Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

A Lightweight Privacy Preserving Keyword Search Over Encrypted Data in Cloud Computing

Ibrahim Elhenawy , Salwa H. Mahmoud , Ahmed Moustafa

With the emerging development of cloud computing services, data owners outsource their documents to Cloud Service Providers (CSP) which could lead to threats related to security and privacy. Hence, protecting the privacy of user data and providing queries privacy becomes one of the main concerns of the data owner. One of the solutions for providing privacy and confidentiality of the outsourced data is encrypting it before sending it to the cloud. Although this solution satisfies data confidentiality and prevents the CSP from reading or modifying the data without the data owner's permission, it prevents the data owner to search the outsourced documents directly. Symmetric encryption algorithms e.g. AES have a searching limitation, in which the whole encrypted document needs to be retrieved from the CSP and then decrypt before performing the search procedure. To overcome this limitation, a lot of keyword-based search approaches have been done. These approaches allow users to retrieve just those documents contain special keywords. However, most of these approaches suffer from privacy and security problems and are based on high overhead asymmetric encryption algorithms. This paper proposes a privacy-preserving keyword search scheme for searching over encrypted data. To avoids the high computational cost of asymmetric encryption, the proposed scheme employs symmetric encryption and Bloom filter. Experimental results demonstrate that the proposed searchable encryption algorithm is secure and lightweight, and it has the ability to perform a keyword search over encrypted data without decrypting them. 

Read More

Doi: https://doi.org/10.54216/JCIM.030201

Vol. 3 Issue. 2 PP. 29-41, (2020)

PARUDroid: Validation of Android Malware Detection Dataset

Arvind Mahindru , A.L. Sangal

Android has gained its popularity due to its open nature and number of free apps in its play store. Till date, Android has captured 87% of the total market share. 2.8 million apps are present in the official market of Android. Android apps depend upon permissions for its proper functioning. This dataset contains distinct 5,60,142 Android apps that belong to thirty different categories. These Android application packages (.apk) is collected from Google-play store and other promised repositories. In this study, we performed a dynamic analysis of these collected .apk packages and extracted features, i.e., PARU (Permissions, API calls, Rating of an app, and Users download the app). As per the knowledge, this is the first dataset that extracted features by using the Android 6.0 (API 23) version as an Android operating system. The paper discusses the potential usefulness of the dataset for future research in the field of cybersecurity. Further, to check the potential of our dataset, in this research paper malware detection model is developed by using five different classification machine-learning algorithms. Experiment result reveals that model developed using Deep Neural Network (DNN) can able to detect 98.8% malware-infected apps. Dataset URL: http://dx.doi.org/10.17632/mg5c8jxbhm.2

Read More

Doi: https://doi.org/10.54216/JCIM.030202

Vol. 3 Issue. 2 PP. 42-52, (2020)

An investigation into the effect of cybersecurity on attack prevention strategies

Mohammed I. Alghamdi

Our economy, infrastructure and societies rely to a large extent on information technology and computer networks solutions. Increasing dependency on information technologies has also multiplied the potential hazards of cyber-attacks. The prime goal of this study is to critically examine how the sufficient knowledge of cyber security threats plays a vital role in detection of any intrusion in simple networks and preventing the attacks. The study has evaluated various literatures and peer reviewed articles to examine the findings obtained by consolidating the outcomes of different studies and present the final findings into a simplified solution. 

Read More

Doi: https://doi.org/10.54216/JCIM.030203

Vol. 3 Issue. 2 PP. 53-60, (2020)