identify skin cancers. Threatened results demonstrate that the CNN method can effectively identify melanoma and benign cases from X-ray images. This work can help doctors to diagnose cancer in the skin in an initial stage and treat it successfully.
EHR is the digital record of the medical history of the patient. It has solved many issues related to data handling and its security. A detailed study is required to implement this technology under modern technology and standards to... more
EHR is the digital record of the medical history of the patient. It has solved many issues related to data handling and its security. A detailed study is required to implement this technology under modern technology
and standards to minimize errors in integration. Present solutions lack interoperability and blockchain;therefore, theymust undergo further discussion and research related to it. This research aims to
examine the interoperability challenges and issues of blockchain EHR frameworks as per the national and international standards of EHR. It will follow the interoperability standards in the EHR framework in terms of medical data distribution, sharing, and data dependability. The research is based on a systematic review of previous researches; 156 articles were excluded as they were based purely on blockchain and had little or no part of EHR, and 11 articles were selected based on the keywords selected in this research. Innovative interoperability framework and blockchain-based framework found to be successful in solving the current challenges in EHR. However, the issues of EHR can be resolved by bringing advancement in EHR. The research has contributed to highlighting the related challenges and solution in EHR implementation and presented a solution that will help to manage the data, security of information related to the patient and the benefits of blockchain and interoperability of EHR.
The land registry system is one of the very important department in any governance system that stores the records of land ownership. There are various issues and loopholes in the existing system that give rise to corruption and disputes.... more
The land registry system is one of the very important department in any governance system that stores the records of land ownership. There are various issues and loopholes in the existing system that give rise to corruption and disputes. This requires a significant chunk of valuable government resources from judiciary and law enforcement agencies in settling these issues. Blockchain technology has the potential to counter these loopholes and sort out the issues related with land registry system like tempering of records, trading of the same piece of land to more than one buyer. In this paper, a secure and reliable framework for land registry system using Blockchain has been proposed. The proposed framework uses the concept of smart contract at various stages of the land registry and gives an algorithm for pre-agreement. First, we describe the conventional land registry system and reviews the issues in it. Then, we outline the potential benefits of employing Blockchain technology in the land registry system and presented a framework. Finally, a number of case studies are presented.
Electronic Health Record (EHR) is being used in most healthcare institutions through the advancement in computer technologies to preserve and share health records instead of a paper-based method. Data information should be exchanged... more
Electronic Health Record (EHR) is being used in most healthcare institutions through the advancement in computer technologies to preserve and share health records instead of a paper-based method. Data information should be exchanged amongst various parties and users' privileges to manage access to their records should also be provided. In addition to the basic standards of secrecy, confidentiality and integrity of information, these acts further demonstrate the need for interoperability and consumer access to personal data. EHR frameworks face problems in the protection of data collection, reputation and management. Blockchain technology has arisen as a powerful technology that can offer the immutability,
confidentiality and user access properties of stored information without the need for centralized storage. This paper discusses the different EHR norms, specifications and problems and also offers a comparative
analysis of various EHR specifications and current blockchain-based EHR systems. Finally, it suggests an interoperable EHR system focused on blockchain.
Blockchain provides a creative approach to storing information, executing transactions, conducting tasks, and building trust. Some see Blockchain as a revolutionary technology for cryptography and cybersecurity, with applications ranging... more
Blockchain provides a creative approach to storing information, executing transactions, conducting tasks, and building trust. Some see Blockchain as a revolutionary technology for cryptography and cybersecurity, with applications ranging from cryptocurrency to healthcare, smart contracts, Internet of Things, smart grids
governance, supply-chain etc. This research work would offer a detailed analysis of blockchain Security, Privacy and Trust. It further studies the applications of blockchain technology in the domain of education and involved challenges. Finally, it proposes a blockchain-based framework for secure and reliable student's record management.
Cloud computing has come out as a key technology to deliver infrastructure and data service requirements at low cost and with minimal efforts and high level of scalability and hence have been highly implemented in various aspects of IT... more
Cloud computing has come out as a key technology to deliver infrastructure and data service requirements at low cost and with minimal efforts and high level of scalability and hence have been highly implemented in various aspects of IT industry. A rapid growth in Cloud Computing adaption has been observed but, still, the information security concerns have not been fully countered. Information security concerns are still hindering the growth of Cloud Computing to some extents and need to be resolved. At the same time Blockchain has emerged as a key technology to provide security especially in aspects of integrity, authenticity and confidentiality. This paper reviews the various aspects of security in Blockchain and Cloud Computing and
further analyses the application of Blockchain in Cloud Computing security.
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these... more
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating
interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years, the pace at which new devices are being integrated into the
system will profoundly impact the world in a good way but also poses some severe queries about security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where each layer provides a service. The security needs vary from layer to layer as each layer serves a different purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks have been discussed along with some existing and proposed countermeasures.
Hardware based ciphers are most suitable for resource-constrained environments to provide information security and confidentiality. Grain is one such hardware based synchronous stream cipher. The motive of this study is to present a... more
Hardware based ciphers are most suitable for resource-constrained environments to provide information security and confidentiality. Grain is one such hardware based synchronous stream cipher. The motive of this
study is to present a comprehensive survey and review of Grain family of stream ciphers that is one of the portfolio candidates in the hardware based category of eSTREAM. Security features and different attacks on these ciphers have been studied in this paper to analyze the strengths
and weaknesses of these designs.
Research Interests:
The SOBER family ciphers are generally constructed from a linear feedback shift register (LFSR), a non-linear filter (NLF) and a form of irregular decimation called stuttering. Our work aims at having a comparative study of the SOBER... more
The SOBER family ciphers are generally constructed from a linear feedback shift register (LFSR), a non-linear filter (NLF) and a form of irregular decimation called stuttering. Our work aims at having a comparative study of the SOBER family of stream ciphers with regard to design philosophies adapted and security aspects.
Smart farming is generally defined as an IT-based intelligent farming system that finds, analyses, and manages field variability by carrying out crop production activities at the right location, time, and method for maximum profitability,... more
Smart farming is generally defined as an IT-based intelligent farming system that finds, analyses, and manages field variability by carrying out crop production activities at the right location, time, and method for maximum profitability, sustainability, and land resource conservation. Precision farming can result in high profitability and production but heavily depends on the accuracy of provided data and decisionmaking. While IoT can be very handy in collecting and processing crop and environment data in a precise and timely manner, at the same time, Blockchain technology can be utilized to preserve the sense data and provide a platform for the immutability of records to accurately and precisely store the crop products data and environment. Integrating Blockchain and IoT technologies in precision farming can manage the requirements of precision farming in developing an intelligent application that will minimize resource consumption and help in high crop yield while maintaining quality standards. Although there are several benefits of adopting smart agriculture and IoT-based technologies, there are several security concerns related to these technologies. This article reviews the basics of smart agriculture, components, and security issues. Further, it proposes a blockchain-based model for the secure integration of smart agriculture components to provide security and reliability.
Cloud computing is the latest and rapidly growing technology that has brought new changes and opportunities in the field of education and IT industries. Consequently, e-learning emphasizes more on technology to transform and provide... more
Cloud computing is the latest and rapidly growing technology that has brought new changes and opportunities in the field of education and IT industries. Consequently, e-learning emphasizes more on technology to transform and provide training and education to learners. E-learning system using cloud computing platform introduces efficient and effective learning mechanism. In this paper, we briefly discuss the effectiveness of cloud-based e-learning along with its issues, challenges, and benefits. The analysis suggests that the cloud computing platform for e-learning is quite feasible and effective that brings greater clarity landscape anent to cloud computing assistances. Study of several cloud-based e-learning tools has been done on the basis of scalability, types of services, shareable content object reference model (SCORM), prices, usability, etc. Some e-learning trends of 2017 have been presented in last.
