SOC

In today’s world, a digital identity on the Internet can be considered synonymous to a currency. The reputation of a digital identity reflects the person and affects his real-life in social contexts. Current or future jobs, credit scores, loans, public and social reputation are all affected by a person’s identity on the Internet. A user is vulnerable to identity thefts in various means and ways. Our research explores secure technologies, models, security frameworks, and protocols for the different domains of Internet-enabled services: peer-to-peer systems, decentralized and distributed architectures, interactive systems, and general client-server models. Our protocol designs are engineered based on analyzing threat models for the target service infrastructure and cryptographic technologies. The protocols and systems are tested and evaluated using our private 5-node OpenStack cloud, numerous Raspberry Pi-s and Arduinos, various mobile and tablet devices, Google watches, and Google Glasses. We use advanced statistical toolkits to perform data mining and analytical modeling on security practices and susceptibility of users on the Internet.

 

service-oriented-computing

 

 

Current Projects

Our current research projects in the domain of secure identities in service oriented computing architectures include:

  • User Behavioral Modelling: Create, analyze, predict, and evaluate different statistical models to perform security evaluation of Internet users based on their practices and expectations.
  • SecP2PSIP: A Secure Peer-to-Peer Session Initiation Protocol overlay network for media services based on shared knowledge sharing.
  • Secure Authentication at ATM Terminals: Perform secure and shoulder-surfing resistant PIN-based authentication at point-of-service or ATM terminals using advanced wearable devices, such as Google Glass.
  • Distributed Collaborative Identity: Create and establish secure, non-linkable, and auditable public identity across decentralized and distributed entities in collaborative environments.
  • Secure Identity Management in Distributed Services: Create, manage, and distribute identity in localized but distributed service architectures.
  • Timeline Authentication: Perform authentication and access control based on timeline of users’ interactions to leverage the primary authentication limitations.
  • Supply Chain Integrity Assurance: Ensure secure and trustworthy information management for end-to-end supply chains.

 

 

Related Publications

  • Rasib Khan, Shams Zawoad, Md Munirul Haque and Ragib Hasan, “Who, When, and Where? Location Proof Assertion for Mobile Devices“, DBSEC 2014 Vienna, Austria, July 14-16, 2014. [pdf]
  • Rasib Khan and Ragib Hasan, “SecP2PSIP: A Distributed Overlay Architecture for Secure P2PSIP”, The 3rd ASE International Conference on Cyber Security 2014, Stanford. CA, USA, May  27-31, 2014. [pdf]
  • Rasib Khan, Md Munirul Haque, and Ragib Hasan, “Modeling a Secure Supply Chain Integrity Preservation System”, In Proceedings of IEEE International Conference on Technologies for Homeland Security, Waltham, MA, November, 2013. [pdf]
  • Ragib Hasan and Rasib Khan, “Interaction Provenance Model for Unified Authentication Factors in Service Oriented Computing”, Fourth ACM Conference on Data and Application Security and Privacy (CODASPY), March 2014. [pdf]