Enhancing Privacy in the Management of Library Resources: A Novel Approach Utilizing FRS and ABE-CP Algorithm for Improved Protection
Muhammad Aliyu1, Lele Mohammed2
1Muhammad Aliyu, Department of Computer Science Engineering, School of Science and Technology, The Federal Polytechnic Bauchi, (Bauchi), Nigeria.
2Lele Mohammed, Department of Computer Science Engineering, School of Science and Technology, The Federal Polytechnic Bauchi, (Bauchi), Nigeria.
Manuscript received on 19 September 2024 | First Revised Manuscript received on 12 December 2024 | Second Revised Manuscript received on 31 December 2024 | Manuscript Accepted on 15 January 2025 | Manuscript published on 30 January 2025 | PP: 5-14 | Volume-12 Issue-1, January 2025 | Retrieval Number: 100.1/ijies.D815813041124 | DOI: 10.35940/ijies.D8158.12010125
Open Access | Editorial and Publishing Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Libraries contain sensitive resources that users can access. The vital challenges faced include unauthorised access, privacy violations, and malicious attacks, among others. Researchers have explored several methods to address these challenges, including encryption, policies, and anti-malware solutions. An improved design for securing library resources based on Fragmentation Redundancy Scattering (FRS) and Attribute-Based Encryption with Ciphertext-Policy (ABE-CP) was presented. The core idea of FRS is to fragment confidential information into insignificant fragments and then scatter these pieces across the distributed system. As such, the scheme offers a novel approach to managing network components and exchanging encryption keys. By comparing the proposed scheme with other schemes, it becomes evident that the proposed scheme prevents unauthorised access to users’ data and protects users’ privacy. The scheme also becomes resistant to common attacks, such as replay and man-in-the-middle. According to our findings, the scheme is safe, practical, and comprehensive, offering high security for both encrypting and decrypting users’ data within the shortest possible time.
Keywords: Fine-grained Access Control, Library, Privacy, ABE-CP, FRS, Resources.
Scope of the Article: Recent Engineering & Technology