Hamza Baniata

Hamza Baniata
University of Szeged · Department of Software Engineering

Doctoral Researcher. PhD in Computer Science.

About

21
Publications
8,846
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
128
Citations
Introduction
I am a research member of the IoT-Cloud group, Department of Software Engineering/University of Szeged. I have a distributed proven experience in ICT, management, leadership, research and analysis. My current main research interests fall in the domain of privacy and security of cloud/fog computing, and IoT systems integrated with Blockchain technology.
Additional affiliations
February 2020 - present
University of Szeged
Position
  • Researcher
September 2016 - July 2018
University of Jordan
Position
  • Researcher
Education
August 2019 - June 2023
University of Szeged
Field of study
  • Computer Science
September 2016 - July 2018
University of Jordan
Field of study
  • Computer Science
November 2006 - July 2010
Mu’tah University
Field of study
  • Computer Science

Publications

Publications (21)
Article
Full-text available
Fog computing (FC) is the extension of Cloud Computing (CC), from the core of the internet architecture to the edge of the network, with the aim to perform processes closer to end-users. This extension is proven to enhance security, and to reduce latency and energy consumption. Blockchain (BC), on the other hand, is the base technology behind crypt...
Article
Full-text available
In recent years, the deployment of Cloud Computing (CC) has become more popular both in research and industry applications, arising form various fields including e-health, manufacturing, logistics and social networking. This is due to the easiness of service deployment and data management, and the unlimited provision of virtual resources (VR). In s...
Article
Full-text available
A lot of hard work and years of research are still needed for developing successful Blockchain (BC) applications. Although it is not yet standardized, BC technology was proven as to be an enhancement factor for security, decentralization, and reliability, leading to be successfully implemented in cryptocurrency industries. Fog computing (FC) is one...
Article
Full-text available
Blockchain (BC) systems mainly depend on the consistent state of the Distributed Ledger (DL) at different logical and physical places of the network. The majority of network nodes need to be enforced to use one or both of the following approaches to remain consistent: i) to wait for certain delays (i.e. by requesting a hard puzzle solution as in Po...
Article
Full-text available
Trusted online credential management solutions are needed for instant and practical verification. Most of the available frameworks targeting this field violate the privacy of end-users or lack sufficient solutions in terms of security and Quality-of-Service (QoS). In this paper, we propose a Privacy-aware Fog-enhanced Blockchain-based online creden...
Preprint
p>Thousands of researchers and practitioners around the world neglect foundational understanding of the most trusted cryptocurrency platform, Bitcoin. According to the typical tendency of taking the discussion of Bitcoin's security for granted, it is usually confidently stated that, technically, Bitcoin is one of the most secure platforms for inves...
Preprint
Full-text available
p>Thousands of researchers and practitioners around the world neglect foundational understanding of the most trusted cryptocurrency platform, Bitcoin. According to the typical tendency of taking the discussion of Bitcoin's security for granted, it is usually confidently stated that, technically, Bitcoin is one of the most secure platforms for inves...
Chapter
Full-text available
Both revolutionary technologies of Fog Computing (FC) and Blockchain (BC) serve as enablers for enhanced, people-centric trusted applications, and they do meet in the provision of higher standards and expectations. In this paper, we address the reliability of fog-enhanced BC systems by analyzing the forking phenomenon under different conditions, an...
Conference Paper
Full-text available
Blockchain is the core technology behind several revolutionary applications that require consistent and immutable Distributed Ledgers, maintained by multi-party authorities. Examples of such applications include cryptocurrencies, smart contracts, Self Sovereign Identity (SSI) and Edge/Fog-enabled smart systems (eHealth, IIoT, IoV, etc.). Hyperledge...
Preprint
Full-text available
Trusted online credential management solutions are needed for instant and practical verification. Most of the available frameworks targeting this field violate the privacy of end-users or lack sufficient solutions in terms of security and Quality-of-Service (QoS). In this paper, we propose a Privacy-aware Fog-enhanced Blockchain-based online creden...
Preprint
Trusted online credential management solutions are needed for instant and practical verification. Most of the available frameworks targeting this field violate the privacy of end-users or lack sufficient solutions in terms of security and Quality-of-Service (QoS). In this paper, we propose a Privacy-aware Fog-enhanced Blockchain-based online creden...
Conference Paper
Full-text available
The unprecedented pace of technological development in smart systems, incorporating sensing, actuation, and control functions, have the following properties and needs: (𝑖) they are interconnected and need scalable, virtualized resources to run, store and process data, (𝑖𝑖) they are mobile and can potentially access and build on user data made avail...
Conference Paper
Full-text available
Both revolutionary technologies of Fog Computing (FC) and Blockchain (BC) serve as enablers for enhanced, people-centric trusted applications, and they do meet in the provision of higher standards and expectations. In this paper, we address the reliability of fog-enhanced BC systems by analyzing the forking phenomenon under different conditions, an...
Article
Full-text available
Global average temperature had been significantly increasing during the past century, mainly due to the growing rates of Greenhouse Gas (GHG) emissions, leading to a Global Warming problem. Many research works indicated other causes of this problem, such as the Anthropogenic Heat Flux (AHF). Cloud Computing (CC) data centers (DCs), for example, per...
Preprint
Full-text available
A lot of hard work and years of research are still needed for developing successful Blockchain (BC) applications. Although it is not yet standardized, BC technology was proven as to be an enhancement factor for security, decentralization, and reliability, leading to be successfully implemented in cryptocurrency industries. Fog computing (FC) is one...
Preprint
Full-text available
A lot of hard work and years of research are still needed for developing successful Blockchain (BC) applications. Although it is not yet standardized, BC technology was proven as to be an enhancement factor for security, decentralization, and reliability, leading to be successfully implemented in cryptocurrency industries. Fog computing (FC) is one...
Conference Paper
Full-text available
Privacy issues in Cloud Computing are one of the major concerns for many individuals and companies around the world, and still a challenge for research and industry. The appearance of the 5G technology and the latest advances in Mobile Cloud Computing gave way to fog-enabled systems that represent the future of current cloud systems. Accordingly, t...
Conference Paper
Full-text available
This is a position paper that preceded the first release of the FoBSim tool. Please check the full article (published in PeerJ-Computer Science [Q1]) at the following link: https://peerj.com/articles/cs-431/
Conference Paper
Full-text available
Blockchain technology has been successfully implemented in cryptocurrency industries, yet it is in the research phase for other applications. Enhanced security, decentralization and reliability are some of the advantages of blockchain technology that represent beneficial integration possibilities for computing and storage infrastructures. Fog compu...
Article
Full-text available
In the scope of evaluation methodologies for Internet of Things (IoT) systems, some approaches concern security, while others latency. However, some methodologies evaluate systems that contain active entities, so-called actuators. In this paper, we propose a novel methodology for evaluating such systems with actuator components using Graph Represen...

Questions

Questions (3)
Question
Dear blockchain researchers,
In the classical Nakamoto Blockchain (BC) model, Transactions (TXs) are packaged in blocks and each block points to, specifically, its previous single block (I'm not gonna go into technical details here). This is a linear data model which justifies the name 'chain'. In the DAG-based BCs, TXs may, or may not, be packaged into blocks, and then each TX/ block (say 'a' ) is allowed/enforced to point to more than one parent. Consequently, several children blocks/TXs (say 'b', 'c' and 'd') are similarly allowed/enforced to randomly point later to 'a'. This is a network like data model which is obvious.
Searching in previous works, all DAG-based BCs I found adopt a many-to-many cardinality model of blocks/TXs as described above. Some do propose children must point to several parent for higher throughput and credibility. However, none of those proposed, specifically, a relaxed one-to-many parent-child dependency.
To clarify, I specifically mean that children are enforced to point to 'only one' parent, while each parent is allowed to be pointed to by several children. This leads to a tree-like DAG instead of a complicated dense network. I need some references that discuss such data modelling. Would be much beneficial if a comparison is also conducted between different types of DL data models (1-to-many vs. vs. many-to-one vs. 1to1 vs many-to-many).
Any help, explanation, or suggestions are most welcome!
Question
Dear respected colleagues,
I would like to check how worthy it is to spend some time implementing and developing a well tested tool for simulating Blockchain-assisted Fog-enhanced systems. Initially, I suggest the tool would allow users to choose the layer of the Fog Computing architecture at which they would like to place the Blockchain. Further, the tool allows to choose one of several available consensus algorithms for simulating different cases for each scenario. The services that can be provided by the Blockchain in this tool includes, but not limited to, Computational services (Smart Contracts), Data Management, Identity Management, and Payment Services between systems entities.
If such a simulation tool is available, how likely it is that you would use it in your research?
Question
Standardization requires an interdisciplinary consortium, which is currently too early to conduct for Blockchain. This is because the research community is still discovering and proposing use cases of this awesome technology. Since Blockchain was proposed in 2009 (initially in cryptocurrencies), it was, indeed, also deployed in many other applications that require different consensus algorithms, mechanisms, and purposes.Hence different protocols. However, common fundamental concepts of all Blockchain-based applications are:
1- Distributed ledger saved in Miners' nodes.
2- Distributed agreement to add any piece of information to the distributed ledger (Consensus), without the interference of a TTP. and
3- Immutability of data saved on the chain.
Regarding the IoT, we can so far deploy the Blockchain for four different reasons (can be adopted individually or together as needed):
1- Data Management,
2- Access Control,
3- Reputation Management, and
4- Incentive Management.
Specifically, the immutability and not needing a TTP interference are beneficial for security, which gives the Blockchain an opportunity to substitute classical DBs and to provide highly trusted and private monetization.
For more details on the integration of Blockchain and Fog-IoT paradigms, kindly check my recently published papers in the following links:
I do appreciate your inputs and suggestions regarding my question.

Network

Cited By

Projects

Projects (2)
Project
FogBlock4Trust aims at realizing a Fog-assisted Blockchain-based credential management solution to strengthen the trust and privacy of users. It aims to integrate Fog Computing and blockchain technologies in order to deliver specific credential validation services. The envisioned fog-enhanced blockchain-based system will provide both trusted global accreditation and distributed credential verification within one framework. As many credential verification systems were recently developed, e.g. due to the need of a reliable COVID-19 vaccination passport management, most of these systems use centralized approaches, while only few deployed the innovative blockchain technology. Our FogBlock4Trust project also fully complies with European GDPR regulations, and allows for decreased latency and enhanced efficiency, along with higher security within the system.
Project
Cloud Computing offers on-demand access to computational, infrastructure and data resources operated from a remote source. In the current worldwide ICT scenario a constantly growing number of powerful devices join the Internet, significantly impacting on the global traffic volume and foreshadowing a world of smart devices, or things in the Internet of Things perspective, interconnected by the Internet. By addressing the challenges of this vision, the overall goal of this project is to support the proliferation of IoT with the help of fog and cloud technologies. The aim of this OTKA FK 131793 project is to model the behavior of IoT devices and sensors, and to apply this model in simulated environments to enable the analysis of efficient and secure management strategies of IoT applications by performing fundamental research in the area of Fog and Cloud computing and the Internet of Things. This research plans to contribute to the better planning and estimation of IoT application costs by using our proposed solutions.