
Navid Abapour
Academic and research departments
Secure Systems Research Group, Department of Computer Science, Surrey Centre for Cyber Security.About
My research project
Ensuring Trust in Vehicle-to-anything (V2X) CommunicationInitiation: October 2023
Goal? Never trust parties whose names start with A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z!
My project aim is to design secure and efficient V2X communication where each party has guarantees on the trustworthiness of their interaction.
How? Trust me, or I'll shoot you!
We are trying to model this as a set of statements/attributes that each party must satisfy. Also, mixing algebraic lattice-based structures with primitives like Secret-sharing Schemes, Zero-knowledge Proofs, Ring Signatures, and Attribute-based Encryption is going to increase the applicability of this frameworkโs protocols for the post-quantum era, along with keeping an eye on being computationally secure.
Challenges?ย Well... sometimes it is hard to trust...
Apart from the emergence of novel quantum algorithms, there are numerous things that make this project hard, but the most critical one is to incorporate self-made and private attributes without negatively affecting the trust of the entity using these types of attributes.
Supervisors
Initiation: October 2023
Goal? Never trust parties whose names start with A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z!
My project aim is to design secure and efficient V2X communication where each party has guarantees on the trustworthiness of their interaction.
How? Trust me, or I'll shoot you!
We are trying to model this as a set of statements/attributes that each party must satisfy. Also, mixing algebraic lattice-based structures with primitives like Secret-sharing Schemes, Zero-knowledge Proofs, Ring Signatures, and Attribute-based Encryption is going to increase the applicability of this frameworkโs protocols for the post-quantum era, along with keeping an eye on being computationally secure.
Challenges?ย Well... sometimes it is hard to trust...
Apart from the emergence of novel quantum algorithms, there are numerous things that make this project hard, but the most critical one is to incorporate self-made and private attributes without negatively affecting the trust of the entity using these types of attributes.
My qualifications
Project: "๐ณ๐๐๐๐๐๐๐๐๐๐ฃ๐๐ ๐ป๐๐๐๐๐๐-๐๐๐๐๐ ๐ผ๐๐๐๐๐ ๐๐๐ ๐ ๐๐๐๐๐ ๐๐ข๐๐๐๐๐๐๐ ๐ฒ๐๐ข๐๐๐๐๐๐๐๐๐ข"
ResearchResearch interests
๐ฃ๐ผ๐๐-๐พ๐๐ฎ๐ป๐๐๐บ ๐๐ฟ๐๐ฝ๐๐ผ๐ด๐ฟ๐ฎ๐ฝ๐ต๐, ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ฒ ๐ ๐๐น๐๐ถ-๐ฝ๐ฎ๐ฟ๐๐ ๐๐ผ๐บ๐ฝ๐๐๐ฎ๐๐ถ๐ผ๐ป, ๐๐ผ๐บ๐ฝ๐๐๐ฎ๐๐ถ๐ผ๐ป๐ฎ๐น ๐๐ผ๐บ๐ฝ๐น๐ฒ๐
๐ถ๐๐, ๐ฃ๐ฟ๐ถ๐๐ฎ๐ฐ๐-๐ฝ๐ฟ๐ฒ๐๐ฒ๐ฟ๐๐ถ๐ป๐ด ๐๐ผ๐บ๐ฝ๐๐๐ถ๐ป๐ด
Research collaborations
University of Melbourne (2021-2022)
Developed the Advanced Information Flow Security Concurrent Separation Logicย [Prototype Draft]ย [Source Code]
Supervisor: Toby Murray, Advisor:ย Mohammad Ahmadpanah
Indicators of esteem
Reviewer:ย MDPI Sensorsย | Arabian Journal of Science and Engineeringย |ย Cluster Computingย | SN Computer Science
Research interests
๐ฃ๐ผ๐๐-๐พ๐๐ฎ๐ป๐๐๐บ ๐๐ฟ๐๐ฝ๐๐ผ๐ด๐ฟ๐ฎ๐ฝ๐ต๐, ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ฒ ๐ ๐๐น๐๐ถ-๐ฝ๐ฎ๐ฟ๐๐ ๐๐ผ๐บ๐ฝ๐๐๐ฎ๐๐ถ๐ผ๐ป, ๐๐ผ๐บ๐ฝ๐๐๐ฎ๐๐ถ๐ผ๐ป๐ฎ๐น ๐๐ผ๐บ๐ฝ๐น๐ฒ๐ ๐ถ๐๐, ๐ฃ๐ฟ๐ถ๐๐ฎ๐ฐ๐-๐ฝ๐ฟ๐ฒ๐๐ฒ๐ฟ๐๐ถ๐ป๐ด ๐๐ผ๐บ๐ฝ๐๐๐ถ๐ป๐ด
Research collaborations
University of Melbourne (2021-2022)
Developed the Advanced Information Flow Security Concurrent Separation Logicย [Prototype Draft]ย [Source Code]
Supervisor: Toby Murray, Advisor:ย Mohammad Ahmadpanah
Indicators of esteem
Reviewer:ย MDPI Sensorsย | Arabian Journal of Science and Engineeringย |ย Cluster Computingย | SN Computer Science
Teaching
University of Mohaghegh Ardabili (2019-2022)
Data Structure & Algorithms (by Mohammad Hooshmandasl): Teaching Assistant
Data Mining (by Mohammad Hooshmandasl): Homework Corrector
Foundations of Algebra (by Naser Zamani): Homework Corrector
Publications
In recent years, establishing secure visual communications has turned into one of the essential problems for security engineers and researchers. However, only limited novel solutions are provided for image encryption, and limiting visual cryptography to only limited schemes can bring up negative consequences, especially with emerging quantum computational systems. This paper presents a novel algorithm for establishing secure private visual communication. The proposed method has a layered architecture with several cohesive components, and corresponded with an NP-hard problem, despite its symmetric structure. This two-step technique is not limited to gray-scale pictures, and furthermore, it is relatively secure from the theoretical dimension.
In the last few years, due to the benefit of solving large-scale computational problems, researchers have developed multi-cloud infrastructures. The trust-related issue in multiclouds includes more complicated content and new problems. A new trust management framework for multi-cloud environments is proposed in this article. The proposed framework used a combination of objective and subjective trust values to calculate the cloud service providerโs trust values. This new framework can identify and rectify fake feedback from other feedbacks. Another advantage of this framework is applying fuzzy rules to calculate trust values. Two main components of the proposed framework are simulated in this paper. The simulation results confirm the important role of applied components. Also, this paper proposed a framework compared with other frameworks (feedback-based model, SLA-based model, and multi-cloud model). Simulation results show the proposed framework increased trust values more than other models. Also, compared with other models, our framework gives better mean trust values.