Volume 11 , Issue 2 , PP: 27-35, 2023 | Cite this article as | XML | Html | PDF | Full Length Article
Ahmed Hatip 1 * , Karla Zayood 2 , Rabah Scharif 3
Doi: https://doi.org/10.54216/JCIM.110203
Recently, there has been a significant increase in the use of collaborative environments for managing and sharing information. However, these environments often present significant security risks due to the potential for unauthorized access, data leakage, and other security breaches. To address these risks, machine learning (ML) techniques have been increasingly used to secure information management in collaborative environments. We propose a novel ML approach to be applied to detect and prevent security threats in collaborative environments. Our approach integrates temporal convolution to detect and prevent security threats by analyzing spatial-temporal patterns in data from various sources, such as network traffic, system logs, and user behavior. Furthermore, we present a case study demonstrating the effectiveness of our model in securing collaborative information management. The case study involves the development of our system for detecting insider threats in a collaborative environment. Extensive experimentation on this case study demonstrates the efficiency and effectiveness of the proposed system for securing information management and promoting further developments.
Security Risks , Information Management , Collaborative Environments , Network Traffic , Machine Learning
[1] Del Giudice, M. and Della Peruta, M.R., 2016. The impact of IT -based knowledge management systems on internal venturing and innovation: a structural equation modeling approach to corporate performance. Journal of Knowledge Management.
[2] Santoro, G., Vrontis, D., Thrassou, A. and Dezi, L., 2018. The Internet of Things: Building a knowledge management system for open innovation and knowledge management capacity. Technological forecasting and social change, 136, pp.347-354.
[3] Salmon, P.M., Stanton, N.A. and Jenkins, D.P., 2017. Distributed situation awareness: Theory, measurement and application to teamwork.
[4] Estrada, I., Faems, D. and de Faria, P., 2016. Coopetition and product innovation performance: The role o f internal knowledge sharing mechanisms and formal knowledge protection mechanisms. Industrial Marketing Management, 53, pp.56-65.
[5] Abdullah Ali Salamai, Evaluation and Selection of Cloud Service: A neutrosophic model, Neutrosophic and Information Fusion, V ol. 1 , No. 2 , (2023) : 16-25 (Doi : https://doi.org/10.54216/NIF.010202)
[6] Zafar, R., Mahmood, A., Razzaq, S., Ali, W., Naeem, U. and Shehzad, K., 2018. Prosumer based energy management and sharing in smart grid. Renewable and Sustainable Energy Reviews, 82, pp.1675-1684.
[7] Ben Hamida, E., Noura, H. and Znaidi, W., 2015. Security of cooperative intelligent transport systems: Standards, threats analysis and cryptographic countermeasures. Electronics, 4(3), pp.380-423.
[8] Soltani, Z. and Navimipour, N.J., 2016. Customer relationship management mechanisms: A systematic review of the state-of-the-art literature and recommendations for future research. Computers in Human Behavior, 61, pp.667-688.
[9] Meng, W., Tischhauser, E.W., Wang, Q., Wang, Y. and Han, J., 2018. When intrusion detection meets blockchain technology: a review. Ieee Access, 6, pp.10179-10188.
[10] Guerrero-Ibáñez, J., Zeadally, S. and Contreras-Castillo, J., 2018. Sensor technologies for intelligent transportation systems. Sensors, 18(4), p.1212.
[11] Lim, M.K., Tseng, M.L., Tan, K.H. and Bui, T.D., 2017. Knowledge management in sustainable supply chain management: Improving performance through an interpretive structural modelling approach. Journal of cleaner production, 162, pp.806-816.
[12] Lu, Z., Qu, G. and Liu, Z., 2018. A survey on recent advances in vehicular network security, trust, and privacy. IEEE Transactions on Intelligent Transportation Systems, 20(2), pp.760-776.
[13] Farris, I., Taleb, T., Khettab, Y. and Song, J., 2018. A survey on emerging SDN and NFV security mechanisms for IoT systems. IEEE Communications Surveys & Tutorials, 21(1), pp.812-837.
[14] Hislop, D., Bosua, R. and Helms, R., 2018. Knowledge management in organizations: A critical introduction. Oxford university press.
[15] V asilomanolakis, E., Karuppayah, S., Mühlhäuser, M. and Fischer, M., 2015. Taxonomy and survey of collaborative intrusion detection. ACM Computing Surveys (CSUR), 47(4), pp.1-33.
[16] Zhang, P., Zhou, M. and Fortino, G., 2018. Security and trust issues in fog computing: A survey. Future Generation Computer Systems, 88, pp.16-27.
[17] Nada A. Nabeeh , Alshaimaa A. Tantawy, A Neutrosophic Model for Blockchain Platform Selection based on SWARA and WSM, Neutrosophic and Information Fusion, Vol. 1 , No. 2 , (2023) : 29-43 (Doi : https://doi.org/10.54216/NIF.010204)
[18] Lv, Z., Li, Y., Feng, H. and Lv, H., 2021. Deep learning for security in digital twins of cooperative intelligent transportation systems. IEEE transactions on intelligent transportation systems, 23(9), p p.16666-16675.
[19] Hitaj, B., Ateniese, G. and Perez-Cruz, F., 2017, October. Deep models under the GAN: information leakage from collaborative deep learning. In Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 603-618).
[20] Hadeer Mahmoud , Ahmed Abdelhafeez, Spherical Fuzzy Multi-Criteria Decision-Making Approach for Risk Assessment of Natech, Neutrosophic and Information Fusion, Vol. 2 , No. 1 , (2023) : 59-68 (Doi : https://doi.org/10.54216/NIF.020105)
[21] Zhang, Q., Zhong, H., Shi, W. and Liu, L., 2021. A trusted and collaborative framework for deep learning in IoT. Computer Networks, 193, p.108055.