Md. Sadek Ferdous

Md. Sadek Ferdous
BRAC University | BU · Department of Computer Science and Engineering (CSE)

PhD in Computer Science
Blockchain | Identity Management | Self-sovereign Identity | Trust Management | Security | Privacy

About

88
Publications
50,284
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
760
Citations
Introduction
I am an Associate Professor at the Department of Computer Science and Engineering at BRAC University. I am also an affiliated Research Associate at the Imperial College Business School of Imperial College London. I completed my PhD from the School of Computing Science at the University of Glasgow. My current research include blockchain, identity management, cloud computing, trust, security and privacy. I am also the principal author of National Blockchain Strategy of Bangladesh.
Additional affiliations
September 2021 - present
Fraunhofer Institute for Applied Information Technology FIT
Position
  • Research Associate
Description
  • I am an ERCIM Alain Bensoussan Research Fellow at FIT, currently researching on the intersection of Self-sovereign Identity and blockchain.
May 2021 - present
BRAC University
Position
  • Professor (Associate)
March 2018 - April 2021
Shahjalal University of Science and Technology
Position
  • Professor (Assistant)
Education
March 2011 - September 2014
University of Glasgow
Field of study
August 2007 - June 2009
Norwegian University of Science and Technology
Field of study
  • Security and Mobile Computing
August 2007 - June 2009
University of Tartu
Field of study
  • Computer Science

Publications

Publications (88)
Preprint
p>As the global industrial complex gears toward fulfilling the tenets of Industry 4.0 and beyond, technologies such as distributed ledger technologies, digital twins, and artificial intelligence become pivotal enablers. In the last decade, metaverse as a concept and technology found its place among crucial enablers for technology and digital advanc...
Preprint
p>As the global industrial complex gears toward fulfilling the tenets of Industry 4.0 and beyond, technologies such as distributed ledger technologies, digital twins, and artificial intelligence become pivotal enablers. In the last decade, metaverse as a concept and technology found its place among crucial enablers for technology and digital advanc...
Article
Full-text available
Wearable devices generate different types of physiological data about the individuals. These data can provide valuable insights for medical researchers and clinicians that cannot be availed through traditional measures. Researchers have historically relied on survey responses or observed behavior. Interestingly, physiological data can provide a ric...
Conference Paper
Full-text available
The traditional protected web services rely on a user authentication process. The utilisation of an identifier (e.g. username, email address and so on) and credential (e.g. password) still remains the most widely deployed user authentication process, even though such an authentication process is one of the major sources of security breaches. Moreov...
Article
Covid-19 (SARS-CoV-2) has changed almost all the aspects of our living. Governments around the world have imposed lockdowns to slow down the transmissions. Fortunately, we have found the vaccine, in fact a good number of them. However, managing the testing and vaccination process of the total population is a mammoth job. However, there is always de...
Article
Digital Twin (DT) is an emerging technology that replicates any physical phenomenon from a physical space to a digital space in congruence with the physical state. However, devising a Healthcare DT model for patient care is seen as a challenging task as the lack of adequate data collection structure. There are also security and privacy concerns as...
Preprint
Full-text available
Blockchain Technology is an emerging technology with the potential to disrupt a number of application domains. Though blockchain platforms like Bitcoin and Ethereum have seen immense success and acceptability, their nature of being public and anonymous make them unsuitable for many enterprise level use-cases. To address this issue, Linux Foundation...
Article
Full-text available
The proliferation of smartphones and mobile communication has enabled users to capture images or videos and share them immediately on social networking and messaging platforms. These platforms are also used to manipulate the masses by performing social engineering attacks by sharing fabricated images (or videos). These attacks cause public shame, e...
Preprint
Full-text available
Covid-19 (SARS-CoV-2) has changed almost all the aspects of our living. Governments around the world have imposed lockdown to slow down the transmissions. In the meantime, researchers worked hard to find the vaccine. Fortunately, we have found the vaccine, in fact a good number of them. However, managing the testing and vaccination process of the t...
Preprint
Full-text available
Wearable devices generate different types of physiological data about the individuals. These data can provide valuable insights for medical researchers and clinicians that cannot be availed through traditional measures. Researchers have historically relied on survey responses or observed behavior. Interestingly, physiological data can provide a ric...
Conference Paper
Full-text available
Federated Identity Management (FIM) is a model of identity management in which different trusted organizations can provide secure online services to their uses. Security Assertion Markup Language (SAML) is one of the widely-used technologies for FIM. However, a SAML-based FIM has two significant issues: the metadata (a crucial component in SAML) ha...