Electronic Health Record (EHR) is being used in most healthcare institutions to preserve and share health records instead of a paper-based method. Data records must be exchanged amongst various parties and users' privileges to manage... more
Electronic Health Record (EHR) is being used in most healthcare institutions to preserve and share health records instead of a paper-based method. Data records must be exchanged amongst various parties and users' privileges to manage access to their records should also be provided. In addition to the basic standards of secrecy, confidentiality and integrity of information, these facts further demonstrate the need for interoperability and consumer control to access their personal data. Electronic Health Record (EHR) system faces issues of protection of data, trust and management issues. In recent
Covid-19 pandemic, various applications, tools and websites were launched that stores records. Also, many personal records related to health need to be shared among different parties for early detection, contact tracing, monitoring and the future prediction that requires accurate and reliable data. Simultaneously, the citizens will be hesitant in providing their personal details due to privacy concerns and social stigma. Blockchain technology has arisen as a powerful technology that
can offer the immutability, confidentiality and user access properties of stored information and provided distributed storage. This paper analyses the blockchain suitability in EHR and its further applications in efficient Covid-19 pandemic management.
ABSTRACT Among the recent developments on stream ciphers, several indices on the security of stream ciphers have been proposed for guaranteeing their strength. But the proposed indices are not sufficient to guarantee the security of... more
ABSTRACT Among the recent developments on stream ciphers, several indices on the security of stream ciphers have been proposed for guaranteeing their strength. But the proposed indices are not sufficient to guarantee the security of stream ciphers. It is possible that sequences with a high linear complexity have a very bad "linear complexity stability", i.e., after changing a few bits of the original sequence, its linear complexity either decreases or increases very fast. The sequences may be well approximated by another one with very lower linear unpredictability. This problem is especially important when linear feedback shift registers are used. To overcome this problem, non-linear next state functions are the possible solution. In this paper a comparative study of NLFSR based streams ciphers is made with respect to design structures and some techniques in order to analyses them. Also this paper highlights the security in concerned ciphers.
Research Interests:
In order to fill the void of unavailability of having a standard stream cipher, ECRYPT took an initiative in the form of a project called eSTREAM. A call for cipher submission was made all over the globe and Py (Roo) submitted by Eli... more
In order to fill the void of unavailability of having a standard stream cipher, ECRYPT took an initiative in the form of a project called eSTREAM. A call for cipher submission was made all over the globe and Py (Roo) submitted by Eli Biham and Jennifer Seberry in 2005 was one of the candidates. Py was very efficient stream cipher that is 2.5 times faster than RC4, but was found prone to several cryptanalytic attacks. Though one improved version Pypy was submitted but unfortunately was not able to withstand the cryptanalytic results. In response to these claims the author of these ciphers withdrew Py, Py6 and Pypy stream cipher and given a new tweaked or modified version of these ciphers as TPy, TPy6, and TPypy. TPypy is most secure version of all these ciphers. Some claims have made against these ciphers and counterclaims by author of these algorithms were made to prove it secure. Our aim of this paper is to analyze various attacks and claims regarding this family of stream cipher a...
