Enhancing Privacy in the Management of Library Resources: A Novel Approach Utilizing FRS and ABE-CP Algorithm for Improved Protection
Muhammad Aliyu1, Lele Mohammed2
1Muhammad Aliyu, Department of Computer Science Engineering, School of Science and Technology, The Federal Polytechnic Bauchi, (Bauchi), Nigeria.
2Lele Mohammed, Department of Computer Science Engineering, School of Science and Technology, The Federal Polytechnic Bauchi, (Bauchi), Nigeria.
Manuscript received on 19 September 2024 | First Revised Manuscript received on 12 December 2024 | Second Revised Manuscript received on 31 December 2024 | Manuscript Accepted on 15 January 2025 | Manuscript published on 30 January 2025 | PP: 5-14 | Volume-12 Issue-1, January 2025 | Retrieval Number: 100.1/ijies.D815813041124 | DOI: 10.35940/ijies.D8158.12010125
Open Access | Editorial and Publishing Policies | Cite | Zenodo | OJS | SSRN | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Libraries contain sensitive resources that users can access. The vital challenges faced include unauthorized access, privacy violations, malicious attacks, etc. Researchers have explored several ways to curb these challenges including encryption, policies, anti-malware etc. An improved design to secure library resources based on Fragmentation Redundancy Scattering (FRS) and Attribute-Based Encryption CiphertextPolicy (ABE- CP) was presented. The core idea of FRS is to fragment confidential information to produce insignificant fragments and then scatter the pieces across the distributed system. As such, the scheme provides a new technique to manage network components and exchange encryption keys. By comparing the proposed scheme with other schemes, the proposed scheme prevents unauthorized access to users’ data and protects user’s privacy. The scheme in addition becomes resistant to common attacks like replay and man-in-the-middle. According to our findings, the scheme is safe, practicable, and comprehensive with high security for both encrypting and decrypting users’ data within the least possible time.
Keywords: Fine-grained Access Control, Library, Privacy, ABE-CP, FRS, Resources.
Scope of the Article: Recent Engineering & Technology