Article
Peer-to-Peer (P2P) energy trading platforms are being actively designed, tested and operated by engineers, power distribution companies and prosumers. The assurance of the accountability of the conduct of different stakeholders through a robust trust management mechanism is imperative in such platforms. The usage of blockchain, as an underlying tec...
Cover Page
Full-text available
Please Visit the following link for more information (Deadline: July 1, 2021): https://www.frontiersin.org/research-topics/18257/blockchain-for-industry-40-applications
Article
In recent years, crypto-currencies (a form of decentralised digital currencies) have been quite popular as an alternative form of payments. They are underpinned by a breakthrough technology called Blockchain which extensively use a number of cryptographic mechanisms and other advanced techniques from the domain of distributed computing. This blockc...
Article
Full-text available
Graphical passwords are an alternative to traditional alphanumeric passwords and can similarly be used to secure online accounts. The widely used alphanumeric passwords have memorability issues and users often find it difficult to memoize a large number of unique passwords. Since 1996, researchers have implemented different graphical password schem...
Preprint
Full-text available
Blockchain is one of the emerging technologies with the potential to disrupt many application domains. Cloud is an on-demand service paradigm facilitating the availability of shared resources for data storage and computation. In recent years, the integration of blockchain and cloud has received significant attention for ensuring efficiency, transpa...
Preprint
Full-text available
The Government of Bangladesh is aggressively transforming its public service landscape by transforming public services into online services via a number of websites. The motivation is that this would be a catalyst for a transformative change in every aspect of citizen life. Some web services must be protected from any unauthorised usages and passwo...
Conference Paper
Full-text available
Blockchain technology has evolved through many changes and modifications, such as smart-contracts since its inception in 2008. The popularity of a blockchain system is due to the fact that it offers a significant security advantage over other traditional systems. However, there have been many attacks in various blockchain systems, exploiting differ...
Conference Paper
Full-text available
A Chatbot is a popular platform to enable users to interact with a software or website to gather information or execute actions in an automated fashion. In recent years, chatbots are being used for executing financial transactions, however, there are a number of security issues, such as secure authentication, data integrity, system availability and...
Conference Paper
Full-text available
The Government of Bangladesh is aggressively transforming its public service landscape by transforming public services into online services via a number of websites. The motivation is that this would be a catalyst for a transformative change in every aspect of citizen life. Some web services must be protected from any unauthorised usages and passwo...
Conference Paper
Full-text available
Blockchain is one of the emerging technologies with the potential to disrupt many application domains. Cloud is an on-demand service paradigm facilitating the availability of shared resources for data storage and computation. In recent years, the integration of blockchain and cloud has received significant attention for ensuring efficiency, transpa...
Preprint
Full-text available
A Chatbot is a popular platform to enable users to interact with a software or website to gather information or execute actions in an automated fashion. In recent years, chatbots are being used for executing financial transactions, however, there are a number of security issues, such as secure authentication, data integrity, system availability and...
Preprint
Full-text available
Blockchain technology has evolved through many changes and modifications, such as smart-contracts since its inception in 2008. The popularity of a blockchain system is due to the fact that it offers a significant security advantage over other traditional systems. However, there have been many attacks in various blockchain systems, exploiting differ...
Article
Full-text available
Contact tracing has become a vital tool for public health officials to effectively combat the spread of new diseases, such as the novel coronavirus disease COVID-19. Contact tracing is not new to epidemiologist rather, it used manual or semi-manual approaches that are incredibly time-consuming, costly and inefficient. It mostly relies on human memo...
Chapter
Full-text available
Blockchain has emerged as a revolutionary technology that has been envisioned to disrupt several industries, including financial domains with its decentralised and highly-secure design. However, since the beginning of its evolution, it has been highly criticised for the difficulties in dealing with it properly. As cryptocurrency is the most success...
Preprint
Full-text available
Contact tracing has become a vital tool for public health officials to effectively combat the spread of new diseases, such asthe novel coronavirus disease COVID-19. Contact tracing is not new to epidemiologist rather, it used manual or semi-manualapproaches that are incredibly time-consuming, costly and inefficient. It mostly relies on human memory...
Preprint
Full-text available
Contact tracing has become a key tool for public health officials to effectively combat the spread of new diseases, such as the Covid-19 pandemic. Currently, this process is either manual or semi-manual and often very time consuming and inefficient. It largely relies of human memory and cannot be scalable to tackle pandemic like COVID-19. Researche...
Article
Full-text available
The Internet of Things (IoT) has recently emerged as an innovative technology capable of empowering various areas such as healthcare, agriculture, smart cities, smart homes and supply chain with real-time and state-of-the-art sensing capabilities. Due to the underlying potential of this technology, it already saw exponential growth in a wide variet...
Article
Full-text available
The Internet of Things (IoT) has recently emerged as an innovative technology capable of empowering various areas such as healthcare, agriculture, smart cities, smart homes and supply chain with real-time and state-of-the-art sensing capabilities. Due to the underlying potential of this technology, it already saw exponential growth in a wide variet...
Article
Full-text available
In the last decade or so, we have experienced a tremendous proliferation and popularity of different Social Networks (SNs), resulting more and more user attributes being stored in such SNs. These attributes represent a valuable asset and many innovative online services are offered in exchange of such attributes. This particular phenomenon has allur...
Conference Paper
Full-text available
Blockchain has emerged as a revolutionary technology that has been envisioned to disrupt several industries, including financial do- mains with its decentralised and highly-secure design. However, since the beginning of its evolution, it has been highly criticised for the difficul- ties in dealing with it properly. As cryptocurrency is the most suc...
Article
Full-text available
The popularity of smart cars is increasing around the world as they offer a wide range of services and conveniences. These smart cars are equipped with a variety of sensors generating a large amount of data, many of which are critical. Besides, there are multiple parties involved in the lifespan of a smart car, such as manufacturers, car owners, go...
Preprint
Full-text available
In recent years, blockchain technology has received unparalleled attention from academia, industry, and governments all around the world. It is considered a technological breakthrough anticipated to disrupt several application domains. This has resulted in a plethora of blockchain systems for various purposes. However, many of these blockchain syst...
Technical Report
With the advent multiple emerging technologies, we are on the verge of information driven Fourth Industrial Revolution (FIR). This revolution exposes new challenges as well as exciting opportunities. Only the countries with expertise in these emerging technologies can successfully meet these challenges and exploit the opportunities. Blockchain tech...
Article
Full-text available
Distributed Ledger Technology (DLT) has emerged as one of the most disruptive technologies in the last decade. It promises to change the way people do their business, track their products, and manage their personal data. Though the concept of DLT was first implemented in 2009 as Bitcoin, it has gained significant attention only in the past few year...
Article
Full-text available
In recent times, with the advent of blockchain technology, there is an optimism surrounding the concept of self-sovereign identity which is regarded to have influential effect on how we interact with each other over the Internet in future. There are a few works in the literature which examine different aspects of self-sovereign identity. Unfortunat...
Conference Paper
Full-text available
The Android Operating System, being the leading OS for mobile phone devices, is also the primary target for malicious attackers. Applications installed in Android present a way for the attackers to breach the security of the system. Therefore, it is essential to study and analyze Android applications so that malicious applications can be properly i...
Conference Paper
Full-text available
No web application is without the risk of exploits and fully infallible. Even so, web services have been integrated into our daily lives in such a way that we have been accustomed to sharing huge personal information on the web. Within this setting, the aim of this study is to show a method to detect maximum vulnerabilities of web-applications at m...
Chapter
Full-text available
The Internet of Things (IoT) is experiencing an exponential growth in a wide variety of use-cases in multiple application domains, such as healthcare, agriculture, smart cities, smart homes, supply chain, and so on. To harness its full potential, it must be based upon a resilient network architecture with strong support for security, privacy, and t...
Conference Paper
Full-text available
The popularity of smart cars is increasing around the world as they offer a wide range of services and conveniences.These smart cars are equipped with a variety of sensors generating a large amount of data, many of which are sensitive. Besides, there are multiple parties involved in a lifespan of a smart car ,such as manufacturers, car owners, gove...
Preprint
The popularity of smart cars is increasing around the world as they offer a wide range of services and conveniences.These smart cars are equipped with a variety of sensors generating a large amount of data, many of which are sensitive. Besides, there are multiple parties involved in a lifespan of a smart car ,such as manufacturers, car owners, gove...
Research
Full-text available
This is an extended abstract to be presented at the 2nd Symposium on Distributed Ledger Technology - SDLT'2018 at Griffith University. In this research, we have briefly explored the feasibility of three major public blockchain systems suitable for IoT use-cases against a set of chosen criteria.
Conference Paper
Full-text available
In recent years, accelerated web-based technologies have revolutionized content generation and broadcast mecha- nisms through the Internet. Social media, blogs, e-newspaper, auction sites facilitate the creation and exchange of user-generated contents, which rarely go through any fact-finding mechanism or rigorous editorial process. This has fuelle...
