Enhancing Privacy in the Management of Library Resources: A Novel Approach Utilizing FRS and ABE-CP Algorithm for Improved Protection
Main Article Content
Abstract
Libraries contain sensitive resources that users can access. The vital challenges faced include unauthorized access, privacy violations, malicious attacks, etc. Researchers have explored several ways to curb these challenges including encryption, policies, anti-malware etc. An improved design to secure library resources based on Fragmentation Redundancy Scattering (FRS) and Attribute-Based Encryption CiphertextPolicy (ABE- CP) was presented. The core idea of FRS is to fragment confidential information to produce insignificant fragments and then scatter the pieces across the distributed system. As such, the scheme provides a new technique to manage network components and exchange encryption keys. By comparing the proposed scheme with other schemes, the proposed scheme prevents unauthorized access to users’ data and protects user’s privacy. The scheme in addition becomes resistant to common attacks like replay and man-in-the-middle. According to our findings, the scheme is safe, practicable, and comprehensive with high security for both encrypting and decrypting users’ data within the least possible time.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
Bal, R., Ashish K., Surendra, K., (2023), ‘Applications of Internet of Things In Library and Data Management’, IP Indian Journal of Information Technology, DOI: https://doi.org/10.18231/j.ijlsit.2023.003
Panjun, S., Yi, W., Zongda, W., Zhaoxi, F., Qi, L., (2025), ‘A survey on privacy and security issues in IoT-based environments: Technologies, protection measures and future directions’, Computers & Security, Volume 148, January 2025, 104097, Elsevier, https://doi.org/10.1016/j.cose.2024.104097
Kumar, A., Kumar, R., Pandey, S.K., (2023), ‘Analysis of the Collection Development Policies: A Case Study of the Libraries of Kumaun University’, Indian Journal of Library Science. 2023;2(5):54–9. DOI: https://doi.org/10.18231/j.ijlsit.2023.003
Aliyu, M., Murali, M., Gital A., Boukari, S., Rumana, K., Maryam, A., Zambuk, Z., Caleb, C., Ibrahim, M., (2021). ‘A Multi-Tier Architecture for the Management of Supply Chain of Cloud Resources in a Virtualized Cloud Environment: A Novel SCM Technique for Cloud Resources Using Ant Colony Optimization and Spanning Tree’, International Journal of Information Systems and Supply Chain Management Volume 14 Issue 3, DOI: https://doi.org/10.4018/IJISSCM.2021070101
Aliyu, M., Murali, M., Gital, A. Y., Boukari, S., (2019), 'An Efficient Ant Colony Optimization Algorithm for Resource Provisioning in Cloud’, International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-4, DOI: https://doi.org/10.35940/ijrte.D6968.118419
Aliyu, M., Murali, M., Zhang, Z., Gital, A., Boukari, S., Huang, Y., Yakubu, I. (2021), ‘Management of Cloud Resources and Social Change in a Multi-Tier Environment: A Novel Finite Automata Using Ant Colony Optimization with Spanning Tree’. Technological Forecasting and Social Change, 166, 120591. DOI: https://doi.org/10.1016/j.techfore.2021.120591
Oukemeni, S., Rifà-pous, H., Manuel, J., and Puig, M., (2024), ‘Privacy Analysis on Microblogging Online Library Networks’, A Survey’, 52 (3) (2024) ACM Computing Surveys, 52(3), 1–36. DOI: https://doi.org/10.1145/3321481
Mu, C. (2024), ‘Application of Optimizing
Advanced Encryption Standard in Vehicle Controller Local Area Network Bus Secure Communication System’, Frontiers in Mechanical Engineering, 10, Article 1407665. DOI: https://doi.org/10.3389/fmech.2024.1407665
Bethencourt, J. & Sahai, B., (2023), ‘Ciphertext-Policy Attribute-Based Encryption’ In Proceedings of the IEEE Symposium on Security and Privacy (pp. 321–334). IEEE. DOI: https://doi.org/10.1109/SP.2007.11
Chingath, V., & Babu, R., (2020), 'Advantage of Blockchain Technology for the libraries', International Conference on DigitaI Transformation: A Cognitive Learning towards Artificial Intelligence, www.researchgate.net/publication/341725555_Advantage_Blockchain_Technology_for_the_Libraries
Ram, B., & Singh, K., (2020), ‘Innovative Library Services in Mobile Technology: A Recent approach’. Int J Inf Dissemination Technol. 2020; 10(4):192–4. DOI: https://doi.org/10.5958/2249-5576.2020.00035.7
Li, R., Chenglin, S., Heng, H., Zhiyong, X., & Cheng-Zhong, X., (2017), ‘A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing’, IEEE Transactions on Cloud Computing 7161 (c): 1–1. DOI: https://doi.org/10.1109/TCC.2017.2649685.
Fugkeaw, S., & Sato, H., (2018), ‘Enabling Dynamic and Efficient Data Access Control in Cloud Computing Based on Attribute Certificate Management and CP-ABE’, 2018 26th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), 454–61. DOI: https://doi.org/10.1109/PDP2018.2018.00079.
