KTH-SEECS Applied Information Security Lab

National University of Sciences and Technology (NUST)

News

Year 2014


  • Conference paper Published in ICOSST 2014 -- 2014-12-20

    Paper titled, "Keeping Secret Keys Secret in Open Systems" by Irfan Azhar, Naveed Ahmed, Abdul Ghafor Abbasi, Adnan Kiani, and Awais Shibli has been published In IEEE 6th "International Conference on Open Source Systems and Technologies (ICOSST), 2014.


  • Papers presented in ICOSST held at UET Lahore -- 2014-12-18

    Mr. Irfan Azhar from KTH-AIS lab presented their research paper in the 6th IEEE INTERNATIONAL CONFERENCE ON OPEN-SOURCE SYSTEMS & TECHNOLOGIES 2014 (ICOSST) held in UET,Lahore during December 18-20, 2014. The papers is entitled as "Keeping Secret Keys Secret in Open Systems."


  • A Journal Paper Accepted in The computer Journal, Oxford Journals -- 2014-12-08

    A Journal Paper titled ""Taxonomy for Trust Models in Cloud Computing"" , By Ayesha Kanwal, Rahat Masood, Muhammad Awais Shibli, Rafia Mumtaz has been published in The Computer Journal, Oxford journals, 2014.


  • SpringerOpen journal Paper published -- 2014-11-11

    Book chapter titled Cloud identity management security issues & solutions: a taxonomy” by Habiba  Umme, Masood  Rahat, Shibli  Muhammad, Niazi A Muaz has now been published online in 'Complex Adaptive Systems Modeling',  2014.


  • NUST Intra Research Conference -- 2014-11-08

    Lab director Dr. Muhammad Awais Shibli presented the KTH-AIS Lab profile in NUST Intra Research Conference held on 8th November,2014 in CIPS,NUST. The presentation covered the research aims & scope, collaboration & linkages of AIS lab, its achievements till date, ongoing and finish research/funded projects, as wel as future intra-research and areas of collaborations.

     



  • Gold Medal for best FYP -- 2014-10-30

    Mr. Salman Ahmed Ansari from BE (SE)-1 received the President’s Gold Medal for outstanding performance in Final Year Project in the 7th Undergraduate Convocation held in CIPS, NUST on 30th October 2014.  Salman along with his group member Mr. Ummair Asghar worked under the supervision of Dr. Muhammad Awais Shibli in KTH-AIS lab. In their thesis entitled “Fine Grained Access Control Model for Cloud based Applications” they proposed and developed an authorization system capable to provide a user friendly FGAC system that can be used by the organizations to create, manage and evaluate access control policies without getting into the complexities of the cloud infrastructure and model. Basically, the system uses eXtensible Access Control Markup Language, XACML, an OASIS standard, to manage policies. For development and testing of the application, latest versions of Java EE, hibernate, MySql, Primefaces, SAML, JUnit and DSpace are being used. The implementation has been tested by integrating it with DSpace, a digital content repository.


  • DBaaS book chapter published -- 2014-10-21

         Book chapter titled Security Aspects of Database as a Service (DBaaS) in Cloud Computing” by Faria Mehak, Rahat Masood, Yumna Ghazi, Awais Shibli and Sharifullah Khan has been published in Cloud Computing: Challenges, Limitations and R&D Solutions 2014". 
     

  • Successful Master Thesis Defense of Misbah Irum -- 2014-09-07

    KTH - AIS Lab would like to congratulate Ms. Misbah Irum on her successful thesis defense. In her thesis titled “Secure User Centric Access Control Policy Management Framework for Cloud Applications”, she proposed new approach for access control in Cloud which externalizes access control from Cloud applications and enables users to create and manage access control policies on their resources according to their own security and access control requirements. The framework also provides users with a central control point and a standard policy definition language to specify and manage access control on all their resources scattered across the Cloud. she presented the framework and described the protocol which defines the interaction between different components of the system to specify and enforce User-Centric policies using XACML standards. To show the applicability of the designed framework she developed a prototype using Google spreadsheet as the Cloud application. The evaluation of the prototype verifies the claims of the user centric access control framework in providing users with the control to define access control policies according to their requirements on their resources. Real world Cloud application is used to show the applicability and integration of the designed framework with existing Cloud applications. Best wishes to Misbah in all of her endeavors! 


  • Austria visit -- 2014-08-28

    Dr Muhammad Awais Shibli presented two research papers in the 11th International Conference on Security and Cryptography (SECRYPT 2014) held at Vienna, Austria during August 28-30, 2014.

    The details of the papers presented are as follows:

    1. 1.  Muhammad Awais Shibli, Naveed Ahmad, Ayesha Kanwal, Abdul Ghafoor, "Secure Virtual Machine Migration (SV2M) in Cloud Federation", In: International Conference on Security and Cryptography (SECRYPT), Vienna, Austria, August 28 - 30, 2014.

    2. 2.  Shizra Sultan, Abdul Ghafoor Abbasi, Muhammad Awais Shibli, Ali Nasir,  "Secure protocol for Financial Transactions using Smartphones- SPFT Formally proved by AVISPA", In: International Conference on Security and Cryptography (SECRYPT), Vienna,  Austria, August 28 - 30, 2014.



  • Cyber Security Policy Executive Education Program by Monterey Cyber Security Initiative (MCySec) Monterrey Institute of International Studies (MIIS), California (Aug 12 to Aug 14, 2014) -- 2014-08-12

    Cyber Security Policy Executive Education Program was conducted under the supervision of Dr Itamara Lochard, Director of Monterey Cyber Security Initiative (MCySec). This training session was purely related to cyber security policies, laws and international strategies to encounter cyber warfare.  It was three-day training with the main focus on following parts: i) Evolution and History of Cyber Security ii) Globalization effect of Cyber Security iii) Crises Management & Peace iv) Responses by States, International and Non-Government Organizations v) Future Trends in Cyber Security vi) Social Network Analysis vii) Analytical Tools and Linguistics Computations. MCySec coordinates courses, workshops, speaker series that addresses the interface between international affairs and cyberspace. This includes the fields of hard security, human security/development, cross-cultural communication, social media, linguistics and language, business/economics, peace and stabilization efforts, digital ethics as well as other aspects.


  • Security Policy Discussions and Meetings with US Think Tanks Washington DC, (Aug 12 to Aug 14, 2014) -- 2014-08-12

    NUST Cyber team including Dr. Abdul Ghafoor and Ms. Rahat Masood, held a number of meetings with various Think Tanks at Atlantic Council, US Department of State, Stimson Center, George Washington University and Center for Strategic & International Studies (CSIS) in Washington DC. The purpose of meetings was to discuss cyber security policy issues and develop strategies for confidence building measures.

    The team first met Mr. Jason (Jay) Healey in the Atlantic Council. Mr. Healey is the Director Cyber Statecraft Initiative and the author of the book on the history of cyber conflict. The agenda of the meeting was to understand USA defined cyber policies and how different organizations are using this to protect their critical infrastructure. Before the meeting, the NUST Team called upon Mr. Shuja Nawaz, the Director of the South Asia Center at the Atlantic Council and his research assistant Ms. Nazia Khan. The issues discussed included: i) Cyber statecraft ii) Cyber hygiene iii) Internet Request for Comment (IRC) iv) SAARC CERTs v) The Emerging Leaders of Pakistan (ELP) program sponsored by Atlantic Council.

     

    Prof. Julie Ryan from George Washington University warmly welcomed the NUST Cyber Team delegation. Prof. Julie Ryan is doing research on Risk Management and Policies, specifically in the area of implication of warfare in policies and solutions to protect the resources in war games. The main objective of this meeting was to understand the role of institutions in Cyber Policy Management and seeks academic cooperation for developing cyber policies for Pakistan. Security issues of our banking system and role of cyber forensics in cloud environments was also discussed. It was highlighted that there are some legal challenges in cloud environment since cloud data may be stored in different states around the world.

     

    Meeting in the State Department was held with Ms. Kathryn Schultz of the South Asia Desk and Mr. Benjamin Boudreaux, Policy Advisor from the coordinator office of cyber issues. Mr. Boudreaux explained in detail the cyber security policy and the existing Conference building Measures (CBMs) between the Russian Federation and the US. The NUST delegation emphasized the need for the idea of collaboration between universities on cyber security issues in South Asia. The models of the OSCE and Pugwash conference during the Cold War to bring together scientists for mutual benefit were also discussed.


  • IDART Methodology for Pakistan Cyber Security Seminar Sandia National Laboratories, Albuquerque, New Mexico (Aug 5 to Aug 9, 2014) -- 2014-08-05

    KTH-AIS Lab heads, Dr. Abdul Ghafoor Abbasi & Ms. Rahat Masood have successfully completed training on ‘Improving System Security Through Red Teaming’ organized by Information Design Assurance Red Team (IDART), Sandia National Laboratories, Albuquerque, New Mexico, USA. For Pakistan Cyber Team, a 3-day series of interactive sessions and exercises were organized to provide hands on training on secure system designing and assessment via IDART Methodology.  Through this training, it is learned to distinguish between red teaming and develop a skillset to organize IDART model for information systems. Overall, the training gave the confidence to start IDART model for government systems, critical infrastructures and prospective clients in Pakistan.

     


    KTH-AIS Lab heads also learned about Tracer Fire (Forensic and Incident Response Exercise)  in the Cyber Engineering Research Laboratory (CERL) . Details are given at following website. A series of lectures and hands on training was conducted by Mr. Benjamin Anderson of the Tracer FIRE. Tracer FIRE and Tracer INFERNO events provide hands-on computer security workshops to strengthen the community of cyber defenders in US Department of Energy (DOE), other government agencies, and critical infrastructure. Such workshops build a distributed team of cyber defenders with the latest skills necessary to respond to cyber intrusions.


  • Cyber Security Training Organized by Sandia National Laboratories (SNL) (Aug 4 to Aug 21, 2014, USA) -- 2014-08-04

    The United States Department of Energy and Sandia National Laboratories, organized three-weeks Pakistani Cyber Training at USA on 05 August 2014 thru 22 August 2014. KTH-AIS Lab heads, Dr. Abdul Ghafoor Abbasi & Ms. Rahat Masood participated in the training. The purpose of this training was to learn about information security and confidence building measures. This training is an important step towards collaboration, cyberspace workforce development, information security growth in IT industry and government sectors of Pakistan and most importantly, towards the formulation and execution of Pakistan Cyber Laws and Policies. The training was three week program and was held at three different states of USA (Sandia National Laboratories, Albuquerque, New Mexico; Monterrey, California; and Washington DC), with three major objectives i.e i) to elaborate Information Design Assurance Red Team (IDART) methodology and help improving the system security through red teaming ii) to provide cyber security policy executive education by highlighting international cyber security issues, contemporary dynamics in cyber security, crises management and future of Pakistan from cyber security law prospective iii) to discuss current views regarding the future of policy related to global information technology and security, and Pakistan's current and future involvement domestically and internationally. 


     


  • Book Chapter Published in Springer -- 2014-07-17

    Book chapter titled Access Control as a Service in Cloud: Challenges, Impact and Strategies” by Awais Shibli, Rahat Masood, Umme Habiba, Ayesha Kanwal, Yumna Ghazi, Rafia Mumtaz has now been published online in 'Continued Rise of the Cloud: Advances and Trends in Cloud Computing', Springer 2014 .


  • A Journal Paper Accepted in The computer Journal, Oxford Journals -- 2014-07-05

    A Journal Paper titled ""Taxonomy for Trust Models in Cloud Computing"" , By Ayesha Kanwal, Rahat Masood, Muhammad Awais Shibli, Rafia Mumtaz has been accepted in The Computer Journal, Oxford journals, 2014.


  • Conference Paper Accepted in SECRYPT, 2014 -- 2014-07-04

    A conference paper "Secure Virtual Machine Migration (SV2M) in Cloud Federation"  By Muhammad Awais Shibli, Naveed Ahmad, Ayesha Kanwal, Abdul Ghafoor has been accepted in International Conference on Security and Cryptography (SECRYPT), Vienna,  Austria,August 28 - 30, 2014.


  • Conference Paper Accepted in SECRYPT, 2014 -- 2014-07-04

    A conference paper "Secure protocol for Financial Transactions using Smartphones- SPFT Formally proved by AVISPA " By Shizra Sultan, Abdul Ghafoor Abbasi,Muhammad Awais Shibli,Ali Nasir has now been accepted in International Conference on Security and Cryptography (SECRYPT), Vienna,  Austria,August 28 - 30, 2014.


  • A Journal Paper Accepted -- 2014-07-02

    Journal paper titled Cloud Authorization: Exploring Techniques and Approach towards Effective Access Control Framework” by Rahat Masood, Muhammad Awais Shibli, Yumna Ghazi, Ayesha Kanwal, Arshad Ali has been accepted in  Springer Journal 'Frontiers of Computer Science', 2014. [Journal IF 0.298]


  • Conference Paper Published in CIACS, 2014 -- 2014-06-12

    Conference paper "Security of Sharded NoSQL Databases: A Comparative Analysis" By Anam Zahid, Rahat Masood, Muhammad Awais Shibli has now been published in 2014 Conference on Information Assurance and Cyber Security (CIACS), National University of Sciences & Technology, Military College of Signals, Rawalpindi, Pakistan, June 12 - 13, 2014.


  • Internship and FYPs Oppurtunities -- 2014-06-10

    Join us as an summer intern or opt Final Year Project under KTH-AIS lab. For more information, click here.


  • Dr. Awais Shibli Cyprus visit -- 2014-06-09

    Dr. Muhammad Awais Shibli taught two courses as a Visiting Professor at Middle East Technical University (METU), Cyprus.  The courses entitled ‘Software Engineering’ and ‘Software Construction’ were taught to ‘Under Graduate’ students for the duration [Feb 2014-June 2014]. For more information, please visit official profile page.


  • Conference Paper Published in IMCOM, 2014 -- 2014-06-04

    Paper titled, "Evaluation and Establishment of Trust in Cloud Federation" by Ayesha Kanwal, Rahat Masood, Muhammad Awais Shibli has been published In: International Conference on Ubiquitous Information Management and Communication (IMCOM, 14’) , ACM, SIGAPP, Siem Reap, Cambodia, 9-11 January, 2014. 


  • Successful Final Year Project Completion of BS Students -- 2014-06-01

    The KTH-AIS Lab would like to congratulate Mr. Ummair Asghar, Mr. Salman Ansari, Mr. Jawad Hussain, Mr. Junaid Sarfraz, Mr. Sadiq Alvi and Mr. Qazi Amir Hamza, students of Bachelors in Software Engineering (BESE) on successful completion of their Final Year Projects. Their projects are part of ICT R&D funded research project entitled “Extensible Access Control Framework for Cloud Based Applications” and was carried out under the supervision of Lab Director, Dr. Awais Shibli. Their work highlights the solution for SaaS security issues in terms of authorization. They provided high-level of extensibility and security by incorporating multiple access control models pertaining to the needs of Cloud service consumers (organizations) and provided a generic platform to specify and manage complex access control policies in a flexible manner. Thus enterprises will be facilitated by transforming their security policies to security implementation without having expensive and error-prone work. The artifact is enclosed an implementation of three standardized and commonly used access control models (ABAC, UCON, FGAC). These models are implemented using Extensible Access Control Markup Language (XACML) providing a challenging research area. This project required proficiency in Java, J2SE, J2EE, JSP, Servlets, Web services, XML, SAML, Apache Tomcat Server and Cryptographic techniques.


  • Two projects won Best Industrial Project Titles in the SEECS Open House -- 2014-05-20

    Two final year projects under the supervision of Dr. Muhammad Awais Shibli won the Best Industrial Project Titles in the SEECS Open House held on 20th May, 2014 at CIPS, NUST. Project titles and respective student names are:  

    • For Bachelors in Information and Communication System Engineering:
      First Prize: Jaeb-An SMS based simple Mobile Payment Solution By Ali Nauman, Sarosh Nazir Khatana and Ehmed Zubair.




     

    • For BE-Software Engineering:
      Third Prize: Fine Grained Access Control Model for Extensible Access Control
      Framework
      for Cloud Based Applications By Ummair Asghar and Muhammad Salman Ansari


     


  • A seminar on "Cloud Computing and Cloud Computing Security" by Assist. Prof. Dr. Muhammad Awais Shibli at Middle East Technical University (METU), Cyprus -- 2014-05-08

    A seminar on "Cloud Computing and Cloud Computing Security" by Assist. Prof. Dr. Muhammad Awais Shibli (METU NCC Computer Engineering) organized by the IEEE Student Society, was given on 8 May 2014. The Seminar’s was focused on the evolution of Service Oriented Architecture (SOA) which has given birth to the promising cloud technology and enables the outsourcing of existing hardware and software IT infrastructure via the Internet. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Many of the cloud security aspects are not unique to cloud setting: data is vulnerable to attack irrespective of where it is stored. Therefore, cloud computing security encompasses all the topics of computing security, including the design of security architectures, minimization of attack surfaces, protection from malware, and enforcement of access control. But there are some aspects of cloud computing security that appear to be specific to that domain: i) cloud is typically a shared resource, and other sharers (called tenants) may be attackers, ii) cloud-based data is usually intentionally widely accessible by potentially insecure protocols and APIs across public networks, iii) data in cloud is vulnerable to being lost (e.g., accidentally deleted) or incorrectly modified by the cloud provider, iv) data in cloud can be accessed by the cloud provider, its subcontractors and employees. Cloud service users need to be vigilant in understanding the risks of data breaches in this new environment and must have answers to the questions like: how to prevent malicious users from accessing and manipulating data they have no right to access. A combination of various security features such as encryption, access control, two-factor authentication, PKI, and SSO must be provided ‘as a service’ to address most of the identified threats in cloud computing dealing with the integrity, confidentiality, authenticity and availability of data and communications.

     


  • Successful Master Thesis Defense of Sehar Iqbal -- 2014-05-08

    KTH - AIS Lab would like to congratulate Ms. Sehar Iqbal on her successful thesis defense. In her thesis titled “Quantifying the impact of randomness in simulation based studies”, she performed scientific studies in Wireless Sensor Networks rely on simulations. Simulations are heavily dependent on random numbers and researchers generally use random numbers generated through common random number generating APIs of programming languages. Thus, in this research, she studied the impact of using different types of random numbers in a simulation based study of WSN. She used eight different types of random numbers generated through various algorithms. These random numbers are first evaluated using standard random number testing procedures such as Run Test, Serial Test, and Chi square Test. Then she used the same random numbers in a Markov chain based probabilistic study of Wireless Sensor Networks. We congratulate Sehar on this achievement


  • New Jobs Openings in HEC Project entitled "Secure and Authorized Dynamic Group Resource Management" -- 2014-05-07

    KTH-Applied Information Security Lab at SEECS-NUST is looking for potential candidates to carry out research and development tasks for funded HEC project titled “Secure and Authorized Dynamic Group Resource Management”. The project involves working in the field of group secure information sharing using the existing knowledge of Java and Information Security. Further details on the project have been given on the website (http://ais.seecs.nust.edu.pk/project-detail.php?project=Mg==).

    This project shall be an excellent opportunity for students to work and develop expertise in an exciting area that promises hands on experience in the field of group secure information sharing.     


    Project Title: Secure and Authorized Dynamic Group Resource Management

    The job titles and the relevant details are: 

    1.      Research Fellow [Positions – 1]


    Required Qualification:
     PhD Degree Holder in HEC recognized University. NUST students will be given preference. (CGPA > 3.0/4.0 or 1st Division)
    Experience: ​1-2​ years
    Job Responsibilities:  The main responsibility for this position will be to supervise and manage the development of the project. Research Fellow will be required to keep track of a team work, management of quarterly reports, supervise research work and assist in development of framework.

    2.      Senior Developer [Positions – 2]

    Required Qualification: MS degree in IT/CS/CCS/IS or equivalent from HEC recognized University.        (CGPA > 3.0/4.0 or 1st Division)
    Experience: 1-2 years --- Candidate must have hands-on Java development experience and a strong sense of clean design and coding.
    Job Responsibilities: The Developer will be required to work on every aspect of technical development, from requirement analysis, designing, development, testing through to deployment of group secure authorization framework. Main responsibilities are to effectively contribute in the design, development and integration of project modules.

    3.      Research Assistants [Positions – 4]


    Required Qualification:  BS degree in IT/ CS/CCS or equivalent from HEC recognized University. (CGPA > 3.0/4.0  or  1st Division).
    Experience: 0-1 year --- Preference will be given to candidates enrolled in MS IT/CS/CCS/IS (NUST) and interested in doing their thesis in this project.
    Job Responsibilities:  This position requires hardworking graduate students with good development and research skills. The selected students will be doing thesis on this project. They will be required to study and investigate various problems that will be encountered during project execution.

    Please click on this link for further information on announced positions.


    Application process: Interested candidates are requested to send their updated CV to ais.kth@seecs.edu.pk with the subject line:

    HEC-​Project-[Position to apply] by
    ​​ April 28, 2014. The email should clearly state the position against which the application is made. 

    Only short-listed candidates will be called for interview. Date of interview will be intimated later.


  • Book Chapter Accepted in Springer -- 2014-04-29

    A Book Chapter titled "Secure Identity Management System for Federated Cloud Environment" By Umme Habiba, Rahat Masood, Muhammad Awais Shibli has been accepted in Studies in Computational Intelligence, Springer, 2014.


  • Book Chapter Accepted in Springer 'Studies in Computational Intelligence (SCI)' -- 2014-04-21

    Book Chapter titled, "Secure Identity Management System for Federated Cloud Environment" by Umme Habiba, Rahat Masood and Muhammad Awais Shibli has been accepted in Springer's - Studies in Computational Intelligence (SCI), 2014.


  • Successful Master Thesis Defense of Umer Khalid -- 2014-04-04

    KTH - AIS Lab would like to congratulate Mr. Umer Khalid on his successful thesis defense. In his thesis titled “Secure and Privacy Enhanced Authentication & Authorization in Cloud”, he provides the design and implementation of an anonymous authentication and authorization protocol as a solution to these problems. The solution consists of carefully selected components such as, FIPS 196 for a proven and robust authentication mechanism, whereas, XACML based Policy Enforcement Point (PEP) for authorization. An identity management system (IDMS) is chosen in order to maintain a record of the registered users. For anonymity, the designed protocol uses traceable anonymous certificates (TAC’s) instead of simple public key certificates generated using anonymous identities (AID). A client side application passes these certificates as initial parameters for authentication to a strong authentication server (SA server). Certificates are modified further such that they do not leak any Personal Identifiable Information (PII) about the users. Authorization is provided using standard XACML based access control policies which are binded to the anonymous identities of the registered users instead of real identities. Hence using this protocol, threats such as identity theft and leakage can be mitigated with minimal changes to existing setups. In order to validate the designed protocol, Scyther is used. Congratulations Umer for your successful thesis defense! We wish you continued success in your career.


  • Successful Master Thesis Defense of Muhammad Kazim -- 2014-04-01

    KTH - AIS Lab would like to congratulate Mr. Muhammad Kazim on his successful thesis defense. In his thesis titled “Virtual Machines image protection in Cloud computing”, he addressed the attacks faced by virtual machines both for protecting the sensitive customer data and maintains the integrity of virtual machines. The contribution of his thesis is twofold. First, he analyzed the security of Cloud virtualization components including service provider, hypervisor, virtual machines and disk images from three different aspects. These aspects include the security requirements for virtualization, possible attacks on different components and the existing security solutions for the protection of virtualization environment in the Cloud. Therefore, a holistic picture of virtualization security in the Cloud is provided through structured analysis in which security requirements, attacks and solutions correspond to each other. Secondly, to protect virtual machines images from: infrastructure, hypervisor and storage attacks, he proposed and implemented a security mechanism that encrypts virtual machines images in the Cloud storage. During his thesis, he published two research papers in "6th International Conference on Security of Information and Networks (SIN), ACM and in "12th International Conference on Information Systems and Industrial Management (CISIM), Springer LNCS Series, Krakow, Poland" respectively. Heartiest congratulations to Kazim on this commendable achievement and best wishes for all of your future prospects.

  • Conference Paper Accepted in SNPD 2014 -- 2014-03-20

    Paper titled, "Cross-domain Identity Management System for Cloud" by Umme Habiba, Rahat Masood and Muhammad Awais Shibli has been accepted In: 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2014), IEEE, Las Vegas, U.S.A., June 30 - July 2, 2014.


  • Successful Master Thesis Defense of Umme Habiba -- 2014-03-17

    KTH - AIS Lab would like to congratulate Ms. Umme Habiba on her successful thesis defense. In her thesis titled “Cross-domain Identity Management System for Cloud Environments”, she addressed the issues of handling and sharing of Identity credentials across multiple Cloud service providers and consumers. Identity credentials are generally considered to be the most sensitive information since its unauthorized disclosure may lead to many serious consequences. She addressed the existing identity managemnt issues by first structuring the domain of identity management in the form of a well-organized taxonomy, and then by implementing a cross-domain identity management system for Cloud. Furthermore, she enhanced SCIM protocol by adding an encryption module that help ensures the confidentiality of identity credentials. During her thesis, she also published a research papers titled “Assessment Criteria for Cloud Identity Management Systems” in 19th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), IEEE, Vancouver, British Columbia, Canada. Best wishes to Habiba in all of her future endeavors. 


  • Successful Master Thesis Defense of Ayesha Kanwal -- 2014-03-16

    KTH - AIS Lab is extremely pleased to announce that Ms. Ayesha Kanwal has defended her MSc thesis titled "Evaluation and Establishment of Trust in Cloud Federation". In her thesis wok, she proposed and implemented a trust evaluation system for establishment of trust between home and foreign CSPs participating in Cloud federationCloud federation, brings remarkable advancement in Cloud services by extending the existing infrastructure for sharing of resources. Besides various advantages, Cloud federation has many challenges. Trust is one of the challenging issues that limit the adoption of Cloud federation by service providers. In order to assure the security of data at foreign CSP platform, there is need to evaluate and establish trust between both participating Cloud providers. Ayesha’s accomplishments during her MSc studies are remarkable with numerous presentations, demos and published research articles in various prestigious confrences.  Wcongratulate Ayesha on this achievement


  • Dr. Awais Shibli received best researcher award -- 2014-02-01

    Dr. Muhammad Awais Shibli, has received the best researcher award of the year 2013 for his outstanding performance and contributions in the research. The award is one of the highest honors given each year by NUST-SEECS to the Research Scholars making significant contributions and advancements in their respective research areas. 

     

    During the year 2013, Dr. Shibli has been a prolific contributor to the research and has promoted new ideas for securing the data and resources hosted in digital world. His research emphasizes secure applications development and systems particularly for Cloud Computing Security and Multi-Agent Systems (MAS).  In year 2013, Dr. Shibli has been fortunate to make multifaceted contributions covering a wide range of research expansions, from Impact factor publications to winning grant for research projects.  His quality research work of International standard has resulted in the form of publications in an impact factor journal, a book chapter and eleven national and international conference of high repute. In 2013, Dr. Shibli won two research grants of worth 19.00 Million PKR. These research grants are from National ICT R&D Fund and the Higher Education Commission of Pakistan. Dr. Shibli is also an HEC approved PhD Supervisor. He is currently supervising ten MS and a PhD Student apart from five MS students that already have successfully completed their thesis in year 2013.

     
    Read complete story by Daily Times news paper here
     

        


  • Successful Master Thesis Defense of Faiza Fakhar -- 2014-02-01

    The KTH-AIS Lab Group would like to congratulate Ms. Faiza Fakhar on her successful thesis defense! In her thesis entitled “Symmetric Cryptographic Key Management in Cloud Based Environment”, she carried out the research in three main directions, firstly, Secure Data Storage on Cloud which offers a mechanism for secure storage of sensitive data on Cloud. This storage scheme can be further utilized in any type of data storage. Using secure protocol user can share cryptographic key with Cloud to manipulate encrypted data. Secondly, Symmetric Cryptographic Key as Cloud Service which provides symmetric cryptographic key as Cloud service and user may embed this service in other utilities such as mobile/PDAs digital signature utilities etc. and thirdly, Secure Data Access which ensure key access security. She also has two relevant research publications in prestigious conferences. Best wishes to Faiza in all of her endeavors!


  • Successful Master Thesis Defense of Faisal Karim Bhutta -- 2014-01-01

    KTH - AIS Lab would like to congratulate Mr. Faisal Karim Bhutta on his successful thesis defense. In his thesis titled “Smartphone based Authentication & Authorization Protocol for Smart Physical Access Control System (SPACS)”, he designed architecture for PACS along with security protocol for smartphone that is used for identity verification, authentication and authorization in PACS. The designed authentication protocol is an extension of two-factor authentication protocol described in FIPS-196 standard. Furthermore, the usage of symmetric key cryptography provides an efficient solution to achieve confidentiality of messages exchanged between components of designed PACS. In order to ensure the presence of the legitimate user in the premises, the system uses a pass-code feature that is only valid for one time usage. Hence using designed protocol, user’s smartphone can act as authenticator in the system. Since, the solution may be used by the non-technical persons so it is designed that it should be user friendly and require minimum efforts for configuration of security parameters. In order to validate the security of designed protocol, automated protocol verification tool Scyther is used. After validation, it is verified that our security protocol resists against Man-in-the-Middle, replay and attacks on confidentiality of user’s credentials. Good wishes to Faisal for future endeavors.

KTH-SEECS Applied Information Security (AIS) Lab, H-12 NUST, Islamabad, Pakistan
Email: ais.kth@seecs.edu.pk © 2013 KTH-SEECS AIS LAB. All Rights Reserved