Skip to main content
Abdullah Al Omar
  • 74/A Green road
  • +8801676367070

Abdullah Al Omar

  • Abdullah Al Omar received his B.Sc. degree from Dept. of CSE, University of Asia Pacific (UAP) in 2016. He is current... more edit
Cloud-based IoT architectures are expecting a fast data transfer rate within a limited bandwidth. But achieving a fast data transfer rate is becoming more difficult gradually, with the massive amount of data produced by the IoT devices.... more
Cloud-based IoT architectures are expecting a fast data transfer rate within a limited bandwidth. But achieving a fast data transfer rate is becoming more difficult gradually, with the massive amount of data produced by the IoT devices. The concept of edge computing gives a solution to this problem and provides fast interaction between data centers and IoT devices. With the help of edge computing, the data transfer rate has been increased drastically within a limited bandwidth. As a result, edge computing is being used in different IoT based industry including the IoT based healthcare industry. On the other hand, the distributed nature of the edge computing paradigm introduces security and privacy concerns (e.g., data theft). The IoT based healthcare solutions are getting popular among the users. Therefore, users' highly sensitive data is at high risk of theft before eventually reaching the cloud. Nowadays, these issues are being solved by introducing blockchain in different architectures. Hence, this paper is utilizing blockchain technology for providing a user-centric secure edge computing architecture for healthcare IoT devices. We are proposing to integrate blockchain to store the users' data transfer records and ensuring data security by managing the number of blockchain transactions. We are providing user-centricity by allowing users to monitor their data transactions.
Data integrity is given top priority when exchange of information takes place. Information loses value, even becomes redundant should the intended user fail to obtain it. Modern day communications are mostly done on World Wide Web (WWW).... more
Data integrity is given top priority when exchange of information takes place. Information loses value, even becomes redundant should the intended user fail to obtain it. Modern day communications are mostly done on World Wide Web (WWW). Group communication must strike a balance between how quickly data is exchanged among users, at the same time, data security must not be compromised. Hence, protocols are in place to ensure data security in a cryptographic group by encrypting data before sending it to users. A separate transaction takes place with a key to decrypt the data. As the users grow in numbers, the key management becomes harder and complex in nature. Herein, Logical Key Hierarchy (LKH) has been proposed for a cryptographic group. A thorough analysis of the prevailing key management systems has been conducted. Few surveys have been researched and analyzed. Fundament security systems have been tested in real-life settings. A key management system needs to be in place that sharpens data security but provides users with quick service. Group Secure Association Key Management Protocol (GSAKMP) has been widely used. But online transaction and group that are geographically spread pose a different challenge. Hence, a proposal has been adopted to manage keying and rekeying for the members of a cryptographic group.
Data tampering is one of the most intriguing personal information security concerning issues in online business portals. For various individual or business purposes, clients need to share their personal information with these online... more
Data tampering is one of the most intriguing personal information security concerning issues in online business portals. For various individual or business purposes, clients need to share their personal information with these online business portals. Upon taking conveniences from this sharing of information about an individual, online business sites accumulate client data including client’s most sensitive information for running different data analysis without taking the clients’ authorization. In a view to proposing suggestions, data analysis may need to be done in the online business portals. A recommender system or framework creates an automated personalization on a rundown of items based on the users’ preference of searching any product over the portal. These days, the recommender system or framework is the part and parcel to the online marketing and business portals. However, secure control of client information is missing to some extent in such systems. Blockchain technology guarantees security in data manipulation for the clients in these online portals since it is a secure distributed ledger for storing data transaction. This paper presents a privacy-preserving or privacy-securing platform for recommender framework or system utilizing blockchain technology. The distributed ledger attribute of blockchain gives any client a verified domain where information is utilized for analysis with his/her required consents. Under this platform, clients get rewards (i.e., points, discounts) from the proposed online based company for sharing their information to figure out and propose relevant suggestions.
Healthcare data are grabbing the interest of cyber attackers in recent years. Annihilating consequences of healthcare data could be alleviated through decentralization. A peer to peer (P2P) network enables the property of... more
Healthcare data are grabbing the interest of cyber attackers in recent years. Annihilating consequences of healthcare data could be alleviated through decentralization. A peer to peer (P2P) network enables the property of decentralization, where different parties can store and run computation while keeping the sensitive health data private. Blockchain technology leverages decentralized or distributed process, which ensures the accountability and integrity of its use. This paper presents a patient centric healthcare data management system by using Blockchain as storage to attain privacy. Pseudonymity is ensured by using the cryptographic functions to protect patient’s data.
Criminal records are highly sensitive public records. By incorporating criminal records in a blockchain, authenticity and rigidity of records can be maintained; which also helps to keep the data safe from adversaries. A peer to peer cloud... more
Criminal records are highly sensitive public records. By incorporating criminal records in a blockchain, authenticity and rigidity of records can be maintained; which also helps to keep the data safe from adversaries. A peer to peer cloud network enables the decentralization of data. It helps prevent unlawful changes in the data. This paper introduces a criminal record storage system by implementing blockchain technology to store the data, which helps to attain integrity and security. Our system presents ways in which the authority can maintain the records of criminals efficiently. Authorities (e.g., Law enforcement agencies and courts) will be able to add and access criminal data. General users (e.g., selected organizations and/or individuals, airports, visa application centers etc.) will have access to the data so that they can look up criminal records. Proper and timely access to authentic criminal records is essential to enforce the law. The effect of corruption on the law enforcement forces will also decrease, as this will cut off an entire scope of corruption by removing any possibility of tampering with criminal records data by thorough accountability.
Application-based mobile banking is a very commonly used term in the world. The data taken by the server are the personal sensitive data of the user. These data are very sensitive and should not be disclosed, so it must be stored... more
Application-based mobile banking is a very commonly used term in the world. The data taken by the server are the personal sensitive data of the user. These data are very sensitive and should not be disclosed, so it must be stored securely. Moreover, the transactional data/metadata of the user should also be kept secured, and it has to be ensured that only the user can access and see his/her transactions. This paper introduces a secured system for application-based mobile banking. We are using blockchain to store the transactional data and bank server to store the personal data of the users. Cryptographic functions have been used here to encrypt the user data in this system to reduce the loss of transactional data and also to make the users reliable to the application-based mobile banking.
Understanding customer's sentiment (satisfaction or dissatisfaction) is considered as valuable information for both the potential customers and restaurant authority. However, analyzing customer reviews (unstructured texts) one by one... more
Understanding customer's sentiment (satisfaction or dissatisfaction) is considered as valuable information for both the potential customers and restaurant authority. However, analyzing customer reviews (unstructured texts) one by one is a difficult task and also practically impossible when the number of reviews is enormous. Therefore, it seems conceivable to have a mechanism to analyze customer reviews automatically and provide the necessary information in a precise way. Here, we introduce a Natural Language Processing (NLP) based opinion mining methodology to analyze the customer opinion automatically. For that, first, a captive portal is used to collect customer's reviews. Then, the opinion mining technique is applied to analyze the reviews to explore customer sentiment about food quality, service, environment, etc. A data-driven experiment is conducted to evaluate the proposed methodology. The experiment result showed the effectiveness of the proposed method for retrievin...
The voting system is the process to take the opinion of people to run the constitution properly. Fairness, independence, and unbiasedness should be present in the voting system. Hence, it must be a transparent and secured process so that... more
The voting system is the process to take the opinion of people to run the constitution properly. Fairness, independence, and unbiasedness should be present in the voting system. Hence, it must be a transparent and secured process so that everybody can express their own opinion freely. Worldwide vote manipulation is an intriguing problem in existing voting systems. Since people in different countries are using digital technology in the voting process (e.g., Optical Scan Voting system, Internet Voting system, Electronic Voting system) instead of traditional way (e.g., Ballot Box). Only digitization could not solve the issues completely. Because still there are numerous ways to manipulate or tamper digital technology and hamper the voting process. To build a secure electronic voting environment, we introduce an application of blockchain technology as a service for the distributed electronic voting system. With the use of blockchain, we achieve data integrity which is a necessary attribute of a voting environment. The anonymity of the voters, privacy, and security of the voting environment is the main goal of this work. Through the design of our system and with the help of blockchain we have solved all the security issues in the voting environment.
In smart cities, data privacy and security issues of Electronic Health Record(EHR) are grabbing importance day by day as cyber attackers have identified the weaknesses of EHR platforms. Besides, health insurance companies interacting with... more
In smart cities, data privacy and security issues of Electronic Health Record(EHR) are grabbing importance day by day as cyber attackers have identified the weaknesses of EHR platforms. Besides, health insurance companies interacting with the EHRs play a vital role in covering the whole or a part of the financial risks of a patient. Insurance companies have specific policies for which patients have to pay them. Sometimes the insurance policies can be altered by fraudulent entities. Another problem that patients face in smart cities is when they interact with a health organization, insurance company, or others, they have to prove their identity to each of the organizations/companies separately. Health organizations or insurance companies have to ensure they know with whom they are interacting. To build a platform where a patient's personal information and insurance policy are handled securely, we introduce an application of blockchain to solve the above-mentioned issues. In this ...
Cloud-based IoT architectures are expecting a fast data transfer rate within a limited bandwidth. But achieving a fast data transfer rate is becoming more difficult gradually, with the massive amount of data produced by the IoT devices.... more
Cloud-based IoT architectures are expecting a fast data transfer rate within a limited bandwidth. But achieving a fast data transfer rate is becoming more difficult gradually, with the massive amount of data produced by the IoT devices. The concept of edge computing gives a solution to this problem and provides fast interaction between data centers and IoT devices. With the help of edge computing, the data transfer rate has been increased drastically within a limited bandwidth. As a result, edge computing is being used in different IoT based industry including the IoT based healthcare industry. On the other hand, the distributed nature of the edge computing paradigm introduces security and privacy concerns (e.g., data theft). The IoT based healthcare solutions are getting popular among the users. Therefore, users' highly sensitive data is at high risk of theft before eventually reaching the cloud. Nowadays, these issues are being solved by introducing blockchain in different architectures. Hence, this paper is utilizing blockchain technology for providing a user-centric secure edge computing architecture for healthcare IoT devices. We are proposing to integrate blockchain to store the users' data transfer records and ensuring data security by managing the number of blockchain transactions. We are providing user-centricity by allowing users to monitor their data transactions.
Data integrity is given top priority when exchange of information takes place. Information loses value, even becomes redundant should the intended user fail to obtain it. Modern day communications are mostly done on World Wide Web (WWW).... more
Data integrity is given top priority when exchange of information takes place. Information loses value, even becomes redundant should the intended user fail to obtain it. Modern day communications are mostly done on World Wide Web (WWW). Group communication must strike a balance between how quickly data is exchanged among users, at the same time, data security must not be compromised. Hence, protocols are in place to ensure data security in a cryptographic group by encrypting data before sending it to users. A separate transaction takes place with a key to decrypt the data. As the users grow in numbers, the key management becomes harder and complex in nature. Herein, Logical Key Hierarchy (LKH) has been proposed for a cryptographic group. A thorough analysis of the prevailing key management systems has been conducted. Few surveys have been researched and analyzed. Fundament security systems have been tested in real-life settings. A key management system needs to be in place that sharpens data security but provides users with quick service. Group Secure Association Key Management Protocol (GSAKMP) has been widely used. But online transaction and group that are geographically spread pose a different challenge. Hence, a proposal has been adopted to manage keying and rekeying for the members of a cryptographic group.
Data tampering is one of the most intriguing personal information security concerning issues in online business portals. For various individual or business purposes, clients need to share their personal information with these online... more
Data tampering is one of the most intriguing personal information security concerning issues in online business portals. For various individual or business purposes, clients need to share their personal information with these online business portals. Upon taking conveniences from this sharing of information about an individual, online business sites accumulate client data including client's most sensitive information for running different data analysis without taking the clients authorization. In a view to proposing suggestions, data analysis may need to be done in the online business portals. A recommender system or framework creates an automated personalization on a rundown of items based on the users preference of searching any product over the portal. These days, the recommender system or framework is the part and parcel to the online marketing and business portals. However, secure control of client information is missing to some extent in such systems. Blockchain technology guarantees security in data manipulation for the clients in these online portals since it is a secure distributed ledger for storing data transaction. This paper presents a privacy-preserving or privacy-securing platform for recommender framework or system utilizing blockchain technology. The distributed ledger attribute of blockchain gives any client a verified domain where information is utilized for analysis with his/her required consents. Under this platform, clients get rewards (i.e., points, discounts) from the proposed online based company for sharing their information to figure out and propose relevant suggestions.
Cross-border data sharing for knowledge generation is a challenging research direction since an application may access personal data stored in countries different from the one where the application is accessed from. In this paper, we... more
Cross-border data sharing for knowledge generation is a challenging research direction since an application may access personal data stored in countries different from the one where the application is accessed from. In this paper, we propose a cross-border data sharing platform where a global cloud is built atop multiple security gateways that are set up in different countries. Once an application requests access to data from a particular country or region, the global cloud collects the data stored in local data hubs through that region's security gateway. While transferring the data to the global cloud, the security gateway records this transfer information on a blockchain maintained by the global cloud. When an application reports any misbehavior (e.g., providing wrong data type or incorrect data) against a security gateway, the global cloud verifies the claim by auditing the blockchain and punishes the misbehaving security gateway if the claim is true. In the case of false misbehavior report, the application itself will be punished by the global cloud. Thus, our platform provides an accountable data sharing function using blockchain that relies on a relaxed trust assumption on the data providers. We include five algorithms to handle data access request, data sharing, blockchain transaction, detecting and punishing misbehaving entities. In the algorithms we also M. S. Rahman is the Corresponsing Author and with introduce how the transaction takes place in the platform. Thus, the proposed platform is able to handle misbehaving data sender, data receiver, or any entity participating in the platform. We analyze our platform empirically by showing different graphs which have been generated by a number of experiments on blockchain environment. We also delineate how the multi-layer of signature (ECDSA) acts in our platform.
Data in cloud has always been a point of attraction for the cyber attackers. Nowadays healthcare data in cloud has become their new interest. Attacks on these healthcare data can result in annihilating consequences for the healthcare... more
Data in cloud has always been a point of attraction for the cyber attackers. Nowadays healthcare data in cloud has become their new interest. Attacks on these healthcare data can result in annihilating consequences for the healthcare organizations. Decentralization of these cloud data can minimize the effect of attacks. Storing and running computation on sensitive private healthcare data in cloud are possible by decentralization which is enabled by peer to peer (P2P) network. By leveraging the decentralized or distributed property, blockchain technology ensures the accountability and integrity. Different solutions have been proposed to control the effect of attacks using decentralized approach but these solutions $ A preliminary version of this paper C a m e r a R e a d y somehow failed to ensure overall privacy of patient centric systems. In this paper, we present a patient centric healthcare data management system using blockchain technology as storage which helps to attain privacy. Cryptographic functions are used to encrypt patients data and to ensure pseudonymity. We analyze the data processing procedures and also the cost effectiveness of the smart contracts used in our system.
Criminal records are highly sensitive public records. By incorporating criminal records in a blockchain, authenticity and rigidity of records can be maintained; which also helps to keep the data safe from adversaries. A peer to peer cloud... more
Criminal records are highly sensitive public records. By incorporating criminal records in a blockchain, authenticity and rigidity of records can be maintained; which also helps to keep the data safe from adversaries. A peer to peer cloud network enables the decentralization of data. It helps prevent unlawful changes in the data. This paper introduces a criminal record storage system by implementing blockchain technology to store the data, which helps to attain integrity and security. Our system presents ways in which the authority can maintain the records of criminals efficiently. Authorities (e.g., Law enforcement agencies and courts) will be able to add and access criminal data. General users (e.g., selected organizations and/or individuals, airports, visa application centers etc.) will have access to the data so that they can look up criminal records. Proper and timely access to authentic criminal records is essential to enforce the law. The effect of corruption on the law enforcement forces will also decrease, as this will cut off an entire scope of corruption by removing any possibility of tampering with criminal records data by thorough accountability.
Healthcare data are grabbing the interest of cyber attackers in recent years. Annihilating consequences of healthcare data could be alleviated through decentralization. A peer to peer (P2P) network enables the property of... more
Healthcare data are grabbing the interest of cyber attackers in recent years. Annihilating consequences of healthcare data could be alleviated through decentralization. A peer to peer (P2P) network enables the property of decentralization, where different parties can store and run computation while keeping the sensitive health data private. Blockchain technology leverages decentralized or distributed process, which ensures the accountability and integrity of its use. This paper presents a patient centric healthcare data management system by using Blockchain as storage to attain privacy. Pseudonymity is ensured by using the cryptographic functions to protect patient's data.