Starin, D., Baden, R., Bender, A., Spring, N., & Bhattacharjee, B., (2019), ‘Persona: An Online Network with User-Defined Privacy Categories and Subject Descriptors’, Sigcomm'09 (2019), pp. 135-146, DOI: https://doi.org/10.1145/1592568.1592585
Jahid, S., Prateek, M., & Nikita, B., (2021), ‘EASiER: Encryption-Based Access Control in Online Networks with Efficient Revocation’, Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2021, 411–15. DOI: https://doi.org/10.1145/1966913.1966970.
Shalini, D., Ganesh, K., & Swarnendu, K., (2024), 'Homographic Encryption Library, Framework, Toolkit, and Accelerator', SPRINGER journal, vol 5, article 24 DOI: https://doi.org/10.1007/s42979-023-02316-9
Ram, B., and Yadav, S., (2022), ‘Bibliometric Study of DESIDOC’ Journal of Library and Information Technology from 1981-2018’, Libr PhilosophyPract. 2022;p. 1–13. https://digitalcommons.unl.edu/libphilprac/7457/
Abdulla, A., & Bakiras, S. (2019). ‘HITC: Data Privacy in Online Social Networks with Fine-Grained Access Control. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (pp. 123–134). ACM. DOI: https://doi.org/10.1145/3322431.3325104
Wang, Z., Ma, Z., Luo, S., & Gao, H., (2018), ‘Enhanced Smart Library Security and Privacy Protection Scheme for Mobile Online Network Systems’, IEEE Access, 6 (2018), pp. 13706-13715, DOI: https://doi.org/10.1109/ACCESS.2018.2813432
Pozo, D., and Iturralde, M., (2023), ‘CI: A New Encryption Mechanism for Smart Library in Mobile Devices’, Procedia Computer Science, 63 (2023), pp. 533-558, DOI: https://doi.org/10.1016/j.procs.2022.08.381
Brenna, L., Isak, S., Havard, D., & Dag, J., (2022), ‘TFHE-re: A Library for Safe and Secure Remote Computing Using Fully Homomorphic Encryption and Trusted Execution Environments’, ScienceDirect, vol13, DOI: https://doi.org/10.1016/j.array.2021.100118
Halevi, S., & Polyakov, Y., (2019), ‘ An Improved RNS Variant of the BFV Homomorphic encryption Scheme in Cryptographers’, Track at the RSA Conference (pp83-105. Springer, Cham, 2019) DOI: https://doi.org/10.1007/978-3-030-12612-4_5
Omame, I., & Juliet, C., (2021), 'Application of Blockchain in Libraries and Information Systems’, Research gate .net, DOI: https://doi.org/10.1108/LHTN-02-2023-0020
Kayes, I., Lamnitchi, A., (2017), ‘Privacy and Security in SLMS Networks: A Survey’, Libraries and their Applications, 3 (2017), pp. 1-21, DOI: https://doi.org/10.1016/j.osnem.2017.09.001
Ramu, G. & Mishra, Z., (2019), ‘Hardware Implementation of Piccolo Encryption Algorithm for Constrained RFID Application’, In: 2019 9th Annual Information Technology, Electromechanical Engineering and Microelectronics Conference, IEEE, India, pp. 85-89, 2019. IEEE. DOI: https://doi.org/10.1109/IEMECONX.2019.8877071
Li, Y., Jiawen, Z., & Weina, F., (2022), ‘Intelligent Privacy Protection of End User in Long Distance Education’, Mobile Networks and Applications, no. February. DOI: https://doi.org/10.1007/s11036-022-01950-6.
Pujari, V., & Gadgay, B., (2023) ‘Smart Library System using IoT’. International Journal for Research in Applied Science and Engineering Technology, vol. 6, no. 7, pp. 471-476, DOI: https://doi.org/10.22214/ijraset.2018.7068
Mohammadi, M., Yegane, M., Library, C., & Branch, Q., (2023), ‘IOT: Applied New Technology in Academic Libraries’, In: International Conference on Distributed Computing and High-Performance Computing (DCHP 2023) 25th-27th November 2023, Qom, At University of Qom, Qom, pp. 1-12, 2023, https://www.researchgate.net/publication/333634140_IOT_Applied_New_Technology_in_Academic_Libraries
Philosophy, L., Kumar, R., & Kaliyaperumal, K., (2022), ‘Applications of GSM Technology for Documents Identification in a Library System’, International Journal of Academic Library and Information Science, vol. 2, no. 1, pp. 1-6, 2022, https://academicresearchjournals.org/IJALIS/PDF/2014/January/kumar%20and%20%20Kaliyaperumal.pdf
He, Z., Cai, Z., Han, Q., Tong, W., Sun, L., & Li, Y., (2016), ‘An Energy Efficient Privacy-Preserving Content Sharing Scheme in Smart Library Networks’, Personal and Ubiquitous Computing, 20 (5) (2016), pp. 833-846, DOI: https://doi.org/10.1007/s00779-016-0952-6
Churi, P. (2019). Performance Analysis of Data Encryption Algorithm. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 3, pp. 3230–3235). DOI: https://doi.org/10.35940/ijrte.c5775.098319
Bonde, S. Y., & Bhadade, U. S. (2019). Encryption Algorithm using Shuffled 2-Dimension Key. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 2, pp. 1105–1109). DOI: https://doi.org/10.35940/ijeat.a2236.129219
Subraja, K., Geetha, N., & Mahesh, Dr. K. (2020). BITS – A Novel Video Encryption Algorithm. In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 8, pp. 101–105). DOI: https://doi.org/10.35940/ijitee.h6196.069820