Repository logo
  • Log In
Repository logo
  • Communities & Collections
  • All of DORA
  • Log In
  1. Home
  2. Browse by Author

Browsing by Author "Sadiq, Ali Safaa"

Now showing 1 - 3 of 3
Results Per Page
Sort Options
  • No Thumbnail Available
    ItemMetadata only
    Comprehensive Review of Cybercrime Detection Techniques
    (IEEE, 2020-07-22) Ahmed, Abdulghani Ali; Al-Khater, Wadha Abdullah; Al-Maadeed, Somaya; Sadiq, Ali Safaa; Khan, Muhammad Khurram
    Cybercrimes are cases of indictable offences and misdemeanors that involve computers or communication tools as targets and commission instruments or are associated with the prevalence of computer technology. Common forms of cybercrimes are child pornography, cyberstalking, identity theft, cyber laundering, credit card theft, cyber terrorism, drug sale, data leakage, sexually explicit content, phishing, and other forms of cyber hacking. They mostly lead to a privacy breach, security violation, business loss, financial fraud, or damage in public and government properties. Thus, this study intensively reviews cybercrime detection and prevention techniques. It first explores the different types of cybercrimes and discusses their threats against privacy and security in computer systems. Then, it describes the strategies that cybercriminals may utilize in committing these crimes against individuals, organizations, and societies. It also reviews the existing techniques of cybercrime detection and prevention. It objectively discusses the strengths and critically analyzes the vulnerabilities of each technique. Finally, it provides recommendations for the development of a cybercrime detection model that can detect cybercrimes effectively compared with the existing techniques.
  • Loading...
    Thumbnail Image
    ItemOpen Access
    Dynamic Reciprocal Authentication Protocol for Mobile Cloud Computing
    (IEEE, 2020-08-31) Ahmed, Abdulghani Ali; Wendy, Kwan; Kabir, Muhammad Nomani; Sadiq, Ali Safaa
    A combination of mobile and cloud computing delivers many advantages such as mobility, resources, and accessibility through seamless data transmission via the Internet anywhere at any time. However, data transmission through vulnerable channels poses security threats such as man-in-the-middle, playback, impersonation, and asynchronization attacks. To address these threats, we define an explicit security model that can precisely measure the practical capabilities of an adversary. A systematic methodology consisting of 16 evaluation criteria is used for comparative evaluation, thereby leading other approaches to be evaluated through a common scale. Finally, we propose a dynamic reciprocal authentication protocol to secure data transmission in mobile cloud computing (MCC). In particular, our proposed protocol develops a secure reciprocal authentication method, which is free of Diffie–Hellman limitations, and has immunity against basic or sophisticated known attacks. The protocol utilizes multifactor authentication of usernames, passwords, and a one-time password (OTP). The OTP is automatically generated and regularly updated for every connection. The proposed protocol is implemented and tested using Java to demonstrate its efficiency in authenticating communications and securing data transmitted in the MCC environment. Results of the evaluation process indicate that compared with the existing works, the proposed protocol possesses obvious capabilities in security and in communication and computation costs.
  • Loading...
    Thumbnail Image
    ItemOpen Access
    Slicing-based enhanced method for privacy-preserving in publishing big data
    (Tech Science Press, 2022-03-29) BinJubier, Mohammed; Ismail, Mohd Arfian; Ahmed, Abdulghani Ali; Sadiq, Ali Safaa
    Publishing big data and making it accessible to researchers is important for knowledge building as it helps in applying highly efficient methods to plan, conduct, and assess scientific research. However, publishing and processing big data poses a privacy concern related to protecting individuals’ sensitive information while maintaining the usability of the published data. Several anonymization methods, such as slicing and merging, have been designed as solutions to the privacy concerns for publishing big data. However, the major drawback of merging and slicing is the random permutation procedure, which does not always guarantee complete protection against attribute or membership disclosure. Moreover, merging procedures may generate many fake tuples, leading to a loss of data utility and subsequent erroneous knowledge extraction. This study therefore proposes a slicing-based enhanced method for privacy-preserving big data publishing while maintaining the data utility. In particular, the proposed method distributes the data into horizontal and vertical partitions. The lower and upper protection levels are then used to identify the unique and identical attributes’ values. The unique and identical attributes are swapped to ensure the published big data is protected from disclosure risks. The outcome of the experiments demonstrates that the proposed method could maintain data utility and provide stronger privacy preservation.
Quick Links
  • De Montfort University Home
  • Library Learning Services
  • DMU Figshare (DMU's Data Repository)
Useful Links
  • Submission Guide
  • DMU Open Access Libguide
  • Take Down Policy
  • Connect with DORA

Kimberlin Library

De Montfort University
The Gateway
Leicester, LE1 9BH
0116 257 7042
justask@dmu.ac.uk

DSpace software copyright © 2002-2025 LYRASIS

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback