Papers by Abubaker Wahaballa
Zenodo (CERN European Organization for Nuclear Research), Oct 13, 2019
Collaborative cache management in Mobile Ad Hoc Networks (MANETs) environment is considered as an... more Collaborative cache management in Mobile Ad Hoc Networks (MANETs) environment is considered as an efficient technique to increase data accessibility and availability, by sharing and coordination among mobile nodes. Due to nodes' mobility, limited battery power and insufficient bandwidth, researchers addressed these challenges by developing many different collaborative caching schemes. The objective of this paper is to review various collaborative caching techniques in MANETs. Collaborative caching techniques are classified by methods used in serving queries, such as: hop-by-hop discovering, broadcasting messages, flooding, and query service differentiation. This review reveals that techniques utilizing hopby-hop methods have better performance compared to others, especially techniques using additional strategies.

Transactions on Emerging Telecommunications Technologies, Mar 15, 2020
Vehicle sensors are continuously observing the state of the vehicle, collecting and transmitting ... more Vehicle sensors are continuously observing the state of the vehicle, collecting and transmitting data from/to surrounding road users. The sensors data are then processed and stored in an in-vehicle sensor database in the form of records. These records can be accessed and shared by other vehicles or road side units with the aim to improve road safety. However, these records may contain a very sensitive information, such as vehicles' identifiers and location. This information requires extraordinary protection to ensure privacy and confidentiality of the vehicle users. In this article, we propose a secure oblivious transfer protocol with hidden access control and outsourced decryption from deterministic finite automata (DFA)-based functional encryption (HACOT-DFA). To reduce the computational costs for users with limited resources, we securely offload the heavy decryption overhead on the user side to an untrusted cloud server. Then, we experimentally compare our HACOT-DFA protocol against existing HACOT protocols in three different platform settings: the smartphone, the desktop personal computer, and the embedded device Raspberry Pi. The analyses demonstrate that the proposed HACOT-DFA protocol is more efficient and computationally stable than previous work. Our security proof holds in the standard model using a dual-system encryption approach.

After the great success of Mobile wallet, the Internet of Things (IoT) leaves the door wide open ... more After the great success of Mobile wallet, the Internet of Things (IoT) leaves the door wide open for consumers to use their connected devices to access their bank accounts and perform routine banking activities from anywhere, anytime and with any device. However, consumers need to feel safe when interacting with IoT-based payment systems, and their personal information should be protected as much as possible. Unlike as usually done in the literature, in this paper, we introduce two lightweight and secure IoT-based payment protocols based on an identity-based signature scheme. We adopt a server-aided verification technique to construct the first scheme. This technique allows to outsource the heavy computation overhead on the sensor node to a cloud server while maintaining the user's privacy. The second scheme is built upon a pairing-free ECC-based security protocol to avoid the heavy computational complexity of bilinear pairing operations. The security reduction results of both s...

With the characteristic of spatial diversity and low cost, cooperative system is a tendency for t... more With the characteristic of spatial diversity and low cost, cooperative system is a tendency for the future communications. In the wireless communication system, there exist degradation factors such as signal fading, multipath transmission, signal inferences, bandwidth limitation and so on. In addition to these degradation factors, the wireless transmission is not a secure environment. The information might be leaked during the transmission. Currently , the issues of privacy and security have become increasingly important for the mobile users. Traditionally, the security scheme is applied to the higher network layer. Encryption can be complex and difficult without infrastructure. It is not suitable to apply to the equipment with low computing resources, such as Internet of Things (IoT) application. Within information theoretic security characterizes the fundamental ability of the physical layer to provide a secure transmission. Hence, this work concentrates on the secure cooperative ...

International Journal of Digital Content Technology and its Applications, 2011
In recent years, the software engineering community has put considerable efforts into the design ... more In recent years, the software engineering community has put considerable efforts into the design and development of component-based software system (CBSS) in order to manage the software increasing complexity and to maximize the reuse of code. This paper presents some of such efforts by investigating the improved measurement tools and techniques, i.e., through the effective software metrics. Upon the research on the classical evaluation measures for software systems, we argue the traditional metrics are not suitable for CBSS. Therefore we provide an account of novel software measures for component by adequate coupling, cohesion and interface metrics. The complexity metrics combined with three metrics on the CBSS level is also investigated. The advantages of our method are discussed as well through a case study in this paper.

Lecture Notes in Computer Science, 2011
Consider a database where each record has different access control policies. These policies could... more Consider a database where each record has different access control policies. These policies could be attributes, roles, or rights that the user needs to have in order to access the record. Here we provide a protocol that allows the users to access the database record while: (1) the database does not learn who queries a record; (2) the database does not learn which record is being queried, nor the access control policy of that record; (3) the database does not learn whether a user's attempt to access a record was successful or not; (4) the user can only obtain a single record per query; (5) the user can only access those records for which she has the correct permissions; (6) the user does not learn any other information about the database structure and the access control policies other than whether he was granted access to the queried record, and if so, the content of the record; and (7) the users' credentials can be revoked. Our scheme builds on the one by Camenisch, Dubovitskaya and Neven (CCS'09), who consider oblivious transfer with access control when the access control policies are public.

International Journal of Computers and Applications, 2014
Abstract This paper presents multiple-layered securities by combining steganography with cryptogr... more Abstract This paper presents multiple-layered securities by combining steganography with cryptography under the scope of information hiding, and both image and audio steganography are used to obtain a more robust security system. Firstly, the different approaches of steganography and cryptography are discussed, and comparisons drawn between them. Secondly, the design of the dual-layered security system is presented. The algorithms for this work are based on the Least Significant Bit steganography and AES cryptography. The code has been implemented in C# and visual studio 2010 due to its object encryption/decryption abilities. Under the provisions of the system, if an attacker detects that steganography is being used, the embedded message cannot be read due to file encryption. Finally, Matlab analysis of the original and stego media quality effects are presented, proving the robustness of this type of security implementation.
2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS), 2015
DevOps community advocates collaboration between development and operations staff during software... more DevOps community advocates collaboration between development and operations staff during software deployment. However this collaboration may cause a conceptual deficit. This paper proposes a Unified DevOps Model (UDOM) in order to overcome the conceptual deficit. Firstly, the origin of conceptual deficit is discussed. Secondly, UDOM model is introduced that includes three sub-models: application and data model, workflow execution model and infrastructure model. UDOM model can help to scale down deployment time, mitigate risk, satisfy customer requirements, and improve productivity. Finally, this paper can be a roadmap for standardization DevOps terminologies, concepts, patterns, cultures, and tools.

with the development of digital image production and applications, digital image security has bec... more with the development of digital image production and applications, digital image security has become very important in today's world. This paper proposes image confidentiality relying on one spatial domain transformation (Arnold transformation) and one stream cipher algorithm (RC4). The paper has three phases; the first phase is the design and implementation of digital image scrambling using Arnold transformation based on best iteration. The second phase is the design and implementation of digital image encryption using RC4 stream cipher and the third phase makes use of both Arnold transform and RC4 algorithm based on best iteration which applies Arnold transform to scramble a digital image and then encrypt it using RC4. The input key to RC4 is generated using Blum Blum Shub (BBS) pseudo random bit generator algorithm. All phases are implemented using Matlab. Each phase is followed by some security evaluations. The security evaluations are presented by calculating a correlation coefficient and a security quality factor. The results show that for the same digital gray image, a correlation coefficient produced by Arnold transform based on best iteration is better than that produced by RC4; however an Arnold transform based on best iteration has a security quality factor of zero. Applying Arnold transform in scrambling before encrypting using RC4 gives a correlation coefficient as well as the Arnold transform in addition to the security quality factor better than encryption using RC4.

Int. J. Netw. Secur., 2017
The current Digital Rights Management (DRM) systems use attribute-based encryption (ABE) and prox... more The current Digital Rights Management (DRM) systems use attribute-based encryption (ABE) and proxy re-encryption (PRE) to achieve fine-grained access control in cloud computing. However, these schemes have some limitations particularly in terms of security, functionality and also higher decryption time which grows linearly with the complexity of access policies. In this paper, we propose a novel DRM scheme founded on a deterministic finite automata-based functional proxy re-encryption (DFA-based FPRE) scheme which has been proven to be secure against CCA in the standard model. In particular, we leverage the DFA-based FPRE scheme to realize fine-grained access control over encrypted contents among a set of users. Furthermore, a secure content key distribution protocol and efficient revocation mechanism are provided. Moreover, we tackle the critical issue of high computation at the user side, by outsourcing computation into (DFA-based FPRE) scheme for the first time. In comparison, ou...
Int. J. Netw. Secur., 2016
Security and undetectability are main goals of steganographic systems. This paper proposes a nove... more Security and undetectability are main goals of steganographic systems. This paper proposes a novel certificate- less public key steganography that allows two parties that have no prior knowledge of each other to communicate covertly over public channel. Firstly, secure and high efficient rate of key distribution are provided. Secondly, proper stego and destego are introduced based on Distributed Discrete Wavelet Transform (DDWT) and Singular Value Decomposition (SVD).Thirdly, we present the Matlab analysis of the original and stego images, which proves the robustness of our scheme. Finally, the analyses demonstrate that our scheme meets all security requirements of steganographic system and resists various kinds of sophisticated attacks.
Int. J. Netw. Secur., 2016
Mostly, current security architectures for Digital rights management (DRM) systems use either Pub... more Mostly, current security architectures for Digital rights management (DRM) systems use either Public Key Cryptography (PKC) or Identity-based Public Key Cryptography (ID-PKC). However, PKC has a complex certificate management and ID-PKC has a key escrow problem. Certificateless Public Key Cryptography (CL-PKC) has some attractive properties which seem compatible with the requirements of DRM systems. In this paper, we present anonymous pairing-free certificateless authenticated key exchange (CL-AKE) protocol for DRM system which provides a mechanism for distributing licenses in a exible and secure manner. Furthermore, the analyses demonstrate that our scheme is efficient and secure.
Providing security on transmitted medical image over public channels has become an essential part... more Providing security on transmitted medical image over public channels has become an essential part of computeraided diagnosis systems. In this paper, we propose an efficient image encryption scheme for medical applications based on Arnold transformation and pairing-free identitybased authenticated key agreement protocol. This allows user to send and receive medical images over public channel safely, while maintaining patient privacy. We then provide the numerical analysis results to prove the robustness of our scheme. These results are carried out via both theoretic analysis and experimental simulations based on MATLAB . The analysis demonstrates that our scheme meets the effectiveness and security requirements of image encryption.

Wireless Networks
With the rapid popularity and wide adoption of cloud storage, providing privacy-preserving by pro... more With the rapid popularity and wide adoption of cloud storage, providing privacy-preserving by protecting sensitive information becomes a matter of grave concern. The most effective and sensible way to address this issue is to encrypt the data before uploading it to the cloud. However, to search over encrypted data with different keys is still an open problem when it comes to the deployment of emerging technologies such as healthcare applications and e-marketplace systems. To address these issues, in this paper, we proposed a secure and efficient public-key encryption with an equality test technique that supports anonymous authorization, abbreviated as (PKEET-AA). Our proposed scheme allows a specific user to identify who can perform the equality test process among various cloud servers without compromising sensitive information. It also provides an anonymous approach to search for some statistical information about specific identical encrypted records in several databases. Moreover, we prove that our proposed PKEET-AA scheme is one-way secure against chosen-ciphertext attack (OW-CCA) and undistinguishable against adaptive chosen ciphertext attack (IND-CCA) in the random oracle model. Thus, to provide authorization/multi-authorization anonymity under the Decisional Diffie–Hellman assumption.
Engineering, Technology & Applied Science Research
Collaborative cache management in Mobile Ad Hoc Networks (MANETs) environment is considered as an... more Collaborative cache management in Mobile Ad Hoc Networks (MANETs) environment is considered as an efficient technique to increase data accessibility and availability, by sharing and coordination among mobile nodes. Due to nodes’ mobility, limited battery power and insufficient bandwidth, researchers addressed these challenges by developing many different collaborative caching schemes. The objective of this paper is to review various collaborative caching techniques in MANETs. Collaborative caching techniques are classified by methods used in serving queries, such as: hop-by-hop discovering, broadcasting messages, flooding, and query service differentiation. This review reveals that techniques utilizing hop-by-hop methods have better performance compared to others, especially techniques using additional strategies.
International Journal of Computers and Applications
Component-based software system (CBSS) must be designed and implemented not only to meet the curr... more Component-based software system (CBSS) must be designed and implemented not only to meet the current customers’ requirements, but also to be receptive to future changes. Therefore, most often, one ...
International Journal of Computers and Applications
In this paper, a taxonomy of secure electronic English auction protocols that are widely used in ... more In this paper, a taxonomy of secure electronic English auction protocols that are widely used in online Internet auctions is outlined. Firstly, these schemes are classified into three classes according to their design philosophy: group-oriented signature-based protocols, trusted third party-based protocols, and pseudonym identity-based protocols. Secondly, the pros and cons of these schemes are identified and compared in light of different viewpoints. Thirdly, we analyzed the performance of these protocols, and we proposed new directions based on the insightful analysis of the existing work. This paper can be a roadmap for beginners in understanding the basic concepts of security issues, properties, and performance in electronic English auction scheme.
2016 3rd International Conference on Information Science and Control Engineering (ICISCE), 2016
In this paper, a taxonomy of privacy-preserving approaches employed in digital right management s... more In this paper, a taxonomy of privacy-preserving approaches employed in digital right management systems are presented. These approaches are classified into two main approaches according to their design philosophy: cryptographic and noncryptographic approaches. Moreover, the pros and cons of the presented approaches are reported and compared in light of different viewpoints. Furthermore, some new directions are highlighted based on the insightful comparison of the existing work.

2016 IEEE International Conference of Online Analysis and Computing Science (ICOACS), 2016
The current Digital Rights Management (DRM) systems use attribute-based encryption (ABE) and prox... more The current Digital Rights Management (DRM) systems use attribute-based encryption (ABE) and proxy re-encryption (PRE) to achieve fine-grained access control in cloud computing. However, these schemes have some limitations particularly in terms of security, functionality and also higher decryption time which grows linearly with the complexity of access policies. In this paper, we propose a novel DRM scheme founded on a deterministic finite automata-based functional proxy reencryption (DFA-based FPRE) scheme which has been proven to be secure against CCA in the standard model. In particular, we leverage the DFA-based FPRE scheme to realize fine-grained access control over encrypted contents among a set of users. Furthermore, a secure content key distribution protocol and efficient revocation mechanism are provided. Moreover, we tackle the critical issue of high computation at the user side, by outsourcing computation into (DFA-based FPRE) scheme for the first time. In comparison, our scheme achieves higher efficiency and smaller computation time against state-ofthe-art.
International Journal of Security and Networks, 2016
Uploads
Papers by Abubaker Wahaballa