Research Interests:
Cloud computing is emerging as a powerful solution to ever-growing storage and processing requirements of an organization and individual without the burden of owning and handling the physical devices. Security is one of the primary... more
Cloud computing is emerging as a powerful solution to ever-growing
storage and processing requirements of an organization and individual without the burden of owning and handling the physical devices. Security is one of the primary concerns in cloud computing for large-scale implementation. Intrusion detection and prevention (IDP) techniques can be applied to secure against intruders. In this paper, we have studied different IDP techniques comprehensively and analyzed their respective strengths and weaknesses on various parameters to provide security in cloud computing. Hypervisor-based and distributed IDS have shown promising security features in cloud computing environment in comparison with traditional IDP techniques
E-learning can provide a learning environment without the boundaries limit of time and location. Our previous assumption for teaching and learning is Pen, Paper, Blackboard, and a class room but now we have lots of different... more
E-learning can provide a learning environment without the
boundaries limit of time and location. Our previous assumption
for teaching and learning is Pen, Paper, Blackboard, and a
class room but now we have lots of different technologies
which change the view of learning concepts and put striking
effect on teaching and learning through which teaching and
learning can be made more effective, powerful and easily
accessible. Here we have defined some of the tools and
technologies through their use teacher can provide interactive
and challenging learning. These are the Course Management
System (Moodle, Joomla, OLAT, JOJO CMS), Interactive
Board (eBeam, SMART boards) and SmartPen
ABSTRACT In order to fill the void of unavailability of having a standard stream cipher, ECRYPT took an initiative in the form of a project called eSTREAM. A call for cipher submission was made all over the globe and Py (Roo) submitted by... more
ABSTRACT In order to fill the void of unavailability of having a standard stream cipher, ECRYPT took an initiative in the form of a project called eSTREAM. A call for cipher submission was made all over the globe and Py (Roo) submitted by Eli Biham and Jennifer Seberry in 2005 was one of the candidates. Py was very efficient stream cipher that is 2.5 times faster than RC4, but was found prone to several cryptanalytic attacks. Though one improved version Pypy was submitted but unfortunately was not able to withstand the cryptanalytic results. In response to these claims the author of these ciphers withdrew Py, Py6 and Pypy stream cipher and given a new tweaked or modified version of these ciphers as TPy, TPy6, and TPypy. TPypy is most secure version of all these ciphers. Some claims have made against these ciphers and counterclaims by author of these algorithms were made to prove it secure. Our aim of this paper is to analyze various attacks and claims regarding this family of stream cipher and come to a conclusion for the security of these ciphers.
Research Interests:
The main aim of this paper is to introduce a new synchronous stream cipher based on128 bit key length. The new proposed design is named “BSF-128” and is primarily based on a Non-Linear Feedback Shift Register (NFSR), a Feedback with Carry... more
The main aim of this paper is to introduce a new synchronous stream cipher
based on128 bit key length. The new proposed design is named “BSF-128” and is primarily based on a Non-Linear Feedback Shift Register (NFSR), a Feedback with Carry Shift Register (FCSR) and an S-Box
Technology is moving towards more intelligent and more connected devices in this digital world. Transport system is also not untouched with this phenomenon. Vehicles are becoming intelligent and autonomous with the use of sensor and... more
Technology is moving towards more intelligent and more connected devices in this digital world. Transport system is also not untouched with this phenomenon. Vehicles are becoming intelligent and autonomous with the use of sensor and communication techniques. Advancements in Internet of Things (IoT) has created a new field in the area of transport and vehicular network that is Internet of Vehicles (IoV). IoV is
advanced version of Vehicular ad hoc network (VANET) applying the concepts of IoT. Security and standardization is the most important concern in the adaptation of IoT and same is the case with IoV. Fulfilling the security requirements is important for adoption and success of IoV. This paper reviews the security requirements of IoV, different possible attacks on it and countermeasures to overcome these attacks
Early detection of vessels from fundus images can effectively prevent the permanent retinal damages caused by retinopathies such as glaucoma, hyperextension, and diabetes. Concerning the red color of both retinal vessels and background... more
Early detection of vessels from fundus images can effectively prevent the permanent retinal damages caused by retinopathies such as glaucoma, hyperextension, and diabetes. Concerning the red color of both retinal vessels and background and the vessel's morphological variations, the current vessel detection methodologies fail to segment thin vessels and discriminate them in the regions where permanent retinopathies mainly occur. This research aims to suggest a novel approach to take the benefit of both traditional template-matching methods with recent deep learning (DL) solutions. These two methods are combined in which the response of a Cauchy matched filter is used to replace the noisy red channel of the fundus images. Consequently, a U-shaped fully connected convolutional neural network (U-net) is employed to train end-to-end segmentation of pixels into vessel and background classes. Each preprocessed image is divided into several patches to provide enough training images and ...
