Published January 30, 2025 | Version CC-BY-NC-ND 4.0
Journal article Open

Enhancing Privacy in the Management of Library Resources: A Novel Approach Utilizing FRS and ABE-CP Algorithm for Improved Protection

  • 1. Department of Computer Science Engineering, School of Science and Technology, The Federal Polytechnic Bauchi, (Bauchi), Nigeria.

Contributors

Contact person:

Researcher:

  • 1. Department of Computer Science Engineering, School of Science and Technology, The Federal Polytechnic Bauchi, (Bauchi), Nigeria.

Description

Abstract: Libraries contain sensitive resources that users can access. The vital challenges faced include unauthorized access, privacy violations, malicious attacks, etc. Researchers have explored several ways to curb these challenges including encryption, policies, anti-malware etc. An improved design to secure library resources based on Fragmentation Redundancy Scattering (FRS) and Attribute-Based Encryption CiphertextPolicy (ABE- CP) was presented. The core idea of FRS is to fragment confidential information to produce insignificant fragments and then scatter the pieces across the distributed system. As such, the scheme provides a new technique to manage network components and exchange encryption keys. By comparing the proposed scheme with other schemes, the proposed scheme prevents unauthorized access to users’ data and protects user’s privacy. The scheme in addition becomes resistant to common attacks like replay and man-in-the-middle. According to our findings, the scheme is safe, practicable, and comprehensive with high security for both encrypting and decrypting users’ data within the least possible time.

Files

D815813041124.pdf

Files (703.2 kB)

Name Size Download all
md5:a4dda309e2d570f0f43d0aa7730e99f0
703.2 kB Preview Download

Additional details

Identifiers

Dates

Accepted
2025-01-15
Manuscript received on 19 September 2024 | First Revised Manuscript received on 12 December 2024 | Second Revised Manuscript received on 31 December 2024 | Manuscript Accepted on 15 January 2025 | Manuscript published on 30 January 2025.

