Skip to main content
Nowadays, the use of XML database is expending. XML is designed to store and transport data. A large quantity of information is presented in XML format on the web for easy transportation. Due to the increased use of XML database over the... more
Nowadays, the use of XML database is expending. XML is designed to store and transport data. A large quantity of information is presented in XML format on the web for easy transportation. Due to the increased use of XML database over the web, the need to protect this database is vital. In a multiuser system, where the information is being shared across users who have different permissions, the need to implement a security model which gives controlled access to the authorized users is very important. XML access control was introduced to suit this purpose. XML access control is a security mechanism which restricts the access of the XML data to authorized users. Many access control models and enforcement mechanisms have been proposed to prevent the unauthorized release of XML data. Who can access which information under what circumstances is implemented based on the access control policies. A database is very significant where it contains sensitive data that have been coordinated and m...
In the present decade, there is the revival of interest to find the best way to query the database that able to provide not only a single answer, but also a set of answers that can be the most preferred by users .In many cases, the... more
In the present decade, there is the revival of interest to find the best way to query the database that able to provide not only a single answer, but also a set of answers that can be the most preferred by users .In many cases, the overflow of data generated from social media, and many other data stored and shared over the Internet makes the data access becoming near –infinite to the users. This has led to the need of intuitive formulation that able to provide the best choices from every unconceivable situation .Recently, the skyline computation has gained a lot of attention in the database research community for advanced queries semantic.The skyline query is introduced to be the syntax extension in SQL query to support multi-criteria data selection involving advanced queries. This paper surveys the techniques employed in initial algorithms of the skyline query processing .Some trade-offs about those different approaches are also identified throughout this study
The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we... more
The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users' bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.
The recent rapid proliferations of web based applications with databases at its back-end have further increased the risk of database exposure to the outside world. Nowadays, there are many reports on intrusion from external and internal... more
The recent rapid proliferations of web based applications with databases at its back-end have further increased the risk of database exposure to the outside world. Nowadays, there are many reports on intrusion from external and internal threats that compromised the database system. For that reason, it is important for us to provide protection for database systems from significant threats that comes from outside and inside the organizations. Currently, research on database security has been taken seriously as many solutions have emerged. All solutions should address the security elements that make up a lifecycle categorized into three areas which are prevention, detection and response mechanisms. This research focuses on the detection mechanism by deploying intrusion detection system (IDS) within the database management system (DBMS). The objective of this research is to propose a hybrid detection technique in order to cater external and internal threats which can provide protection ...
Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving... more
Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. The Blockchain technology is a nascent and a promising technology that facilitates data sharing and access in a secure, decentralized and trustless environment. The technology enables the use of smart contracts that can be leveraged to complement existing traditional systems to achieve security objectives that were never possible before. In this paper, we propose a framework based on Blockchain technology to enable privacy-preservation in a secured, decentralized, transparent and trustless environment. We name our framework SmartCoAuth. It is based on Ethereum Smart Contract functions as the secure, decentralized, transparent authentication a...
Protecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the secret information by concealing it in a transferred... more
Protecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the secret information by concealing it in a transferred object such as video, audio, image, text, network, or DNA. As text uses low bandwidth, it is commonly used by Internet users in their daily activities, resulting a vast amount of text messages sent daily as social media posts and documents. Accordingly, text is the ideal object to be used in steganography, since hiding a secret message in a text makes it difficult for the attacker to detect the hidden message among the massive text content on the Internet. Language’s characteristics are utilized in text steganography. Despite the richness of the Arabic language in linguistic characteristics, only a few studies have been conducted in Arabic text steganography. To draw further attention to Arabic text steganography prospects, this paper reviews the classi...
Research Interests:
Research Interests:
Cloud computing not only provides high availability on elastic resources, scalable, and cost-efficient. The platform is also widely used in information technology (IT) to support technology infrastructure and services. However, due to the... more
Cloud computing not only provides high availability on elastic resources, scalable, and cost-efficient. The platform is also widely used in information technology (IT) to support technology infrastructure and services. However, due to the complex environment and scalability of services, one of the highest security issues is malware attacks, where some of the antivirus scanner unable to detect metamorphic malware or encrypted malware where these kinds of malware able to bypass some traditional protection solution. This is why a high recognition rate and good precision detection are important to eliminate a high false-positive rate. Machine Learning (ML) classifiers are a critical role in artificial intelligent-system. However, machine learning will require to learn from the high amplitude of input data; classify then only able to generate a reliable model with a high detection rate. The objective of this work is to study and performs detection based on dynamic malware analysis and cl...
Web services are deployed using eXtensible Markup Language (XML), which is an independent language for easy transportation and storage. As an important transportation for data, Web services has become increasingly vulnerable to malicious... more
Web services are deployed using eXtensible Markup Language (XML), which is an independent language for easy transportation and storage. As an important transportation for data, Web services has become increasingly vulnerable to malicious attacks that could affect essential properties of information systems such as confidentiality, integrity, or availability. Like any other application that allows outside user submission data, Web services can be susceptible to code injection attacks, specifically XPath (XML Path Language) injection attacks. This kind of attack can cause serious damage to the database at the backend of Web services as well as the data within it. To cope with this attack, it is necessary to develop effective and efficient secure mechanism from various angles, outsider and insider. This thesis addresses both outsider and insider threats with respect to XPath injections in providing secure mechanism for XML database-centric Web services which yields the following signif...
The topic of security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML... more
The  topic  of  security  in  XML  databases  is
important  as  it  includes  protecting  sensitive  data  and
providing  a  secure  environment  to  users.  In  order  to
improve security and provide dynamic access control for
XML databases, we developed severity-aware trust-based
access  control  for  XML  databases.  Severity  aware  trust
based  access  control  for  XML  databases  manages  the
access  policy  depending  on  users'  trustworthiness  (trust
values)  and  prevents  unauthorized  processes,  malicious
transactions  and  insider  threats.  Privileges  are
automatically modified and adjusted over time depending
on  user  behaviour  and  query  severity.  In  this  paper,  a
severity-aware  trust-based  access  control  module  for
XML  databases  is  evaluated  in  term  of  security
perspectives. The experimental results illustrate the effect
of  severity  factor  to  the  calculation  of  Trust  values
compared to the existing work.
The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we... more
The topic of enhancing security in XML databases is
important as it includes protecting sensitive data and providing a
secure environment to users. In order to improve security and provide
dynamic access control for XML databases, we presented XLog file
to calculate user trust values by recording users’ bad transaction,
errors and query severities. Severity-aware trust-based access control
for XML databases manages the access policy depending on users'
trust values and prevents unauthorized processes, malicious
transactions and insider threats. Privileges are automatically modified
and adjusted over time depending on user behaviour and query
severity. Logging in database is an important process and is used for
recovery and security purposes. In this paper, the Xlog file is
presented as a dynamic and temporary log file for XML databases to
enhance the level of security.
Research Interests: