Saudi Cultural Missions Theses & Dissertations

Permanent URI for this communityhttps://drepo.sdl.edu.sa/handle/20.500.14154/10

Browse

Search Results

Now showing 1 - 10 of 24
  • ItemRestricted
    Exploring the experiences and concerns about privacy and security in online teaching by students and teachers in the United Kingdom and Kingdom of Saudi Arabia
    (Saudi Digital Library, 2025) Almekhled, Basmah Fahad; Petrie, Helen
    This research programme investigated experiences of online teaching and related privacy and security concerns before and since the pandemic among HEI students and teachers in the United Kingdom (UK) and the Kingdom of Saudi Arabia (KSA). As there is little cross-cultural research on these issues, five studies were conducted to explore them. Studies 1 and 2 were online surveys with students. UK students reported difficulties due to the pandemic with practical, interaction, and social isolation. In contrast, KSA students reported difficulties with focus, engagement, and technical issues. UK students used webcams selectively, whereas KSA students reported little use. Privacy and security concerns were low among UK students but moderate among KSA students. Studies 3 and 4 were online surveys with teachers. UK teachers struggled with students not using their webcams during online teaching, whereas KSA teachers faced communication and assessment issues. Both groups reported difficulties with student engagement. KSA teachers reported low webcam use, whereas UK teachers reported high use. Privacy and security concerns were low among UK teachers but moderate among KSA teachers. Study 5, a field study in a KSA HEI, found neither students nor teachers used webcams in teaching. Students cited flexibility, distractions, and privacy concerns, whereas teachers cited distractions and security concerns. Students reported high levels of privacy concerns about their institutions but only moderate concern about teachers and classmates. Complex relationships were found between students’ online privacy, security concerns and trust. Studies 6 and 7 were online surveys which explored KSA and UK HEI teachers experiences and attitudes in more detail. Both groups valued webcam use for engagement, but UK teachers felt self-conscious and struggled with students' webcams presence, while KSA teachers had privacy, security and cultural concerns. Both groups were uncertain about institutional webcam policies and expressed limited satisfaction with privacy and security guidelines. These findings highlight the need to address webcam use and privacy and security concerns in online teaching in relation to cultural and educational contexts.
    15 0
  • ItemRestricted
    Intelligent Workload Prediction and Mobile Task Offloading in Cloud Environments Using Hybrid Deep Learning and Reinforcement Learning
    (Saudi Digital Library, 2025-08) Alqahtani, Dalal; Tarek, ElGhazawi
    Cloud computing provides users with access to data, data services, and a variety of physical computing resources on demand. Such capabilities can be provided based on explicit requests from individuals or organizations to augment their local organizational compute infrastructure by provisioning requested hardware and software from cloud service provider data centers. They can also be based on implicit requests generated by users’ mobile devices. These devices can then benefit from treating all of these resources as one integrated system, here referred to as the digital continuum. There are many issues that should be considered to guarantee seamless and efficient operation of such an ecosystem, but we limit the scope of this work to only two major ones. As such, in this thesis, I focus on predicting workloads, which is critical for efficient data center operations due to the dynamic nature of workloads. I also consider the issue of offloading mobile device tasks to improve user experience and better address processing needs at the edge. In data centers of cloud service providers (CSPs), inaccurate workload forecasting can lead to poor resource utilization and an unsatisfactory user experience. It can result in suboptimal resource provisioning that wastes energy, breaks service‑level agreements (SLAs), and affects performance. Therefore, it is important to achieve high forecast accuracy for dynamic resource management to optimize reliable operation in data centers despite changing demand. At the same time, mobile devices have become relatively powerful small computers that can run more applications that are sensitive to delay. However, these devices will always be limited in energy and processing resources, and some of their tasks may still need to be carefully balanced between local processing, additional capabilities at the edge, and offloading tasks to the data center when it makes sense, thus optimizing mobile task offloading in Mobile Edge Cloud Collaboration (MECC) environments. Thus, this dissertation first proposes a novel hybrid predictive model to improve workload‑forecasting accuracy. The methodology begins with two stages of signal decomposition via a two-step strategy: First, I apply Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDAN) to extract intrinsic structures and remove noise artifacts from high-dimensional workload traces. Then I apply Variational Mode Decomposition (VMD) to filter out high‑frequency signals. The decomposed signals are then passed to a deep‑learning model comprising parallel 1D Convolutional Neural Networks (CNN1D) and Bidirectional Long Short‑Term Memory (Bi‑LSTM) networks, which will allow for learning short‑, medium‑, and long‑term temporal patterns. This yields adaptive and accurate prediction models for intelligent resource provisioning within data centers. Addressing the second challenge, the dissertation explores dynamic multi‑objective task offloading within the MECC framework. It does that by formulating the problem as a Markov Decision Process (MDP) designed to jointly minimize delay, reduce energy consumption, and control computational cost. This formulation takes into consideration changing network conditions, different task requirements, and real‑time availability of resources across mobile devices, edge nodes, and the cloud. A deep reinforcement learning (DRL) algorithm is also proposed, which combines the sequential modeling of Gated Recurrent Units (GRUs) with the stable optimization technique of Proximal Policy Optimization (PPO). The outcome is an offloading policy that prioritizes executing tasks locally and, on the edge, and only sends them to the cloud if it is strictly necessary. To maintain secure task execution, we integrate a lightweight Hash‑based Message Authentication Code (HMAC) that allows data integrity to be verified with minimal overhead. The proposed CVCBM system was shown to improve the accuracy of workload prediction by 73.8% in related work. Moreover, the proposed HPPO-GRU system was shown to enable safe and efficient task offloading, while reducing total computing cost by approximately 7% to related works. Collectively, these advances improve the reliability of distributed computing across mobile, edge, and cloud layers, enabling next‑generation intelligent infrastructure to respond dynamically to modern digital demands.
    12 0
  • ItemRestricted
    IMPROVING SMART HOME ACCESS CONTROL MECHANISMS TO ACCOUNT FOR COMMUNITY-BASED SHARING BEYOND THE HOME
    (Saudi Digital Library, 2025) Alghamdi, Leena; Hughes, Charles; Wisniewski, Pamela
    The rapid proliferation of smart home devices has reshaped daily living, offering convenience and enhanced security. However, extending access to these devices beyond household boundaries introduces significant challenges, including balancing privacy, security, and usability. Through three studies, this dissertation investigates these challenges and proposes solutions to improve access control mechanisms for sharing smart home devices with external individuals. First, we conducted 26 co-design interviews with 50 smart home device owners to understand their perspectives on co-monitoring in emergencies with trusted external contacts. Participants emphasized benefits such as enhanced safety, reduced material loss, and peace of mind through swift responses and threat verification. However, privacy concerns, burdening others, and unauthorized access highlighted the complexity of implementing such systems. These insights informed the development of design considerations, emphasizing flexibility, granular controls, and fail-safe mechanisms to mitigate these concerns and address user needs effectively. Building on these insights, we systematically analyzed 11 existing smart home management systems and two open-source platforms to evaluate how they support external sharing. The analysis uncovered significant limitations, such as reliance on rigid "all-or-nothing" access models, limited granularity in permissions, and insufficient transparency. These findings highlighted the need for more adaptable and user-centered mechanisms that empower users to manage access securely and intuitively while addressing privacy and usability concerns. To address these gaps, we developed and evaluated a novel mobile application, "MiSu," to enable flexible and secure smart home device sharing. MiSu introduced features like time-based permissions, device specific access, and real-time activity logs to accommodate diverse sharing scenarios. Then, we conducted a user study involving 15 smart home users and their trusted external contacts (N=30), revealing that participants valued the app’s precision and transparency but encountered usability challenges and privacy concerns, such as potential misuse of permissions and overexposure of personal spaces. These findings highlight the need for intuitive, user-centered designs that balance advanced functionality with privacy protection.