Article
Full-text available
We are experiencing a revolution in the wireless technology and mobile phone networks as they are becoming increasingly ubiquitous. On the other hand, there is another trend, gaining extreme popularity over the traditional wired Internet: Peer-to-Peer (P2P) networking. Specifically, Distributed Hash Table (DHT) based Structured P2P overlay networks...
Article
Full-text available
With the ever-increasing popularity of Location-based Services, geo-tagging a document-the process of identifying geographic locations (toponyms) in the document-has gained much attention in recent years. There have been several approaches proposed in this regard and some of them have reported to achieve higher level of accuracy. The existing geo-t...
Article
Full-text available
In this article, we present a model of cyber attacks which can be used to represent a cyber attack in an intuitive and concise way. With ever-increasing popularities of online services, we have seen a growing number of cyber attacks targeted towards large online service providers as well as individuals and the IoT devices. To mitigate these attacks...
Conference Paper
Full-text available
Cloud federation is a novel concept that has been drawing attention from research and industry. However, there is a lack of solid proposal that can be widely adopted in practice to guarantee adequate governance of federations, especially in the Public Sector contexts due to legal requirements. In this paper, we propose an innovative governance app...
Article
The visual lifelogging activity enables a user, the lifelogger, to passively capture images from a first-person perspective and ultimately create a visual diary encoding every possible aspect of her life with unprecedented details. In recent years, it has gained popularities among different groups of users. However, the possibility of ubiquitous pr...
Chapter
The existing model of Federated Identity Management (FIM) allows a user to provide attributes only from a single Identity Provider (IdP) per service session. However, this does not cater to the fact that the user attributes are scattered and stored across multiple IdPs. An attribute aggregation mechanism would allow a user to aggregate attributes f...
Conference Paper
In this paper we present the formalisation of three well-known Identity Management protocols - SAML, OpenID and OAuth. The formalisation consists of two steps: formal specification using HLPSL (High-Level Protocol Specification Language) and formal verification using a state-of-the-art verification tool for security protocols called AVISPA (Automat...
Conference Paper
The lifelogging activity enables users, the lifeloggers, to passively capture images using wearable cameras from a first person perspective and ultimately create a visual diary encoding every possible aspect of their life with unprecedented details. This growing phenomenon, has posed several privacy concerns for the lifeloggers (people wearing the...
Chapter
Full-text available
In the last few years, the cloud computing paradigm experienced a considerable growth, making it the de-facto technology fuelling almost all major online services. At the same time, the concept of Internet of Things has started to gain mainstream traction with the promise to usher a new era of pervasive sensing using a weave of numerous inter-conne...
Conference Paper
The emphasis on exhaustive passive capturing of images using wearable cameras like Autographer, which is often known as lifelogging has brought into foreground the challenge of preserving privacy, in addition to presenting the vast amount of images in a meaningful way. In this paper, we present a user-study to understand the importance of an array...
Conference Paper
The lifelogging activity enables a user, the lifelogger, to passively capture multimodal records from a first-person perspective and ultimately create a visual diary encompassing every possible aspect of her life with unprecedented details. In recent years it has gained popularity among different groups of users. However, the possibility of ubiquit...
Conference Paper
Full-text available
Automatically and passively taking pictures (using lifelogging devices such as wearable cameras) of people who don’t know they’re having their picture taken raises a number of privacy concerns (from a bystander’s perspective). We conducted a study focussing on the bystanders’ concerns to the presence of augmented reality wearable devices in two con...
Conference Paper
Full-text available
Lifelogging, a technique for digitally gathering every moment in life using wearable cameras, is a growing phenomenon. However, it is important to remember that in addition to recording their own lives, users are recording others as well, which raises privacy issues around lifelogging from a bystander's perspective. This warrants conducting bystand...
Conference Paper
With continuous advances in the pervasive sensing and lifelogging technologies for the quantified self, users now can record their daily life activities automatically and seamlessly. In the existing lifelogging research, visualization techniques for presenting the lifelogs and evaluating the effectiveness of such techniques from a lifelogger's pers...
Conference Paper
Full-text available
Lifelogging devices, which seamlessly gather various data about a user as they go about their daily life, have resulted in users amassing large collections of noisy photographs (e.g. visual duplicates, image blur), which are difficult to navigate, especially if they want to review their day in photographs. Social media websites, such as Facebook, h...
Article
Full-text available
Security Assertion Markup Language (SAML, in short) is one of the most widely used technologies to enable Identity Federations among different organisations. Despite its several advantages, one of the key disadvantages of SAML is that it does not allow creating a federation in a dynamic fashion to enable service provisioning (or de-provisioning) in...