Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ahmed Alenezi is active.

Publication


Featured researches published by Ahmed Alenezi.


the internet of things | 2018

XACML for Building Access Control Policies in Internet of Things.

Hany F. Atlam; Madini O. Alassafi; Ahmed Alenezi; Robert John Walters; Gary Wills

Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an efficient access control model for the IoT require selecting an appropriate access policy language to implement access policies. Therefore, this paper presents an overview of most common access policy languages. It starts with discussing different access control models and features of the access policy. After reviewing different access policy languages, we proposed XACML as the most efficient and appropriate policy language for the IoT as it compatible with different platforms, provides a distributed and flexible approach to work with different access control scenarios of the IoT system. In addition, we proposed an XACML model for an Adaptive Risk-Based Access Control (AdRBAC) for the IoT and showed how the access decision will be made using XACML.


the internet of things | 2017

An overview of risk estimation techniques in risk-based access control for the internet of things

Hany F. Atlam; Ahmed Alenezi; Robert John Walters; Gary Wills

The Internet of Things (IoT) represents a modern approach where boundaries between real and digital domains are progressively eliminated by changing over consistently every physical device to smart object ready to provide valuable services. These services provide a vital role in different life domains but at the same time create new challenges particularly in security and privacy. Authentication and access control models are considered as the essential elements to address these security and privacy challenges. Risk-based access control model is one of the dynamic access control models that provides more flexibility in accessing system resources. This model performs a risk analysis to estimate the security risk associated with each access request and uses the estimated risk to make the access decision. One of the essential elements in this model is the risk estimation process. Estimating risk is a complex operation that requires the consideration of a variety of factors in the access control environment. Moreover, the interpretation and estimation of the risk might vary depending on the working domain. This paper presents a review of different risk estimation techniques. Existing risk-based access control models are discussed and compared in terms of the risk estimation technique, risk factors, and the evaluation domain. Requirements for choosing the appropriate risk estimation technique for the IoT system are also demonstrated.


mobile cloud computing & services | 2017

A Framework for Cloud Forensic Readiness in Organizations

Ahmed Alenezi; Raid Khalid Hussein; Robert John Walters; Gary Wills

Many have argued that cloud computing is one of the fastest growing and most transformative technologies in the history of computing. It has radically changed the way in which information technologies can manage, access, deliver and create services. It has also brought numerous benefits to end-users and organizations. However, this rapid growth in cloud computing adoption has also seen it become a new arena for cybercrime. This has, in turn, led to new technical, legal and organizational challenges. In addition to the large number of attacks which affect cloud computing and the decentralized nature of data processing in the cloud, many concerns have been raised. One of these concerns is how to conduct a proper digital investigation in cloud environments and be ready to collect data proactively before an incident occurs in order to save time, money and effort. This paper proposes the technical, legal and organizational factors that influence digital forensic readiness for Infrastructure as a Service consumers.


international conference on cloud computing and services science | 2017

The Impact of Cloud Forensic Readiness on Security.

Ahmed Alenezi; Nurul Huda Nik Zulkipli; Hany F. Atlam; Robert John Walters; Gary Wills

The rapid increase in the use of cloud computing has led it to become a new arena for cybercrime. Since cloud environments are, to some extent, a new field for digital forensics, a number of technical, legal and organisational challenges have been raised. Although security and digital forensics share the same concerns, when an attack occurs, the fields of security and digital forensics are considered different disciplines. This paper argues that cloud security and digital forensics in cloud environments are converging fields. As a result, unifying security and forensics by being forensically ready and including digital forensics aspects in security mechanisms would enhance the security level in cloud computing, increase forensic capabilities and prepare organizations for any potential attack.


2016 IEEE International Conference on Smart Cloud (SmartCloud) | 2016

A Framework to Secure the Virtual Machine Image in Cloud Computing

Raid Khalid Hussein; Ahmed Alenezi; Gary Wills; Robert John Walters

Cloud computing which uses outsourcing and remote processing of applications first appeared about ten years ago. Cloud Computing built on research in virtualization, distributed computing, utility computing, and web services. It reduces the information technology overhead for starting a new business and it can be accessed from anywhere. One of the concepts used for constructing cloud computing is virtualization, which has its own security risks, but they are not specific to the cloud. The key drawback to adopting cloud computing is security since clients use someone elses CPU and hard disk for processing and storing data. This paper proposes a security framework to secure Virtual Machine Images in a virtualization layer in the cloud environment. Securing the virtual machine image is significant as it will most probably affect the security of cloud computing.


the internet of things | 2017

IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things

Nurul Huda Nik Zulkipli; Ahmed Alenezi; Gary Wills

The smart devices have been used in the most major domain like the healthcare, transportation, smart home, smart city and more. However, this technology has been exposed to many vulnerabilities, which may lead to cybercrime through the devices. With the IoT constraints and low-security mechanisms applied, the device could be easily been attacked, treated and exploited by cyber criminals where the smart devices could provide wrong data where it can lead to wrong interpretation and actuation to the legitimate users. To comply with the IoT characteristics, two approaches towards of having the investigation for IoT forensic is proposed by emphasizing the pre-investigation phase and implementing the real-time investigation to ensure the data and potential evidence is collected and preserved throughout the investigation.


International Journal of Intelligent Systems and Applications | 2018

Blockchain with Internet of Things: Benefits, challenges, and future directions

Hany F. Atlam; Ahmed Alenezi; Madini O. Alassafi; Gary Wills


International Journal of Computer Network and Information Security | 2018

Validation of an adaptive risk-based access control model for the Internet of Things

Hany F. Atlam; Ahmed Alenezi; Raid Khalid Hussein; Gary Wills


green computing and communications | 2017

Integration of Cloud Computing with Internet of Things: Challenges and Open Issues

Hany F. Atlam; Ahmed Alenezi; Abdulrahman Alharthi; Robert John Walters; Gary Wills


Journal of Internet Technology and Secured Transaction | 2016

Investigating the security factors in cloud computing adoption: towards developing an integrated framework

Alassafi, Madini, Obad; Alharthi, Abdulrahman, Ayad; Ahmed Alenezi; Robert John Walters; Gary Wills

Collaboration


Dive into the Ahmed Alenezi's collaboration.

Top Co-Authors

Avatar

Gary Wills

University of Southampton

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hany F. Atlam

University of Southampton

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge