scispace - formally typeset
Search or ask a question
Author

Yaser Jararweh

Bio: Yaser Jararweh is an academic researcher from Jordan University of Science and Technology. The author has contributed to research in topics: Cloud computing & Mobile computing. The author has an hindex of 44, co-authored 297 publications receiving 6045 citations. Previous affiliations of Yaser Jararweh include University of Arizona & Pennsylvania State University.


Papers
More filters
Journal ArticleDOI
TL;DR: It is highlighted that blockchain’s structure and modern cloud- and edge-computing paradigms are crucial in enabling a widespread adaption and development of blockchain technologies for new players in today unprecedented vibrant global market.
Abstract: Blockchain technologies have grown in prominence in recent years, with many experts citing the potential applications of the technology in regard to different aspects of any industry, market, agency, or governmental organizations. In the brief history of blockchain, an incredible number of achievements have been made regarding how blockchain can be utilized and the impacts it might have on several industries. The sheer number and complexity of these aspects can make it difficult to address blockchain potentials and complexities, especially when trying to address its purpose and fitness for a specific task. In this survey, we provide a comprehensive review of applying blockchain as a service for applications within today’s information systems. The survey gives the reader a deeper perspective on how blockchain helps to secure and manage today information systems. The survey contains a comprehensive reporting on different instances of blockchain studies and applications proposed by the research community and their respective impacts on blockchain and its use across other applications or scenarios. Some of the most important findings this survey highlights include the fact that blockchain’s structure and modern cloud- and edge-computing paradigms are crucial in enabling a widespread adaption and development of blockchain technologies for new players in today unprecedented vibrant global market. Ensuring that blockchain is widely available through public and open-source code libraries and tools will help to ensure that the full potential of the technology is reached and that further developments can be made concerning the long-term goals of blockchain enthusiasts.

291 citations

Journal ArticleDOI
01 Jul 2019
TL;DR: This work introduces an automated secure continuous cloud service availability framework for smart connected vehicles that enables an intrusion detection mechanism against security attacks and provides services that meet users’ quality of service (QoS) and quality of experience (QoE) requirements.
Abstract: In the very near future, transportation will go through a transitional period that will shape the industry beyond recognition. Smart vehicles have played a significant role in the advancement of intelligent and connected transportation systems. Continuous vehicular cloud service availability in smart cities is becoming a crucial subscriber necessity which requires improvement in the vehicular service management architecture. Moreover, as smart cities continue to deploy diversified technologies to achieve assorted and high-performance cloud services, security issues with regards to communicating entities which share personal requester information still prevails. To mitigate these concerns, we introduce an automated secure continuous cloud service availability framework for smart connected vehicles that enables an intrusion detection mechanism against security attacks and provides services that meet users’ quality of service (QoS) and quality of experience (QoE) requirements. Continuous service availability is achieved by clustering smart vehicles into service-specific clusters. Cluster heads are selected for communication purposes with trusted third-party entities (TTPs) acting as mediators between service requesters and providers. The most optimal services are then delivered from the selected service providers to the requesters. Furthermore, intrusion detection is accomplished through a three-phase data traffic analysis, reduction, and classification technique used to identify positive trusted service requests against false requests that may occur during intrusion attacks. The solution adopts deep belief and decision tree machine learning mechanisms used for data reduction and classification purposes, respectively. The framework is validated through simulations to demonstrate the effectiveness of the solution in terms of intrusion attack detection. The proposed solution achieved an overall accuracy of 99.43% with 99.92% detection rate and 0.96% false positive and false negative rate of 1.53%.

274 citations

Journal ArticleDOI
TL;DR: The state-of-the-art approaches based on supervised machine learning are presented to address the challenges of aspect-based sentiment analysis (ABSA) of Arabic Hotels’ reviews and the SVM approach outperforms the other deep RNN approach in the research investigated tasks.

246 citations

Journal ArticleDOI
TL;DR: A blockchain-enhanced security access control scheme that supports traceability and revocability has been proposed in IIoT for smart factories and has shown that the size of the public/private keys is smaller compared to other schemes, and the overhead time is less for public key generation, data encryption, and data decryption stages.
Abstract: The industrial Internet of Things (IIoT) supports recent developments in data management and information services, as well as services for smart factories. Nowadays, many mature IIoT cloud platforms are available to serve smart factories. However, due to the semicredibility nature of the IIoT cloud platforms, how to achieve secure storage, access control, information update and deletion for smart factory data, as well as the tracking and revocation of malicious users has become an urgent problem. To solve these problems, in this article, a blockchain-enhanced security access control scheme that supports traceability and revocability has been proposed in IIoT for smart factories. The blockchain first performs unified identity authentication, and stores all public keys, user attribute sets, and revocation list. The system administrator then generates system parameters and issues private keys to users. The domain administrator is responsible for formulating domain security and privacy-protection policies, and performing encryption operations. If the attributes meet the access policies and the user's ID is not in the revocation list, they can obtain the intermediate decryption parameters from the edge/cloud servers. Malicious users can be tracked and revoked during all stages if needed, which ensures the system security under the Decisional Bilinear Diffie–Hellman (DBDH) assumption and can resist multiple attacks. The evaluation has shown that the size of the public/private keys is smaller compared to other schemes, and the overhead time is less for public key generation, data encryption, and data decryption stages.

200 citations

Proceedings ArticleDOI
16 May 2016
TL;DR: A hierarchical model that is composed of MEC servers and Cloudlets infrastructures is proposed to increase the coverage area for the mobile users in which the users can accomplish their requested services with minimal costs in terms of power and delay.
Abstract: Extending the coverage area of mobile cloud computing services will allow new services to be provisioned to the mobile users. The main obstacle for achieving this goal is related to the deployments challenges and limitations of the Cloudlets system. Mobile Edge Computing (MEC) system emerged recently providing an opportunity to fill the gap of the Cloudlets system by providing resources-rich computing resources with proximity to the end users. In this paper, we are proposing a hierarchical model that is composed of MEC servers and Cloudlets infrastructures. The objective of the proposed model is to increase the coverage area for the mobile users in which the users can accomplish their requested services with minimal costs in terms of power and delay. An extensive experimental evaluation is conducted showing the superiority of the proposed model.

178 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This paper provides an up-to-date picture of CloudIoT applications in literature, with a focus on their specific research challenges, and identifies open issues and future directions in this field, which it expects to play a leading role in the landscape of the Future Internet.

1,880 citations