    23 0
  • ItemRestricted
    Enhancing Trust Modelling for the Internet of Underwater Things
    (University of Nottingham, 2025) Almutairi, Abeer; Furnell, Steven; Carpent, Xavier
    The Internet of Underwater Things (IoUT) has gained growing interest from researchers and industry alike, due to its potential for advancing the development of smart cities and underwater intelligent systems. However, the harsh and unpredictable nature of underwater environments, coupled with the inherent limitations of existing technologies, presents significant challenges to establishing a sustainable IoUT. Furthermore, the open nature of such networks renders them highly susceptible to malicious attacks and security threats. Traditional security measures, which are widely implemented in conventional cyber systems, exhibit severe performance constraints in underwater networks, highlighting the urgent need for novel security solutions that meet the unique requirements of underwater networks. Trust modelling has been widely recognised as an effective soft security measure to mitigate the impact of internal attacks. It primarily achieves this by analysing behavioural characteristics between network entities, thereby introducing a layer of defence against malicious activities. In the context of underwater networks, trust establishment between nodes has the potential to significantly enhance overall network security. However, existing Trust Modelling and Management (TMM) often fail to address the complexities of underwater environments, which necessitate new TMM that are lightweight, accurate, and decentralised. In light of these limitations, this thesis investigates and enhances TMM to meet the application requirements of underwater networks while addressing the specific challenges inherent to IoUT. The central research question addressed in this thesis is: To what extent can existing TMM accommodate diverse network topologies within the IoUT and effectively mitigate potential attacks from both the communication and physical domains. In order to answer this question, a comprehensive understanding of the key challenges and potential application requirements for underwater networks is required. To facilitate this investigation, a simulated environment is constructed to analyse the effectiveness of TMM. This study critically evaluates the capabilities of current TMM in detecting malicious activities across various underwater network structures, identifying vulnerabilities, and exposing potential attack vectors. In response to these findings, this thesis proposes a distributed multi-dimensional TMM, referred to as the Mobility-Aware Trust Model (MATMU), designed to enhance the detection of malicious behaviour within the constraints of underwater environments. MATMU expands the metric domain to include mobility-aware metrics, allowing for the assessment of similarities and differences in node movement patterns. Additionally, the model employs a dynamic weighting strategy that integrates metrics from both the communication and physical domains. The performance of MATMU is evaluated through extensive simulations conducted across various underwater scenarios and attack models. The results demonstrate that MATMU effectively mitigates malicious behaviour, exhibiting notable improvements over benchmark models, particularly in terms of faster convergence and enhanced attack detection. These findings underscore the suitability of MATMU for strengthening secure and reliable communication in underwater networks. This thesis also tackles the critical issue of dishonest recommendations within TMM in the IoUT context, which is introduced by malicious entities, aiming to manipulate trust computations by providing false or misleading recommendations, thereby degrading the reliability and stability of the TMM. A novel recommendation evaluation method is introduced, combining filtering and weighting strategies to more effectively detect dishonest recommendations. The proposed model incorporates an outlier detection-based filtering technique and deviation analysis to evaluate recommendations based on both collective outcomes and individual experiences. Furthermore, a belief function is employed to refine recommendations by assigning weights based on criteria such as freshness, similarity, trustworthiness, and trust decay over time. This multi-dimensional approach demonstrates a marked improvement in recommendation evaluation, effectively capturing deceptive behaviours that exploit the complexities of IoUT. The effectiveness of the model is validated through extensive simulations and comparative analyses with existing trust evaluation methods, demonstrating consistently high performance across varying proportions of dishonest recommendations, with the highest accuracy improvement observed when dishonest recommendations constitute up to 45% of the total recommendations. These findings underscore the model’s potential to significantly enhance the reliability and security of IoUT networks.
    24 0
  • ItemRestricted
    A RISK-ADAPTIVE ACCESS CONTROL MODEL FOR THE SERVICE MESH IN A MICROSERVICES ARCHITECTURE
    (The University of Tulsa, 2025-05) Alboqmi, Rami; Gamble, Rose
    Cloud computing has transformed our lives by enabling applications to be deployed at scale, allowing a broad range of customers to access services seamlessly. However, as cloud computing has evolved, several challenges have emerged, such as meeting high customer demands while maintaining system stability and scalability. As a result, the cloud community introduced cloud-native computing in 2015, enabling applications to be scaled efficiently to meet customers’ demands. The microservices architecture (MSA) is a key enabler of cloud-native application development. It allows developers to build an application's components loosely and independently as microservices (also referred to as services). Following and applying the MSA architecture has many benefits, such as a failure within a microservice may not affect the entire deployed MSA application. For example, a failure in the temperature display microservice functionality does not affect the core functionalities of other microservices, such as map navigation. The map navigation microservice will still operate without temperature data. As a result, an MSA application becomes more resilient to failure. However, MSA introduces challenges in securing communication between microservices where orchestration solutions cannot ensure secure communications. A rogue microservice could act as a backdoor, compromising other microservices within the MSA application after initial authentication and authorization at deployment. Thus, service mesh technology was introduced as an infrastructure layer within an orchestration solution in 2017 to handle robust security, such as secure microservices-to-microservices communication with features like mutual TLS. Nevertheless, the current service mesh solutions are not mature yet and still rely on static AC policies set at deployment. In addition, these static policies operate with implicit trust between microservices, which do not adapt to changes in response to the trustworthiness of microservice. As a result, the service mesh limits its ability to detect compromised microservices at runtime, requires manual AC policy updates, and creates security gaps. A dynamic AC model for the service mesh is crucial to continuously assess the trustworthiness of microservices based on their behavior and vulnerability posture to align with the Zero Trust (ZT) principle of “never trust, always verify.” Additionally, any proposed dynamic AC model for the service mesh must not only offer dynamic and adaptive AC policies but also address the research gap in service mesh in the lack of capabilities such as sharing threat intelligence and enforcing automated microservice owner compliance requirements at runtime. These capabilities are essential for continuous monitoring and adaptive security responses for MSA applications at runtime. To dynamically adjust AC policies at runtime based on the trustworthiness of microservices, this research introduces the Service Mesh risk-Adaptive Access Control (SMAAC). SMAAC consists of three components: (1) Runtime Trust Evaluator (RTE) that assigns a trust metric (TM) to all microservices based on their behaviors and vulnerabilities; (2) Threat Intelligence Sharing (TIS) that shares TM values and vulnerability reports of all microservices; and (3) Access Policy Generation (APG) that creates dynamic AC policies when the TM of a microservice falls below a compliant threshold. Evaluated on three research MSA applications μBench, Lakeside Mutual, and Train Ticket, SMAAC effectively shows an adaptive mechanism for creating compliant AC policies to secure the operations of microservices and reduce security risks.
    17 0
  • ItemRestricted
    Security of Distributed and Federated Deep Learning Systems
    (Newcastle University, 2025) Alqattan, Duaa; Ojha, Varun
    Distributed and federated deep learning (DL) systems, operating across the client-edge cloud continuum, have transformed real-time data processing in critical domains like smart cities, healthcare, and industrial Internet of Things (IoT). By distributing DL training and inference tasks across multiple nodes, these systems enhance scalability, reduce latency, and improve efficiency. However, this decentralisation introduces significant security challenges, particularly concerning the availability and integrity of DL systems during training and inference. This thesis tackles these challenges through three main contributions. • Edge-based Detection of Early-stage IoT Botnets: The first contribution involves employing Modular Neural Networks (MNN), a distributed DL approach, to develop an edge-based system for detecting early-stage IoT botnet activities and preventing DDoSattacks. By harnessing parallel computing on Multi-Access Edge Computing (MEC)servers, the system delivers rapid and accurate detection, ensuring uninterrupted service availability. This addresses the research gap in detecting early-stage IoT botnet activities as faults in network communication, enabling preventive measures before attacks escalate. Key findings include a significant reduction in false-negative rates and faster detection times (as low as 16 milliseconds), enabling early intervention in large-scale IoT environments. • Security Assessment of Hierarchical Federated Learning (HFL): The second contri bution is a security assessment of Hierarchical Federated Learning (HFL), evaluating its resilience against data and model poisoning attacks during training and adversarial data manipulation during inference. Defense mechanisms like Neural Cleanse (NC) and Adversarial Training (AT) are explored to improve model integrity in privacy sensitive environments. This addresses the gap in systematically assessing the security vulnerabilities of HFL systems, particularly in detecting and mitigating targeted at tacks in multi-level architectures. Key findings highlight that while HFL enhances scalability and recovery from untargeted attacks, it remains vulnerable to targeted back door attacks, especially in higher-level architectures, necessitating stronger defence mechanisms. • Analysis of HFL Dynamics Under Attack: The third contribution examines HFL dynamics under attack using a Model Discrepancy score to analyse discrepancies in model updates. This study sheds light on the impact of adversarial attacks and data heterogeneity, providing insights for more robust aggregation methods in HFL. This addresses the gap in understanding the dynamics of HFL under adversarial attacks through model discrepancy phenomena. Key findings reveal that increased hierarchy and data heterogeneity can obscure malicious activity detection, emphasising the need for advanced aggregation methods tailored to complex, real-world scenarios. Overall, this thesis enhances the security, availability, and integrity of Distributed and Federated DL systems by proposing novel detection and assessment methods, ultimately laying the foundation for more resilient DL-driven infrastructures.
    22 0
  • ItemRestricted
    ACCEPTANCE OF BLOCKCHAIN TECHNOLOGY BY HIGHER EDUCATION INSTITUTIONS IN THE KINGDOM OF SAUDI ARABIA
    (Aston University, 2025) Alhumayzi, Mohammed; Batista, Luciano; Benson, Vladlena
    The increasing adoption of new technologies in the Higher Education Institutions (HEIs) sector highlights the importance of exploring blockchain acceptance among employees. Adopting blockchain, as an emerging technology, is likely to encounter resistance among employees. This study explores this issue. Specifically, this study aims to determine the drivers and hindrances of blockchain acceptance among employees in the HEIs industry. To address this aim, this study proposes a framework that extends the unified theory of acceptance and use of technology (UTAUT) with individual characteristics. The framework represents factors that explain blockchain acceptance. The identified elements are performance expectancy (PE), effort expectancy (EX), social influence (SI), facilitating conditions (FC), trust, perceived security (SEC) and awareness (AW). The relationships among these factors were examined based on a quantitative approach, where an online questionnaire was employed to collect data from administrative and academic staff working for HEIs in the Kingdom of Saudi Arabia (KSA). Partial Least Squares Structural Equation Model (PLS-SEM) and Multi-group Analysis (MGA) techniques were employed to analyse 394 responses. The findings of this study revealed the direct drivers and hindrances of blockchain acceptance, i.e., PE, FC, SEC and AW. Additionally, this study demonstrated the moderating effects of AW between FC and blockchain acceptance. Furthermore, it determined specific indirect effects of the EX, trust and SEC on blockchain acceptance. Moreover, this research detected significant differences between categories’ subsamples and identified the significant factors of blockchain acceptance per subsample. Finally, this research identified where blockchain needs to be adopted most within the HEIs, i.e., financial exchange, certificate management, and students’ assessment areas. The HEIs industry in KSA could use these findings to develop concise strategies that encourage the adoption of blockchain. Scholars might also employ the proposed framework to investigate the adoption of blockchain.
    33 0
  • ItemRestricted
    Privacy-aware Secure Authentication and Handover Protocols for 5G-enabled Mobile Communication
    (University of Sheffield, 2025) Alnashwan, Rabiah; Prosanta, Gope; Benjamin, Dowling
    The evolution of mobile communication has facilitated technological advancements that enable seamless global connectivity. With the advent of 5G technology, wireless communication has taken a significant leap forward, promising unparalleled speed, capacity, and connectivity. As we enter this era of advanced communication, we also need to consider its implications for security and privacy. The integration of 5G technology brings new opportunities and challenges, making it essential to thoroughly examine the security and privacy frameworks that support this advanced network. Compared to the previous mobile communication generations, 5G offers a more robust security infrastructure by strengthening two key protocols: Authentication and Key Agreement (AKA) and Handover (HO). Although 5G-AKA significantly improves security measures, it is worth noting that the current protocols lack support for several essential security and privacy properties, such as forward secrecy, forward privacy, and unlinkability. Thus, a critical need remains to address these gaps to ensure comprehensive protection in 5G networks. In response to the issues in respect of security and privacy, this thesis proposes three novel AKA and HO schemes. The three proposed schemes have different security and privacy goals that support improved security and privacy features compared to the conventional 5G-AKA and HO protocols currently utilized and other existing solutions. In particular, we examine challenges associated with integrating ultra-dense small cell networks (SCNs) into the 5G infrastructure. This exploration led us to investigate the concept of region-based handovers and to propose, to the best of our knowledge, the first scheme that provides privacy-preserving, secure inter-region-based AKA and HO scheme. This scheme provides secure authentication for roaming users with an efficient and seamless handover process. To enhance security and privacy measures further, we undertake an additional investigation into fortifying resilience against key compromise impersonation attacks. This involves proposing a novel, secure, privacy-preserving Universal Handover scheme (UniHand) tailored for SCNs within the 5G mobile communication framework. Finally, in pursuit of seamless compatibility with 5G networks, we introduce an improved iteration of the 5G-AKA and HO protocols. Referred to as Pretty Good User Privacy (PGUP), this novel symmetry-based scheme aims to mitigate security and privacy vulnerabilities inherent in the existing 5G-AKA and HO protocols while maintaining high compatibility with the 5G infrastructure.
    28 0
  • ItemRestricted
    AI-Driven Approaches for Privacy Compliance: Enhancing Adherence to Privacy Regulations
    (Univeristy of Warwick, 2024-02) Alamri, Hamad; Maple, Carsten
    This thesis investigates and explores some inherent limitations within the current privacy policy landscape, provides recommendations, and proposes potential solutions to address these issues. The first contribution of this thesis is a comprehensive study that addresses a significant gap in the literature. This study provides a detailed overview of the current landscape of privacy policies, covering both their limitations and proposed solutions, with the aim of identifying the most practical and applicable approaches for researchers in the field. Second, the thesis tackles the challenge of privacy policy accessibility in app stores by introducing the App Privacy Policy Extractor (APPE) system. The APPE pipeline consists of various components, each developed to perform a specific task and provide insightful information about the apps' privacy policies. By analysing over two million apps in the iOS App Store, APPE offers unprecedented and comprehensive store-wide insights into policy distribution and can act as a mechanism for enforcing privacy policy requirements in app stores automatically. Third, the thesis investigates the issue of privacy policy complexity. By establishing generalisability across app categories and drawing attention to associated matters of time and cost, the study demonstrates that the current situation requires immediate and effective solutions. It suggests several recommendations and potential solutions. Finally, to enhance user engagement with privacy policies, a novel framework utilising a cost-effective unsupervised approach, based on the latest AI innovations, has been developed. The comparison of the findings of this study with state-of-the-art methods suggests that this approach can produce outcomes that are on par with those of human experts, or even surpass them, yet in a more efficient and automated manner.
    37 0
  • Thumbnail Image
    ItemRestricted
    Verification of Smart Contracts using the Interactive Theorem Prover Agda
    (Swansea University, 2024-07-25) Alhabardi, Fahad; Setzer, Anton
    The goal of this thesis is to verify smart contracts in Blockchain. In particular, we focus on smart contracts in Bitcoin and Solidity. In order to specify the correctness of smart contracts, we use weakest preconditions. For this, we develop a model of smart contracts in the interactive theorem prover and dependent type programming language Agda and prove the correctness of smart contracts in it. In the context of Bitcoin, our verification of Bitcoin scripts consists of non-conditional and conditional scripts. For Solidity, we refer to programs using object- oriented features of Solidity, such as calling of other contracts, full recursion, and the use of gas in order to guarantee termination while having a Turing-complete language. We have developed a simulator for Solidity-style smart contracts. As a main example, we executed a reentrancy attack in our model. We have verified smart contracts in Bitcoin and Solidity using weakest precondition in Agda. Furthermore, Agda, combined with the fact that it is a theorem prover and programming language, allows the writing of verified programs, where the verification takes place in the same language in which the program is written, avoiding the problem of translation from one language to another (with possible translation mistakes).
    10 0

Copyright owned by the Saudi Digital Library (SDL) © 2025