The refugees and migrants are not recorded generally and deemed invisible by governments without providing them with identity and welfare services. The COVID-19 pandemic has badly impacted the economy, and the poor migrants and refugees... more
The refugees and migrants are not recorded generally and deemed invisible by governments without providing them with identity and welfare services. The COVID-19 pandemic has badly impacted the economy, and the poor migrants and refugees have suffered most due to the closure of industries and informal sectors. Lack of legal identity made them more vulnerable and excluded them from getting benefits of even meagre government support and welfare schemes. Self-sovereign identity is a form of distributed digital identity that can provide immutable identity with full user control and interoperability features. Self-sovereign identities also ensure the privacy and security of personal information. SSI model can effectively provide migrants and refugees with an effective legal identity and include them in government welfare schemes and other schemes run by non-governmental agencies. Also, SSI can be used for uniquely identifying the people who have been already vaccinated or tested negative from COVID-19 within a stipulated time. This paper reviews the aspects of SSI application during the pandemic situation like COVID-19.
Secure and reliable identity is essential for identifying a user accurately and providing services. The traditional centralized identity systems have several security weaknesses and do not support user control. Self-sovereign identity... more
Secure and reliable identity is essential for identifying a user accurately and providing services. The traditional centralized identity systems have several security weaknesses and do not support user control. Self-sovereign identity (SSI) has been proposed to provide user control and secure identity model. User record privacy and security is a critical factor for any healthcare information system. Healthcare is also a domain where SSI solutions can counter patient information privacy and security threats. This paper reviews the applicability of blockchain-based SSI solution in healthcare, their advantages and requirements. It further provides a model use case for demonstrating the SSI application in healthcare.
IoT is affecting each and every aspect of human life, since it is a woven combination of traditional system, sensors, cloud, mobile applications, web applications and control systems. IoT is a network of objects, where each object has... more
IoT is affecting each and every aspect of human life, since it is a woven combination of traditional system, sensors, cloud, mobile applications, web applications and control systems. IoT is a network of objects, where each object has unique identification as well as communication capabilities. IoT is playing vital role in many real world applications such as- smart health, smart city, smart home, smart transportation and smart traffic management. This paper presents a review of various IoT applications and their related future challenges. But with ever increasing number of heterogeneous devices in IoT network and the amount of data being chandelled, there are certain issues which are needed to be resolved such as security, privacy, and identification have been discussed in this paper.
Cloud computing is emerging as a powerful solution to ever-growing storage and processing requirements of an organization and individual without the burden of owning and handling the physical devices. Security is one of the primary... more
Cloud computing is emerging as a powerful solution to ever-growing storage and processing requirements of an organization and individual without the burden of owning and handling the physical devices. Security is one of the primary concerns in cloud computing for large-scale implementation. Intrusion detection and prevention (IDP) techniques can be applied to secure against intruders. In this paper, we have studied different IDP techniques comprehensively and analyzed their respective strengths and weaknesses on various parameters to provide security in cloud computing. Hypervisor-based and distributed IDS have shown promising security features in cloud computing environment in comparison with traditional IDP techniques.
The Internet of Things (IoT) and blockchain (BC) are reliable technologies widely employed in various contexts. IoT devices have a lot of potential for data sensing and recording without human intervention, but they also have processing... more
The Internet of Things (IoT) and blockchain (BC) are reliable technologies widely employed in various contexts. IoT devices have a lot of potential for data sensing and recording without human intervention, but they also have processing and security issues. Due to their limited computing power, IoT devices cannot use specialized cryptographic security mechanisms. There are various challenges when using traditional cryptographic techniques to transport and store medical records securely. The general public’s health depends on having an electronic health record (EHR) system that is current. In the era of e-health and m-health, problems with integrating data from various EHRs, preserving data interoperability, and ensuring that all data access is in the patient’s hands are all obstacles to creating a dependable EHR system. If health records get into the wrong hands, they could endanger the lives of patients and their right to privacy. BC technology has become a potent tool for ensuring...
The land registry system is one of the crucial aspects of any government. Proper and reliable land management is essential for economic growth and governance. The traditional land registry model lacks many essential requirements and mired... more
The land registry system is one of the crucial aspects of any government. Proper and reliable land management is essential for economic growth and governance. The traditional land registry model lacks many essential requirements and mired with a different type of malpractices and security concerns. Blockchain technology has been proposed as a possible solution to counter these malpractices and security concerns. Even though there are many advantages of using blockchain in the land registry, still there are some concerns and challenges that need to be reviewed and addressed for successful blockchain implementation in the land registry. This paper reviews the current state of blockchain implementation in the land registry and the existing project being implemented in different countries. It further highlights the requirements, implications and challenges for successfully implementing blockchain in the land registry system. This paper provides a future direction for new implementations.
Providing a system user with a unique and secure identity is a prerequisite for authentication and authorization aspects of a security system. It is generally understood that the existing digital identity systems store the identity... more
Providing a system user with a unique and secure identity is a prerequisite for authentication and authorization aspects of a security system. It is generally understood that the existing digital identity systems store the identity details in centralized databases, and users store the identity details in centralized databases in which users do not have any control over them. These vulnerabilities in the traditional digital identities make them susceptible to various malicious assaults and modifications. Users’ personally identifiable information (PII) may leak through these identity solutions that can consequently affect other applications being used by the users, and they have no control over them. Land registration is a major domain of governance that defines civilians’ well-being and needs to be handled properly to avoid conflict and to support Environmental Sustainability. These traditional land registry applications also lack identity parameters due to weaknesses in identity so...
The research paper is about the dangers to information security and a solution to it by the use of the blockchain implementation in the data security. Blockchain security implementations were mostly witnessed in sensitive information... more
The research paper is about the dangers to information security and a solution to it by the use of the blockchain implementation in the data security. Blockchain security implementations were mostly witnessed in sensitive information systems, like the financial database. Furthermore, in this research paper, Threats to computers and information systems are highlighted and analyzed and the solution to them well elaborated. The cloud computing raised many security concerns, that had to be addressed and solutions found in curbing the information insecurity. The paper was majorly based on the step by step solution to the threat to the information system by blockchain technology.
Adoption of new technical innovation contributes not only by increasing the business goals, but also facilitates the growth and competitiveness of the organization. Organizations including SME are reluctant to migrate their existing... more
Adoption of new technical innovation contributes not only by increasing the business goals, but also facilitates the growth and competitiveness of the organization. Organizations including SME are reluctant to migrate their existing system to cloud platform because of various cloud adoption challenges. Various technical and nontechnical factors are responsible for cloud adoption and migration. Unavailability of a well-defined cloud strategy development model, less prior expertise of the cloud domain and unsurely about how and when to initiate cloud adoption or migration are the key challenges while moving to cloud platform. Most of the organizations are now thinking to migrate to a cloud platform, it is imperative for organizations to critically explore the challenges related to their business. Thus, there is the need of defining challenges associated during cloud adoption and a well-defined cloud strategy model for a successful migration to the cloud domain. This paper aims to investigate the key determinants affecting cloud adoption most in the organizations. Further, the paper identifies existing cloud frameworks and critically evaluates them based on their effectiveness and drawbacks. Factors affecting the cloud adoption process are identified, and a hypothetical framework is proposed based on identified variables. Results suggest that technical factors, organizational factors, and some external factors have a positive impact on cloud adoption.
Skin cancer is a worldwide epidemic. A computerised instrument allows spotting small shifts to change the skin's functionality in an early stage. This paper utilises Convolutional Neural Network (CNN) to identify skin cancers... more
Skin cancer is a worldwide epidemic. A computerised instrument allows spotting small shifts to change the skin's functionality in an early stage. This paper utilises Convolutional Neural Network (CNN) to identify skin cancers Theattained results demonstrate that the CNN method can effectively identify melanoma and benign cases from X-ray images. This work can help doctors to diagnose cancer in the skin in an initial stage and treat it successfully.
The Internet of Things (IoT) has radically transformed how patient information and healthcare monitoring are monitored and recorded and has revolutionized the area by ensuring regular 24 × 7 tracking without costly and restricted human... more
The Internet of Things (IoT) has radically transformed how patient information and healthcare monitoring are monitored and recorded and has revolutionized the area by ensuring regular 24 × 7 tracking without costly and restricted human resources and with a low mistake probability. The Internet of Medical Things (IoMT) is a subsection of the Internet of things (IoT) that uses medical equipment as things or nodes to enable cost-effective and efficient patient monitoring and recording. The IoMT can cope with a wide range of problems, including observing patients in hospitals, monitoring patients in their homes, and assisting consulting physicians and nurses in monitoring health conditions at regular intervals and issuing warning signals if emergency care is necessary. EEG signals, electrocardiograms (ECGs), blood sugar levels, blood pressure levels, and other conditions can be examined. In crucial situations, quick and real-time analysis is essential, and failure to provide careful att...
EHR is the digital record of the medical history of the patient. It has solved many issues related to data handling and its security. A detailed study is required to implement this technology under modern technology and standards to... more
EHR is the digital record of the medical history of the patient. It has solved many issues related to data handling and its security. A detailed study is required to implement this technology under modern technology and standards to minimize errors in integration. Present solutions lack interoperability and blockchain;therefore, theymust undergo further discussion and research related to it. This research aims to examine the interoperability challenges and issues of blockchain EHR frameworks as per the national and international standards of EHR. It will follow the interoperability standards in the EHR framework in terms of medical data distribution, sharing, and data dependability. The research is based on a systematic review of previous researches; 156 articles were excluded as they were based purely on blockchain and had little or no part of EHR, and 11 articles were selected based on the keywords selected in this research. Innovative interoperability framework and blockchain-based framework found to be successful in solving the current challenges in EHR. However, the issues of EHR can be resolved by bringing advancement in EHR. The research has contributed to highlighting the related challenges and solution in EHR implementation and presented a solution that will help to manage the data, security of information related to the patient and the benefits of blockchain and interoperability of EHR.
The SOBER family ciphers are generally constructed from a linear feedback shift register (LFSR), a non linear filter (NLF) and a form of irregular decimation called stuttering. Our work aims at having a comparative study of the SOBER... more
The SOBER family ciphers are generally constructed from a linear feedback shift register (LFSR), a non linear filter (NLF) and a form of irregular decimation called stuttering. Our work aims at having a comparative study of the SOBER family of stream ciphers with regard to design philosophies adapted and security aspects.
Cloud computing is the latest and rapidly growing technology that has brought new changes and opportunities in the field of education and IT industries. Consequently, e-learning emphasizes more on technology to transform and provide... more
Cloud computing is the latest and rapidly growing technology that has brought new changes and opportunities in the field of education and IT industries. Consequently, e-learning emphasizes more on technology to transform and provide training and education to learners. E-learning system using cloud computing platform introduces efficient and effective learning mechanism. In this paper, we briefly discuss the effectiveness of cloud-based e-learning along with its issues, challenges, and benefits. The analysis suggests that the cloud computing platform for e-learning is quite feasible and effective that brings greater clarity landscape anent to cloud computing assistances. Study of several cloud-based e-learning tools has been done on the basis of scalability, types of services, shareable content object reference model (SCORM), prices, usability, etc. Some e-learning trends of 2017 have been presented in last.
The pharmaceutical company is key to having a strong healthcare system, and excellent healthcare is essential for every society and economy. However, there are significant concerns with medication safety and security as a result of fake... more
The pharmaceutical company is key to having a strong healthcare system, and excellent healthcare is essential for every society and economy. However, there are significant concerns with medication safety and security as a result of fake and inferior medical items, which constitute a significant hazard and harm to consumers’ health. Globally, drug counterfeiting is a severe problem that endangers the public’s health as well as the health of consumers. The global business of manufacturing fake medications generates enormous annual revenue. To have a quality healthcare system, the pharmaceutical industry is of great importance and plays a vital role in medicine and pharmaceutical supplies. With emerging computer technologies like blockchain and IoT cutting across several industries and sectors and revolutionizing the world, a systematic literature review of various articles chosen from different databases was carried out in this study to analyze and evaluate application areas of this t...
The internet of medical things (IoMT) is a smart medical device structure that includes apps, health services, and systems. These medical equipment and applications are linked to healthcare systems via the internet. Because IoT devices... more
The internet of medical things (IoMT) is a smart medical device structure that includes apps, health services, and systems. These medical equipment and applications are linked to healthcare systems via the internet. Because IoT devices lack computational power, the collected data can be processed and analyzed in the cloud by more computationally intensive tools. Cloud computing in IoMT is also used to store IoT data as part of a collaborative effort. Cloud computing has provided new avenues for providing services to users with better user experience, scalability, and proper resource utilization compared to traditional platforms. However, these cloud platforms are susceptible to several security breaches evident from recent and past incidents. Trust management is a crucial feature required for providing secure and reliable service to users. The traditional trust management protocols in the cloud computing situation are centralized and result in single-point failure. Blockchain has em...
Electronic Health Record (EHR) is being used in most healthcare institutions to preserve and share health records instead of a paper-based method. Data records must be exchanged amongst various parties and users' privileges to manage... more
Electronic Health Record (EHR) is being used in most healthcare institutions to preserve and share health records instead of a paper-based method. Data records must be exchanged amongst various parties and users' privileges to manage access to their records should also be provided. In addition to the basic standards of secrecy, confidentiality and integrity of information, these facts further demonstrate the need for interoperability and consumer control to access their personal data. Electronic Health Record (EHR) system faces issues of protection of data, trust and management issues. In recent Covid-19 pandemic, various applications, tools and websites were launched that stores records. Also, many personal records related to health need to be shared among different parties for early detection, contact tracing, monitoring and the future prediction that requires accurate and reliable data. Simultaneously, the citizens will be hesitant in providing their personal details due to p...
The land registry system is one of the very important department in any governance system that stores the records of land ownership. There are various issues and loopholes in the existing system that give rise to corruption and disputes.... more
The land registry system is one of the very important department in any governance system that stores the records of land ownership. There are various issues and loopholes in the existing system that give rise to corruption and disputes. This requires a significant chunk of valuable government resources from judiciary and law enforcement agencies in settling these issues. Blockchain technology has the potential to counter these loopholes and sort out the issues related with land registry system like tempering of records, trading of the same piece of land to more than one buyer. In this paper, a secure and reliable framework for land registry system using Blockchain has been proposed. The proposed framework uses the concept of smart contract at various stages of the land registry and gives an algorithm for pre-agreement. First, we describe the conventional land registry system and reviews the issues in it. Then, we outline the potential benefits of employing Blockchain technology in the land registry system and presented a framework. Finally, a number of case studies are presented.
snafis@jazanu.edu.sa The focus has remained on determining and reviewing the interoperable standards in electronic health records (EHR) while determining which standard is best for interoperability. For this purpose, the research... more
snafis@jazanu.edu.sa The focus has remained on determining and reviewing the interoperable standards in electronic health records (EHR) while determining which standard is best for interoperability. For this purpose, the research identified that the current state of interoperability is not up to the required standard, so numerous issues are experienced in managing electronic health records. In addition, the research identified numerous standards being used for interoperability, including OpenEHR, OpenEMR, OpenMRS, GNU Health and OSHERA VistA. It can be argued that the use of HL7 and its different versions can play an instrumental role in the integration of the healthcare environment. It can be further advanced by harmonizing different standards in reference to Information Communication Technology and advanced technologies like Blockchain to ensure integration between healthcare systems and their respective applications. It will prove to be beneficial in the transparent exchange of h...
E-learning can provide a learning environment without the boundaries limit of time and location. Our previous assumption for teaching and learning is Pen, Paper, Blackboard, and a class room but now we have lots of different technologies... more
E-learning can provide a learning environment without the boundaries limit of time and location. Our previous assumption for teaching and learning is Pen, Paper, Blackboard, and a class room but now we have lots of different technologies which change the view of learning concepts and put striking effect on teaching and learning through which teaching and learning can be made more effective, powerful and easily accessible. Here we have defined some of the tools and technologies through their use teacher can provide interactive and challenging learning. These are the Course Management System (Moodle, Joomla, OLAT, JOJO CMS), Interactive Board (eBeam, SMART boards) and SmartPen
Research Interests: