Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 11 , Issue 2 , PP: 27-35, 2023 | Cite this article as | XML | Html | PDF | Full Length Article

Securing Information Management in Collaborative Environments Using Machine Learning

Ahmed Hatip 1 * , Karla Zayood 2 , Rabah Scharif 3

  • 1 Gaziantep university, Turkey - (Kollnaar5@gmail.com)
  • 2 Online Islamic University, Department Of Science and Information Technology, Doha, Qatar - ( zayyyoood134@gmail.com)
  • 3 Applied Engineering Department, Institute of Applied Technology, UAE - (rabah.scharif@aths.ac.ae)
  • Doi: https://doi.org/10.54216/JCIM.110203

    Received: November 27, 2022 Revised: January 18, 2023 Accepted: March 09, 2023
    Abstract

    Recently, there has been a significant increase in the use of collaborative environments for managing and sharing information. However, these environments often present significant security risks due to the potential for unauthorized access, data leakage, and other security breaches. To address these risks, machine learning (ML) techniques have been increasingly used to secure information management in collaborative environments. We propose a novel ML approach to be applied to detect and prevent security threats in collaborative environments. Our approach integrates temporal convolution to detect and prevent security threats by analyzing spatial-temporal patterns in data from various sources, such as network traffic, system logs, and user behavior. Furthermore, we present a case study demonstrating the effectiveness of our model in securing collaborative information management. The case study involves the development of our system for detecting insider threats in a collaborative environment. Extensive experimentation on this case study demonstrates the efficiency and effectiveness of the proposed system for securing information management and promoting further developments.

    Keywords :

    Security Risks , Information Management , Collaborative Environments , Network Traffic , Machine Learning

    References

    [1]  Del Giudice, M. and Della Peruta, M.R., 2016. The impact of IT -based knowledge management systems on internal  venturing  and  innovation:  a  structural  equation  modeling  approach  to  corporate performance. Journal of Knowledge Management.

    [2]  Santoro, G., Vrontis, D., Thrassou, A. and Dezi, L., 2018. The Internet of Things: Building a knowledge management system for open innovation and knowledge management capacity. Technological forecasting and social change, 136, pp.347-354.

    [3]  Salmon, P.M., Stanton, N.A. and Jenkins, D.P., 2017. Distributed situation awareness: Theory, measurement and application to teamwork.

    [4]  Estrada, I., Faems, D. and de Faria, P., 2016. Coopetition and product innovation performance: The role o f internal knowledge sharing mechanisms and formal knowledge protection mechanisms.  Industrial Marketing Management, 53, pp.56-65.

    [5]  Abdullah Ali Salamai, Evaluation and Selection of Cloud Service: A neutrosophic model, Neutrosophic and Information Fusion, V ol. 1 , No. 2 , (2023) : 16-25 (Doi   :  https://doi.org/10.54216/NIF.010202)

    [6]  Zafar, R., Mahmood, A., Razzaq, S., Ali, W., Naeem, U. and Shehzad, K., 2018. Prosumer based energy management and sharing in smart grid. Renewable and Sustainable Energy Reviews, 82, pp.1675-1684.

    [7]   Ben  Hamida,  E.,  Noura,  H. and  Znaidi, W.,  2015.  Security  of  cooperative  intelligent  transport  systems: Standards, threats analysis and cryptographic countermeasures. Electronics, 4(3), pp.380-423.

    [8]  Soltani,  Z.  and  Navimipour,  N.J.,  2016.  Customer  relationship  management  mechanisms: A  systematic review  of  the  state-of-the-art  literature  and  recommendations  for  future  research. Computers  in  Human Behavior, 61, pp.667-688.

    [9]  Meng,  W.,  Tischhauser,  E.W.,  Wang,  Q.,  Wang,  Y.  and  Han,  J.,  2018.  When  intrusion  detection  meets blockchain technology: a review. Ieee Access, 6, pp.10179-10188. 

    [10]  Guerrero-Ibáñez, J., Zeadally, S. and Contreras-Castillo, J., 2018. Sensor technologies for intelligent transportation systems. Sensors, 18(4), p.1212.

    [11]  Lim, M.K., Tseng, M.L., Tan, K.H. and Bui, T.D., 2017. Knowledge management in sustainable supply  chain  management:  Improving  performance  through  an  interpretive  structural  modelling approach. Journal of cleaner production, 162, pp.806-816.

    [12]  Lu, Z., Qu, G. and Liu, Z., 2018. A survey on recent advances in vehicular network security, trust, and privacy. IEEE Transactions on Intelligent Transportation Systems, 20(2), pp.760-776.

    [13]  Farris, I., Taleb, T., Khettab, Y. and Song, J., 2018. A survey on emerging SDN and NFV security mechanisms for IoT systems. IEEE Communications Surveys & Tutorials, 21(1), pp.812-837.

    [14]  Hislop, D., Bosua, R. and Helms, R., 2018. Knowledge management in organizations: A critical introduction. Oxford university press.

    [15]  V asilomanolakis, E., Karuppayah, S., Mühlhäuser, M. and Fischer, M., 2015. Taxonomy and survey of collaborative intrusion detection. ACM Computing Surveys (CSUR), 47(4), pp.1-33.

    [16]  Zhang,  P.,  Zhou,  M.  and  Fortino,  G.,  2018.  Security  and  trust  issues  in  fog  computing:  A survey. Future Generation Computer Systems, 88, pp.16-27.

    [17]  Nada A. Nabeeh , Alshaimaa A. Tantawy, A Neutrosophic Model for Blockchain Platform Selection based on SWARA and WSM, Neutrosophic and Information Fusion, Vol. 1 , No. 2 , (2023) : 29-43 (Doi   :  https://doi.org/10.54216/NIF.010204)

    [18]  Lv, Z., Li, Y., Feng, H. and Lv, H., 2021. Deep learning for security in digital twins of cooperative intelligent transportation systems. IEEE transactions on intelligent transportation systems, 23(9), p p.16666-16675.

    [19]  Hitaj, B., Ateniese, G. and Perez-Cruz, F., 2017, October. Deep models under the GAN: information leakage from collaborative deep learning. In Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 603-618).

    [20]  Hadeer  Mahmoud  ,  Ahmed  Abdelhafeez,  Spherical  Fuzzy  Multi-Criteria  Decision-Making Approach for Risk Assessment of Natech, Neutrosophic and Information Fusion, Vol. 2 , No. 1 , (2023) : 59-68 (Doi : https://doi.org/10.54216/NIF.020105)

    [21]  Zhang, Q., Zhong, H., Shi, W. and Liu, L., 2021. A trusted and collaborative framework for deep learning in IoT. Computer Networks, 193, p.108055.

    Cite This Article As :
    Hatip, Ahmed. , Zayood, Karla. , Scharif, Rabah. Securing Information Management in Collaborative Environments Using Machine Learning. Journal of Cybersecurity and Information Management, vol. , no. , 2023, pp. 27-35. DOI: https://doi.org/10.54216/JCIM.110203
    Hatip, A. Zayood, K. Scharif, R. (2023). Securing Information Management in Collaborative Environments Using Machine Learning. Journal of Cybersecurity and Information Management, (), 27-35. DOI: https://doi.org/10.54216/JCIM.110203
    Hatip, Ahmed. Zayood, Karla. Scharif, Rabah. Securing Information Management in Collaborative Environments Using Machine Learning. Journal of Cybersecurity and Information Management , no. (2023): 27-35. DOI: https://doi.org/10.54216/JCIM.110203
    Hatip, A. , Zayood, K. , Scharif, R. (2023) . Securing Information Management in Collaborative Environments Using Machine Learning. Journal of Cybersecurity and Information Management , () , 27-35 . DOI: https://doi.org/10.54216/JCIM.110203
    Hatip A. , Zayood K. , Scharif R. [2023]. Securing Information Management in Collaborative Environments Using Machine Learning. Journal of Cybersecurity and Information Management. (): 27-35. DOI: https://doi.org/10.54216/JCIM.110203
    Hatip, A. Zayood, K. Scharif, R. "Securing Information Management in Collaborative Environments Using Machine Learning," Journal of Cybersecurity and Information Management, vol. , no. , pp. 27-35, 2023. DOI: https://doi.org/10.54216/JCIM.110203