Two journal paper accepted to Elsevier’s Future Generation Computation System

Two journal paper accepted to Elsevier’s Future Generation Computation System. Congratulations to Ragib Hasan, Mahmud Hossain, and Rasib Khan.

1. “An Internet of Things-Based Health Prescription Assistant and Its Security System Design”, in Future Generation Computer Systems, Elsevier, 2017.

2. “Aura: An Incentive-Driven Ad-Hoc IoT Cloud Framework for Proximal Mobile Computation Offloading”, Elsevier, in Future Generation Computer Systems, Elsevier, 2017.

One conference paper accepted to 8th ACM Conference on Data and Application Security and Privacy

One conference paper accepted to 8th ACM Conference on Data and Application Security and Privacy. Congratulations to Mahmud Hossain, Yasser Karim, and Ragib Hasan.

“A Conceptual Framework for an IoT-Based Health Assistant and Its Authorization Model”, in Proceedings of the 8th ACM Conference on Data and Application Security and Privacy (CODASPY), Tempe, AZ, USA, 2018.

One conference paper accepted to 8th IEEE Annual Computing and Communication Workshop and Conference

One conference paper accepted to 8th IEEE Annual Computing and Communication Workshop and Conference. Congratulations to Mahmud Hossain and Ragib Hasan.

“A Conceptual Framework for an IoT-Based Health Assistant and Its Authorization Model”, in Proceedings of the 8th IEEE Annual Computing and Communication Workshop and Conference (IEEE CCWC), Las Vegas, NV, USA, 2018.

A Paper from SECRETLab Accepted in IEEE SCC 2017

One paper from SECRETLab accepted in the 14th IEEE International Conference on Services Computing (SCC).

Congratulations to Shahid Noor, Arsh Arora, and Ragib Hasan.

Shahid Al Noor, Ragib Hasan, and Arsh Arora, ”ParkBid: An Incentive Based Crowdsourced Bidding Service for Parking Reservation”, in Proceedings of the 14th IEEE International Conference on Services Computing (SCC), Honolulu, Hawaii, 2017.

 

A Paper from SECRETLab Accepted in IEEE IoTCA 2017

One paper from SECRETLab accepted in the IEEE International Workshop on the Internet of Things Computing and Applications (IoTCA).

Congratulations to Mahmud Hossain, Ragib Hasan, and Anthony Skjellum.

Mahmud Hossain, Ragib Hasan, and Anthony Skjellum, “Securing the Internet of Things: A Meta-Study of Challenges, Approaches, and Open Problems”, IEEE International Workshop on the Internet of Things Computing and Applications (IoTCA), Atlanta, GA, USA, 2017

3 Papers from SECRETLab Accepted in IEEE ICIoT 2017

Three papers from SECRETLab accepted in the 2nd IEEE International Congress on Internet of Things (ICIoT). Congratulations to Mahmud Hossain, Yasser Karim, Shahid Noor, Shams Zawoad, and Ragib Hasan.

1. Mahmud Hossain, Shahid Al Noor, Yasser Karim, and Ragib Hasan, ”IoTbed: A Generic Architecture for Testbed as a Service for Internet of Things-based Systems”, in Proceedings of the 2nd IEEE International Congress on Internet of Things (ICIoT), Honolulu, Hawaii, 2017.

2. Mahmud Hossain and Ragib Hasan, “Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes”, in Proceedings of the 2nd IEEE International Congress on Internet of Things (ICIoT), Honolulu, Hawaii, 2017.

3. Mahmud Hossain, Shahid Al Noor, Ragib Hasan, and Shams Zawoad, ”Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV)”, in Proceedings of the 2nd IEEE International Congress on Internet of Things (ICIoT), Honolulu, Hawaii, 2017.

A Paper from SECRETLab Accepted in IEEE Cloud 2017

One paper from SECRETLab accepted in the 10th IEEE International Conference on Cloud Computing (CLOUD)

Congratulations to Arsh Arora, Thomas Stallings, Gary Warner and Ragib Hasan.

Arsh Arora, Thomas Stallings, Ragib Hasan, and Gary Warrner,, “Malware Secrets: De-obfuscating in the cloud”, in the 10th IEEE International Conference on Cloud Computing (CLOUD), Honolulu, Hawaii, USA, 2017.

Paper Accepted in IEEE SmartCloud 2016

Our work “CACROS: A Context-Aware Cloud Content Roaming Service” got accepted for publication in the IEEE International Conference on Smart Cloud (SmartCloud 2016), New York, USA, Nov 2016.

Congratulations Md. Mahmud Hossain, Shahid Al Noor, Dibya Mukhopadhyay, Ragib Hasan, and Lei Li.

2 Papers from SECRETLab Accepted in BDCloud 2016

Title: Verifiable Data Redundancy in the Cloud

Authors: Mohammad Kamrul Islam and Ragib Hasan

Abstract: Data redundancy is critical for the assurance of service continuity in fault tolerant systems. Researchers have proposed several efficient data replication strategies to secure users’ sensitive information from a single point of failure. Although the cloud service providers (CSP) assure users regarding data safety by following some of those replication strategies, the opaque operational model of the cloud does not allow the users to verify the replications. This, in turn, introduces lack of trust in clouds. The challenge of verifiable data redundancy is two-fold: to verify that the server indeed possesses multiple copies, and to verify that those copies are not located in the same physical system. Current research mainly focuses on verification by access time of multiple requests which is highly system dependent. Hence, we propose a novel storage-as-a-service protocol that provides verifiable data redundancy in the semi or untrusted server. Our proposed model is completely oblivious of the physical system and the allocation protocol of the cloud. It does not include the server in the verification process which eliminates the risk of manipulation by a dishonest service provider. Our model uses distinct copies to store in the server as replicas, and provides deterministic verification of having data redundancies in the server. For generating unique copies of data, we use different random numbers in ElGamal encryption system. After proposing the storage, access, and verification processes, we implemented a prototype system to analyze the performance of our proposed model. Our experimental results show that our system can successfully verify the redundancy of the data in the remote server and detect any service level agreement anomalies.

 

 

Title:  SASCloud: Ad hoc Cloud as Secure Storage

Authors:  Shahid Al Noor, Md. Mahmud Hossain and Ragib Hasan

Abstract: With the emergence of high-speed 4G networks along with reachable Wifi system, cloud computing frameworks can greatly leverage in mobile domain. However, receiving a temporary storage service in a communication challenged area is challenging due to the unavailability of any secure third party cloud system. Although the existing ad hoc cloud architectures facilitate distributed computation and sensing operations, such systems fail to deliver secure ad hoc storage as a service when client requests for secure storage as a service. The absence of a proper centralized monitoring system in the existing ad hoc cloud is a major obstacle for convincing a client to trust the neighboring mobile nodes for content offloading. In case a client and an outsourced node gets disconnected, retrieving the offloaded contents along with ensuring their confidentiality and integrity becomes non-trivial. Additionally, providing a feasible and justified monetary incentive is a complex process for such ad hoc mobile frameworks. In this paper, we propose SASCloud, a centrally controlled ad hoc cloud system that provides a secure and reliable storage service for mobile clients. Our proposed system uses the contextual information of mobile users along with partial environmental knowledge and forms a temporal cloud using the resources of neighboring mobile devices. Along with the detailed reasoning of possible threats in our model, we provide a secure framework for content distribution and retrieval. We provide extensive analysis of our model using simulated experimental modules.