Database is an important part in managing information, because a database is a collection of data that is processed to produce information. because of the importance of the database, many crimes are directed to attack the database, both attacks against access rights or attacks against the data itself. My SQL is a Database Management System (DBMS) that provides several facilities, one of which is the logging facility. Binary Log is a type of database log in the form of binary digits that contains some information including the record of the time of the transaction, the user who made the transaction and the order in the transaction. With the Binary Log, it can be seen when the transaction occurred, who made the transaction and what transaction occurred in the database. The recording of transactions in the Binary Log can be used as one way to carry out an investigation process in the event of an attack on the database. In this study the focus is on analyzing transaction records in binary logs, namely when, who, dam and what information can be taken from the Binary Log. The output of this research is a table of binary log investigation results and its relation to database attacks. Keywords— Binary Log, MySql, Database, Database Attack
{"title":"Binary Log Analysis on MySQL to Help Investigation Process Against Database Privillege Attacks","authors":"Siti Rokhmah, Ihsan Cahyo Utomo","doi":"10.29040/IJCIS.V1I1.7","DOIUrl":"https://doi.org/10.29040/IJCIS.V1I1.7","url":null,"abstract":"Database is an important part in managing information, because a database is a collection of data that is processed to produce information. because of the importance of the database, many crimes are directed to attack the database, both attacks against access rights or attacks against the data itself. My SQL is a Database Management System (DBMS) that provides several facilities, one of which is the logging facility. Binary Log is a type of database log in the form of binary digits that contains some information including the record of the time of the transaction, the user who made the transaction and the order in the transaction. With the Binary Log, it can be seen when the transaction occurred, who made the transaction and what transaction occurred in the database. The recording of transactions in the Binary Log can be used as one way to carry out an investigation process in the event of an attack on the database. In this study the focus is on analyzing transaction records in binary logs, namely when, who, dam and what information can be taken from the Binary Log. The output of this research is a table of binary log investigation results and its relation to database attacks. Keywords— Binary Log, MySql, Database, Database Attack","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43564791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-31DOI: 10.5121/ijcis.2020.10101
Arnold Mashud Abukari, E. K. Bankas, Mohammed Iddrisu Muniru
Cloud ERP is a new concept that has caught the attention of researchers and industry players. One of the major challenges towards migrating ERP data to cloud is security and confidentiality. A number of secret sharing schemes (SSS) have been proposed Mignote, Asmuth-Bloom, Shamir and Blakley but not without challenges. In this research we proposed an efficient threshold cryptography scheme to secure cloud ERP data. We modified the Asmuth-Bloom SSS and applied it to cloud ERP data.
{"title":"An Efficient Threshold Cryptography Scheme for Cloud ERP Data","authors":"Arnold Mashud Abukari, E. K. Bankas, Mohammed Iddrisu Muniru","doi":"10.5121/ijcis.2020.10101","DOIUrl":"https://doi.org/10.5121/ijcis.2020.10101","url":null,"abstract":"Cloud ERP is a new concept that has caught the attention of researchers and industry players. One of the major challenges towards migrating ERP data to cloud is security and confidentiality. A number of secret sharing schemes (SSS) have been proposed Mignote, Asmuth-Bloom, Shamir and Blakley but not without challenges. In this research we proposed an efficient threshold cryptography scheme to secure cloud ERP data. We modified the Asmuth-Bloom SSS and applied it to cloud ERP data.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46662205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-13DOI: 10.5204/ijcis.v13i1.1322
T. Mustonen, A. Lehtinen
This article studies the Evenki experiences and memories bound to past and present changes in their modes of living in Sakha-Yakutia. An endemic understanding of the community reflections on de-placing, or lived displacement, is advanced, both theoretically and empirically. The empirical part starts with a description of the Evenki traditions sustained in everyday life today. This is followed by a threefold reading of the Evenki reflections of displacement, focusing on 1) routines of brigades and obchinas, 2) transitions of traditions and place names and 3) disturbances due to industrial land-rule. The analysis is based on Evenki interviews in Yiengra between 2005-2020 and related empirical material gathered for the Evenki Atlas completed by the first of the authors of this article. A major result of the study is an in-depth Evenki view on the phases of displacement. In addition, the article demonstrates the value of endemic ethnography which favours research commitments that are both sensitive to epistemic differentiation and help in identifying the actual costs of forced and unruly de-placing.
{"title":"Lived displacement among the Evenki of Yiengra","authors":"T. Mustonen, A. Lehtinen","doi":"10.5204/ijcis.v13i1.1322","DOIUrl":"https://doi.org/10.5204/ijcis.v13i1.1322","url":null,"abstract":"This article studies the Evenki experiences and memories bound to past and present changes in their modes of living in Sakha-Yakutia. An endemic understanding of the community reflections on de-placing, or lived displacement, is advanced, both theoretically and empirically. The empirical part starts with a description of the Evenki traditions sustained in everyday life today. This is followed by a threefold reading of the Evenki reflections of displacement, focusing on 1) routines of brigades and obchinas, 2) transitions of traditions and place names and 3) disturbances due to industrial land-rule. The analysis is based on Evenki interviews in Yiengra between 2005-2020 and related empirical material gathered for the Evenki Atlas completed by the first of the authors of this article. A major result of the study is an in-depth Evenki view on the phases of displacement. In addition, the article demonstrates the value of endemic ethnography which favours research commitments that are both sensitive to epistemic differentiation and help in identifying the actual costs of forced and unruly de-placing.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47719903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-06DOI: 10.5204/ijcis.v12i2.1345
S. Gröschl
Using a case study approach, this article explores the role of the Jose Domingo de Obaldia maternity hospital in Western Panama, and its policies and practices for responding to the cultural differences between Panamanian hospital staff and pregnant Ngöble Buglé patients, and their different understanding of health and illness that has been shaped by principles of traditional medicine. Using a range of in-depth interviews with hospitality staff and management and intercultural interpreters, this study explores how cultural aspects and differences can be of a compound and complex nature, requiring strong intercultural understanding, awareness and cross-cultural dialogue. The case of the Ngöble Buglé illustrates how interculturalism can foster such cultural inclusiveness and cross-cultural dialogue, and how interculturalism can have implications for other Indigenous communities in Latin America, and for non-Indigenous communities facing increasingly cultural diverse environments and contexts.
本文采用案例研究的方法,探讨了巴拿马西部Jose Domingo de Obaldia妇产医院的作用,以及该医院应对巴拿马医院工作人员和怀孕的Ngöble Buglé患者之间文化差异的政策和做法,以及他们对传统医学原理塑造的健康和疾病的不同理解。本研究通过对酒店员工、管理层和跨文化口译员的一系列深入采访,探讨了文化方面和差异如何具有复合和复杂的性质,需要强大的跨文化理解、意识和跨文化对话。Ngöble Buglé的案例说明了跨文化主义如何促进这种文化包容性和跨文化对话,以及跨文化主义是如何对拉丁美洲的其他土著社区以及面临日益多样化的文化环境和背景的非土著社区产生影响的。
{"title":"Interculturalism as a means toward cultural inclusiveness and cross-cultural dialogue:","authors":"S. Gröschl","doi":"10.5204/ijcis.v12i2.1345","DOIUrl":"https://doi.org/10.5204/ijcis.v12i2.1345","url":null,"abstract":"Using a case study approach, this article explores the role of the Jose Domingo de Obaldia maternity hospital in Western Panama, and its policies and practices for responding to the cultural differences between Panamanian hospital staff and pregnant Ngöble Buglé patients, and their different understanding of health and illness that has been shaped by principles of traditional medicine. Using a range of in-depth interviews with hospitality staff and management and intercultural interpreters, this study explores how cultural aspects and differences can be of a compound and complex nature, requiring strong intercultural understanding, awareness and cross-cultural dialogue. The case of the Ngöble Buglé illustrates how interculturalism can foster such cultural inclusiveness and cross-cultural dialogue, and how interculturalism can have implications for other Indigenous communities in Latin America, and for non-Indigenous communities facing increasingly cultural diverse environments and contexts.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41636696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.5204/ijcis.v12i2.1276
Ranjan Datta
Although a great number of academic researchers have introduced reconciliation in their work, they have not explained what it means from Indigenous perspectives. How do we need to understand and practise it in oureveryday practice? Why should we all, both Indigenous and non-Indigenous, practise land-based and antiracist learning—as a system of reciprocal social relations and ethical practices—as a framework for reconciliation? This article initiates these transdisciplinary questions that challenge not only our static science and social science mindsets, but also the responsibilities for reconciliation, including building respectful relationships with Indigenous people, respecting Indigenous treaties, taking actions to decolonise our ways of knowing and acting, learning the role of colonised education processes, and protecting Indigenous land and environment rights.
{"title":"Indigenous Reconciliation: Why, What, and How","authors":"Ranjan Datta","doi":"10.5204/ijcis.v12i2.1276","DOIUrl":"https://doi.org/10.5204/ijcis.v12i2.1276","url":null,"abstract":"Although a great number of academic researchers have introduced reconciliation in their work, they have not explained what it means from Indigenous perspectives. How do we need to understand and practise it in oureveryday practice? Why should we all, both Indigenous and non-Indigenous, practise land-based and antiracist learning—as a system of reciprocal social relations and ethical practices—as a framework for reconciliation? This article initiates these transdisciplinary questions that challenge not only our static science and social science mindsets, but also the responsibilities for reconciliation, including building respectful relationships with Indigenous people, respecting Indigenous treaties, taking actions to decolonise our ways of knowing and acting, learning the role of colonised education processes, and protecting Indigenous land and environment rights.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44407815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays, highly constrained IoT devices have earned an important place in our everyday lives. These devices mainly comprise RFID (Radio-Frequency Identification) or WSN (Wireless Sensor Networks) components. Their adoption is growing in areas where data security or privacy or both must be guaranteed. Therefore, it is necessary to develop appropriate security solutions for these systems. Many papers have proposed solutions for encryption or authentication. But it turns out that sometimes the proposal has security flaw or is ill-suited for the constrained IoT devices (which has very limited processing and storage capacities).In this paper, we introduce a new authentication protocol inspired by Mirror-Mac (MM) which is a generic construction of authentication protocol proposed by Mol et al. Our proposal named RMAC is well suited for highly constrained IoT devices since its implementation uses simple and lightweight algorithms. We also prove that RMAC is at least as secure as the MM protocol and thus secure against man-in-the-middle attacks.
{"title":"RMAC - A Lightweight Authentication Protocol for Highly Constrained IoT Devices","authors":"Ahmad Khoureich Ka","doi":"10.5121/ijcis.2018.8301","DOIUrl":"https://doi.org/10.5121/ijcis.2018.8301","url":null,"abstract":"Nowadays, highly constrained IoT devices have earned an important place in our everyday lives. These \u0000devices mainly comprise RFID (Radio-Frequency Identification) or WSN (Wireless Sensor Networks) components. Their adoption is growing in areas where data security or privacy or both must be guaranteed. Therefore, it is necessary to develop appropriate security solutions for these systems. Many \u0000papers have proposed solutions for encryption or authentication. But it turns out that sometimes the proposal has security flaw or is ill-suited for the constrained IoT devices (which has very limited processing and storage capacities).In this paper, we introduce a new authentication protocol inspired by Mirror-Mac (MM) which is a generic construction of authentication protocol proposed by Mol et al. Our proposal named RMAC is well suited for highly constrained IoT devices since its implementation uses simple and lightweight algorithms. We also prove that RMAC is at least as secure as the MM protocol and thus secure against man-in-the-middle attacks.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1142/s0218843018920016
Jan Hess, Christian Reuter, V. Pipek, V. Wulf
{"title":"Erratum: \"Supporting End-User Articulations in Evolving Business Processes: A Case Study to Explore Intuitive Notations and Interaction Designs\"","authors":"Jan Hess, Christian Reuter, V. Pipek, V. Wulf","doi":"10.1142/s0218843018920016","DOIUrl":"https://doi.org/10.1142/s0218843018920016","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1142/s0218843018920016","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42343277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01Epub Date: 2018-07-03DOI: 10.1142/S0218843018500053
Hafiz Asif, Tanay Talukdar, Jaideep Vaidya, Basit Shafiq, Nabil Adam
Outlier detection is one of the most important data analytics tasks and is used in numerous applications and domains. The goal of outlier detection is to find abnormal entities that are significantly different from the remaining data. Often the underlying data is distributed across different organizations. If outlier detection is done locally, the results obtained are not as accurate as when outlier detection is done collaboratively over the combined data. However, the data cannot be easily integrated into a single database due to privacy and legal concerns. In this paper, we address precisely this problem. We first define privacy in the context of collaborative outlier detection. We then develop a novel method to find outliers from both horizontally partitioned and vertically partitioned categorical data in a privacy-preserving manner. Our method is based on a scalable outlier detection technique that uses attribute value frequencies. We provide an end-to-end privacy guarantee by using the differential privacy model and secure multiparty computation techniques. Experiments on real data show that our proposed technique is both effective and efficient.
{"title":"DIFFERENTIALLY PRIVATE OUTLIER DETECTION IN A COLLABORATIVE ENVIRONMENT.","authors":"Hafiz Asif, Tanay Talukdar, Jaideep Vaidya, Basit Shafiq, Nabil Adam","doi":"10.1142/S0218843018500053","DOIUrl":"https://doi.org/10.1142/S0218843018500053","url":null,"abstract":"<p><p>Outlier detection is one of the most important data analytics tasks and is used in numerous applications and domains. The goal of outlier detection is to find abnormal entities that are significantly different from the remaining data. Often the underlying data is distributed across different organizations. If outlier detection is done locally, the results obtained are not as accurate as when outlier detection is done collaboratively over the combined data. However, the data cannot be easily integrated into a single database due to privacy and legal concerns. In this paper, we address precisely this problem. We first define privacy in the context of collaborative outlier detection. We then develop a novel method to find outliers from both horizontally partitioned and vertically partitioned categorical data in a privacy-preserving manner. Our method is based on a scalable outlier detection technique that uses attribute value frequencies. We provide an end-to-end privacy guarantee by using the differential privacy model and secure multiparty computation techniques. Experiments on real data show that our proposed technique is both effective and efficient.</p>","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1142/S0218843018500053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"36902205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-23DOI: 10.1142/s0218843018990010
{"title":"Author Index Volume 27 (2018)","authors":"","doi":"10.1142/s0218843018990010","DOIUrl":"https://doi.org/10.1142/s0218843018990010","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2018-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49295525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abiodun O. Odedoyin, Helen O. Odukoya, Ayodeji O. Oluwatope
Modern cryptography targeted towards providing data confidentiality still pose some limitations. The security of public-key cryptography is based on unproven assumptions associated with the hardness /complicatedness of certain mathematical problems. However, public-key cryptography is not unconditionally secure: there is no proof that the problems on which it is based are intractable or even that their complexity is not polynomial. Therefore, public-key cryptography is not immune to unexpectedly strong computational power or better cryptanalysis techniques. The strength of modern cryptography is being weakened and with advances of big data, could gradually be suppressed. Moreover, most of the currently used public-key cryptographic schemes could be cracked in polynomial time with a quantum computer. This paper presents a renewed focus in fortifying the confidentiality of big data by proposing a quantum-cryptographic protocol. A framework was constructed for realizing the protocol, considering some characteristics of big data and conceptualized using defined propositions and theorems.
{"title":"A Quantum Cryptography Protocol for Access Control in Big Data","authors":"Abiodun O. Odedoyin, Helen O. Odukoya, Ayodeji O. Oluwatope","doi":"10.5121/ijcis.2018.8201","DOIUrl":"https://doi.org/10.5121/ijcis.2018.8201","url":null,"abstract":"Modern cryptography targeted towards providing data confidentiality still pose some limitations. The security of public-key cryptography is based on unproven assumptions associated with the hardness /complicatedness of certain mathematical problems. However, public-key cryptography is not unconditionally secure: there is no proof that the problems on which it is based are intractable or even that their complexity is not polynomial. Therefore, public-key cryptography is not immune to unexpectedly strong computational power or better cryptanalysis techniques. The strength of modern cryptography is being weakened and with advances of big data, could gradually be suppressed. Moreover, most of the currently used public-key cryptographic schemes could be cracked in polynomial time with a quantum computer. This paper presents a renewed focus in fortifying the confidentiality of big data by proposing a quantum-cryptographic protocol. A framework was constructed for realizing the protocol, considering some characteristics of big data and conceptualized using defined propositions and theorems.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}