References

  • Bal, R., Ashish K., Surendra, K., (2023), 'Applications of Internet of Things In Library and Data Management', IP Indian Journal of Information Technology, DOI: https://doi.org/10.18231/j.ijlsit.2023.003
  • Panjun, S., Yi, W., Zongda, W., Zhaoxi, F., Qi, L., (2025), 'A survey on privacy and security issues in IoT-based environments: Technologies, protection measures and future directions', Computers & Security, Volume 148, January 2025, 104097, Elsevier, https://doi.org/10.1016/j.cose.2024.104097
  • Kumar, A., Kumar, R., Pandey, S.K., (2023), 'Analysis of the Collection Development Policies: A Case Study of the Libraries of Kumaun University', Indian Journal of Library Science. 2023;2(5):54– 9. DOI: https://doi.org/10.18231/j.ijlsit.2023.003
  • Aliyu, M., Murali, M., Gital A., Boukari, S., Rumana, K., Maryam, A., Zambuk, Z., Caleb, C., Ibrahim, M., (2021). 'A Multi-Tier Architecture for the Management of Supply Chain of Cloud Resources in a Virtualized Cloud Environment: A Novel SCM Technique for Cloud Resources Using Ant Colony Optimization and Spanning Tree', International Journal of Information Systems and Supply Chain Management Volume 14 Issue 3, DOI: https://doi.org/10.4018/IJISSCM.2021070101
  • Aliyu, M., Murali, M., Gital, A. Y., Boukari, S., (2019), 'An Efficient Ant Colony Optimization Algorithm for Resource Provisioning in Cloud', International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-4, DOI: https://doi.org/10.35940/ijrte.D6968.118419
  • Aliyu, M., Murali, M., Zhang, Z., Gital, A., Boukari, S., Huang, Y., Yakubu, I. (2021), 'Management of Cloud Resources and Social Change in a Multi-Tier Environment: A Novel Finite Automata Using Ant Colony Optimization with Spanning Tree'. Technological Forecasting and Social Change, 166, 120591. DOI: https://doi.org/10.1016/j.techfore.2021.120591
  • Oukemeni, S., Rifà-pous, H., Manuel, J., and Puig, M., (2024), 'Privacy Analysis on Microblogging Online Library Networks', A Survey', 52 (3) (2024) ACM Computing Surveys, 52(3), 1–36. DOI: https://doi.org/10.1145/3321481
  • Mu, C. (2024), 'Application of Optimizing Advanced Encryption Standard in Vehicle Controller Local Area Network Bus Secure Communication System', Frontiers in Mechanical Engineering, 10, Article 1407665. DOI: https://doi.org/10.3389/fmech.2024.1407665
  • Bethencourt, J. & Sahai, B., (2023), 'Ciphertext-Policy Attribute-Based Encryption' In Proceedings of the IEEE Symposium on Security and Privacy (pp. 321–334). IEEE. DOI: https://doi.org/10.1109/SP.2007.11
  • Chingath, V., & Babu, R., (2020), 'Advantage of Blockchain Technology for the libraries', International Conference on DigitaI Transformation: A Cognitive Learning towards Artificial Intelligence, www.researchgate.net/publication/341725555_Advantage_Blockchain _Technology_for_the_Libraries
  • Ram, B., & Singh, K., (2020), 'Innovative Library Services in Mobile Technology: A Recent approach'. Int J Inf Dissemination Technol. 2020; 10(4):192–4. DOI: https://doi.org/10.5958/2249- 5576.2020.00035.7
  • Li, R., Chenglin, S., Heng, H., Zhiyong, X., & Cheng-Zhong, X., (2017), 'A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing', IEEE Transactions on Cloud Computing 7161 (c): 1–1. DOI: https://doi.org/10.1109/TCC.2017.2649685
  • Fugkeaw, S., & Sato, H., (2018), 'Enabling Dynamic and Efficient Data Access Control in Cloud Computing Based on Attribute Certificate Management and CP-ABE', 2018 26th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), 454–61. DOI: https://doi.org/10.1109/PDP2018.2018.00079.
  • Starin, D., Baden, R., Bender, A., Spring, N., & Bhattacharjee, B., (2019), 'Persona: An Online Network with User-Defined Privacy Categories and Subject Descriptors', Sigcomm'09 (2019), pp. 135-146, DOI: https://doi.org/10.1145/1592568.1592585
  • Jahid, S., Prateek, M., & Nikita, B., (2021), 'EASiER: EncryptionBased Access Control in Online Networks with Efficient Revocation', Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2021, 411–15. DOI: https://doi.org/10.1145/1966913.1966970
  • Shalini, D., Ganesh, K., & Swarnendu, K., (2024), 'Homographic Encryption Library, Framework, Toolkit, and Accelerator', SPRINGER journal, vol 5, article 24 DOI: https://doi.org/10.1007/s42979-023- 02316-9
  • Ram, B., and Yadav, S., (2022), 'Bibliometric Study of DESIDOC' Journal of Library and Information Technology from 1981-2018', Libr PhilosophyPract. 2022;p. 1–13. https://digitalcommons.unl.edu/libphilprac/7457/
  • Abdulla, A., & Bakiras, S. (2019). 'HITC: Data Privacy in Online Social Networks with Fine-Grained Access Control. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (pp. 123–134). ACM. DOI: https://doi.org/10.1145/3322431.3325104
  • Wang, Z., Ma, Z., Luo, S., & Gao, H., (2018), 'Enhanced Smart Library Security and Privacy Protection Scheme for Mobile Online Network Systems', IEEE Access, 6 (2018), pp. 13706-13715, DOI: https://doi.org/10.1109/ACCESS.2018.2813432
  • Pozo, D., and Iturralde, M., (2023), 'CI: A New Encryption Mechanism for Smart Library in Mobile Devices', Procedia Computer Science, 63 (2023), pp. 533-558, DOI: https://doi.org/10.1016/j.procs.2022.08.381
  • Brenna, L., Isak, S., Havard, D., & Dag, J., (2022), 'TFHE-re: A Library for Safe and Secure Remote Computing Using Fully Homomorphic Encryption and Trusted Execution Environments', ScienceDirect, vol13, DOI: https://doi.org/10.1016/j.array.2021.100118
  • Halevi, S., & Polyakov, Y., (2019), ' An Improved RNS Variant of the BFV Homomorphic encryption Scheme in Cryptographers', Track at the RSA Conference (pp83-105. Springer, Cham, 2019) DOI: https://doi.org/10.1007/978-3-030-12612-4_5
  • Omame, I., & Juliet, C., (2021), 'Application of Blockchain in Libraries and Information Systems', Research gate .net, DOI: https://doi.org/10.1108/LHTN-02-2023-0020
  • Kayes, I., Lamnitchi, A., (2017), 'Privacy and Security in SLMS Networks: A Survey', Libraries and their Applications, 3 (2017), pp. 1- 21, DOI: https://doi.org/10.1016/j.osnem.2017.09.001
  • Ramu, G. & Mishra, Z., (2019), 'Hardware Implementation of Piccolo Encryption Algorithm for Constrained RFID Application', In: 2019 9th Annual Information Technology, Electromechanical Engineering and Microelectronics Conference, IEEE, India, pp. 85-89, 2019. IEEE. DOI: https://doi.org/10.1109/IEMECONX.2019.8877071
  • Li, Y., Jiawen, Z., & Weina, F., (2022), 'Intelligent Privacy Protection of End User in Long Distance Education', Mobile Networks and Applications, no. February. DOI: https://doi.org/10.1007/s11036-022- 01950-6.
  • Pujari, V., & Gadgay, B., (2023) 'Smart Library System using IoT'. International Journal for Research in Applied Science and Engineering Technology, vol. 6, no. 7, pp. 471-476, DOI: https://doi.org/10.22214/ijraset.2018.7068
  • Mohammadi, M., Yegane, M., Library, C., & Branch, Q., (2023), 'IOT: Applied New Technology in Academic Libraries', In: International Conference on Distributed Computing and HighPerformance Computing (DCHP 2023) 25th-27th November 2023, Qom, At University of Qom, Qom, pp. 1-12, 2023, https://www.researchgate.net/publication/333634140_IOT_Applied_N ew_Technology_in_Academic_Libraries
  • Philosophy, L., Kumar, R., & Kaliyaperumal, K., (2022), 'Applications of GSM Technology for Documents Identification in a Library System', International Journal of Academic Library and Information Science, vol. 2, no. 1, pp. 1-6, 2022, https://academicresearchjournals.org/IJALIS/PDF/2014/January/kumar %20and%20%20Kaliyaperumal.pdf
  • He, Z., Cai, Z., Han, Q., Tong, W., Sun, L., & Li, Y., (2016), 'An Energy Efficient Privacy-Preserving Content Sharing Scheme in Smart Library Networks', Personal and Ubiquitous Computing, 20 (5) (2016), pp. 833-846, DOI: https://doi.org/10.1007/s00779-016-0952-6
  • Churi, P. (2019). Performance Analysis of Data Encryption Algorithm. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 3, pp. 3230–3235). DOI: https://doi.org/10.35940/ijrte.c5775.098319
  • Bonde, S. Y., & Bhadade, U. S. (2019). Encryption Algorithm using Shuffled 2-Dimension Key. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 2, pp. 1105–1109). DOI: https://doi.org/10.35940/ijeat.a2236.129219
  • Subraja, K., Geetha, N., & Mahesh, Dr. K. (2020). BITS – A Novel Video Encryption Algorithm. In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 8, pp. 101–105). DOI: https://doi.org/10.35940/ijitee.h6196.069820