Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 11 , Issue 2 , PP: 27-35, 2023 | Cite this article as | XML | Html | PDF | Full Length Article

Securing Information Management in Collaborative Environments Using Machine Learning

Ahmed Hatip 1 * , Karla Zayood 2 , Rabah Scharif 3

  • 1 Gaziantep university, Turkey - (Kollnaar5@gmail.com)
  • 2 Online Islamic University, Department Of Science and Information Technology, Doha, Qatar - ( zayyyoood134@gmail.com)
  • 3 Applied Engineering Department, Institute of Applied Technology, UAE - (rabah.scharif@aths.ac.ae)
  • Doi: https://doi.org/10.54216/JCIM.110203

    Received: November 27, 2022 Revised: January 18, 2023 Accepted: March 09, 2023
    Abstract

    Recently, there has been a significant increase in the use of collaborative environments for managing and sharing information. However, these environments often present significant security risks due to the potential for unauthorized access, data leakage, and other security breaches. To address these risks, machine learning (ML) techniques have been increasingly used to secure information management in collaborative environments. We propose a novel ML approach to be applied to detect and prevent security threats in collaborative environments. Our approach integrates temporal convolution to detect and prevent security threats by analyzing spatial-temporal patterns in data from various sources, such as network traffic, system logs, and user behavior. Furthermore, we present a case study demonstrating the effectiveness of our model in securing collaborative information management. The case study involves the development of our system for detecting insider threats in a collaborative environment. Extensive experimentation on this case study demonstrates the efficiency and effectiveness of the proposed system for securing information management and promoting further developments.

    Keywords :

    Security Risks , Information Management , Collaborative Environments , Network Traffic , Machine Learning

    References

    [1]   Del Giudice, M. and Della Peruta, M.R., 2016. The impact of IT-based knowledge management systems on internal venturing and innovation: a structural equation modeling approach to corporate performance. Journal of Knowledge Management.

    [2]   Santoro, G., Vrontis, D., Thrassou, A. and Dezi, L., 2018. The Internet of Things: Building a knowledge management system for open innovation and knowledge management capacity. Technological forecasting and social change136, pp.347-354.

    [3]   Salmon, P.M., Stanton, N.A. and Jenkins, D.P., 2017. Distributed situation awareness: Theory, measurement and application to teamwork.

    [4]   Estrada, I., Faems, D. and de Faria, P., 2016. Coopetition and product innovation performance: The role of internal knowledge sharing mechanisms and formal knowledge protection mechanisms. Industrial Marketing Management, 53, pp.56-65.

    [5]   Yazdani, M., Chatterjee, P., Zavadskas, E.K., & Hashemkhani Zolfani, S. (2019). A novel integrated decision-making approach for the evaluation and selection of sustainable construction materials with unknown weights under neutrosophic environment. Sustainability, 11(5), 1317.

    [6]   Zafar, R., Mahmood, A., Razzaq, S., Ali, W., Naeem, U. and Shehzad, K., 2018. Prosumer based energy management and sharing in smart grid. Renewable and Sustainable Energy Reviews82, pp.1675-1684.

    [7]    Ben Hamida, E., Noura, H. and Znaidi, W., 2015. Security of cooperative intelligent transport systems: Standards, threats analysis and cryptographic countermeasures. Electronics4(3), pp.380-423.

    [8]   Soltani, Z. and Navimipour, N.J., 2016. Customer relationship management mechanisms: A systematic review of the state-of-the-art literature and recommendations for future research. Computers in Human Behavior61, pp.667-688.

    [9]   Meng, W., Tischhauser, E.W., Wang, Q., Wang, Y. and Han, J., 2018. When intrusion detection meets blockchain technology: a review. Ieee Access6, pp.10179-10188.

    [10]                       Guerrero-Ibáñez, J., Zeadally, S. and Contreras-Castillo, J., 2018. Sensor technologies for intelligent transportation systems. Sensors18(4), p.1212.

    [11]                       Lim, M.K., Tseng, M.L., Tan, K.H. and Bui, T.D., 2017. Knowledge management in sustainable supply chain management: Improving performance through an interpretive structural modelling approach. Journal of cleaner production162, pp.806-816.

    [12]                       Lu, Z., Qu, G. and Liu, Z., 2018. A survey on recent advances in vehicular network security, trust, and privacy. IEEE Transactions on Intelligent Transportation Systems20(2), pp.760-776.

    [13]                       Farris, I., Taleb, T., Khettab, Y. and Song, J., 2018. A survey on emerging SDN and NFV security mechanisms for IoT systems. IEEE Communications Surveys & Tutorials21(1), pp.812-837.

    [14]                       Hislop, D., Bosua, R. and Helms, R., 2018. Knowledge management in organizations: A critical introduction. Oxford university press.

    [15]                       Vasilomanolakis, E., Karuppayah, S., Mühlhäuser, M. and Fischer, M., 2015. Taxonomy and survey of collaborative intrusion detection. ACM Computing Surveys (CSUR)47(4), pp.1-33.

    [16]                       Zhang, P., Zhou, M. and Fortino, G., 2018. Security and trust issues in fog computing: A survey. Future Generation Computer Systems88, pp.16-27.

    [17]                       Nayeri, M.D., Torabi, S.A., & Tavakkoli-Moghaddam, R. (2021). A goal programming-based fuzzy best–worst method for the viable supply chain of perishable products. Soft Computing, 26, 1235–1255.

    [18]                       Lv, Z., Li, Y., Feng, H. and Lv, H., 2021. Deep learning for security in digital twins of cooperative intelligent transportation systems. IEEE transactions on intelligent transportation systems, 23(9), pp.16666-16675.

    [19]                       Hitaj, B., Ateniese, G. and Perez-Cruz, F., 2017, October. Deep models under the GAN: information leakage from collaborative deep learning. In Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 603-618).

    [20]                       Sarkar, A., & Srivastava, P. (2021). Recent development and applications of neutrosophic fuzzy sets: a review. Journal of Ambient Intelligence and Humanized Computing, 12, 865–888.

    [21]                       Zhang, Q., Zhong, H., Shi, W. and Liu, L., 2021. A trusted and collaborative framework for deep learning in IoT. Computer Networks, 193, p.108055.

    Cite This Article As :
    Hatip, Ahmed. , Zayood, Karla. , Scharif, Rabah. Securing Information Management in Collaborative Environments Using Machine Learning. Journal of Cybersecurity and Information Management, vol. , no. , 2023, pp. 27-35. DOI: https://doi.org/10.54216/JCIM.110203
    Hatip, A. Zayood, K. Scharif, R. (2023). Securing Information Management in Collaborative Environments Using Machine Learning. Journal of Cybersecurity and Information Management, (), 27-35. DOI: https://doi.org/10.54216/JCIM.110203
    Hatip, Ahmed. Zayood, Karla. Scharif, Rabah. Securing Information Management in Collaborative Environments Using Machine Learning. Journal of Cybersecurity and Information Management , no. (2023): 27-35. DOI: https://doi.org/10.54216/JCIM.110203
    Hatip, A. , Zayood, K. , Scharif, R. (2023) . Securing Information Management in Collaborative Environments Using Machine Learning. Journal of Cybersecurity and Information Management , () , 27-35 . DOI: https://doi.org/10.54216/JCIM.110203
    Hatip A. , Zayood K. , Scharif R. [2023]. Securing Information Management in Collaborative Environments Using Machine Learning. Journal of Cybersecurity and Information Management. (): 27-35. DOI: https://doi.org/10.54216/JCIM.110203
    Hatip, A. Zayood, K. Scharif, R. "Securing Information Management in Collaborative Environments Using Machine Learning," Journal of Cybersecurity and Information Management, vol. , no. , pp. 27-35, 2023. DOI: https://doi.org/10.54216/JCIM.110203