{"title":"Enhancing security in social computing systems through knowledge learning techniques","authors":"Anitha Rajesh , Ramamurthy DineshKumar , Saranya Shanmugam , Jaehyuk Cho , Sathishkumar Veerappampalayam Easwaramoorthy","doi":"10.1016/j.eij.2025.100675","DOIUrl":null,"url":null,"abstract":"<div><div>Social computing systems (SCS) integrate social behaviour with computational hardware to enable conversations among technologies and individuals. To protect the integrity of behavioural integration from illegal device communications, it is essential to ensure that security is maintained inside SCS. This study aims to provide a Coherent Authorization and Authentication Technique (CA2T) specifically designed to ensure the safety of SCS connections. CA2T uses various user credentials to approve interactions while guaranteeing that authentication is not replicated. Computed and behavioural data authentications are separated through knowledge-based learning to reduce the amount of security overheads. Credential verification that is adaptable and based on different calculation needs is the initial step in the device authorization process. After that, end-to-end authentication uses a lightweight signature based on two factors for verifying interactions between devices. The experimental findings show that when compared to the leading baseline approach, NTSC, CA2T reduces false positives by 9.48 %, computational overhead by 12.28 %, authentication time by 11.38 %, and failure rates by 11.48 %. With these improvements CA2T has emerged as much more effective than previous security frameworks for protecting SCS environments; it remains scalable, has minimal latency, and can adapt to new environments.</div></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":"30 ","pages":"Article 100675"},"PeriodicalIF":5.0000,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Egyptian Informatics Journal","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1110866525000684","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
Social computing systems (SCS) integrate social behaviour with computational hardware to enable conversations among technologies and individuals. To protect the integrity of behavioural integration from illegal device communications, it is essential to ensure that security is maintained inside SCS. This study aims to provide a Coherent Authorization and Authentication Technique (CA2T) specifically designed to ensure the safety of SCS connections. CA2T uses various user credentials to approve interactions while guaranteeing that authentication is not replicated. Computed and behavioural data authentications are separated through knowledge-based learning to reduce the amount of security overheads. Credential verification that is adaptable and based on different calculation needs is the initial step in the device authorization process. After that, end-to-end authentication uses a lightweight signature based on two factors for verifying interactions between devices. The experimental findings show that when compared to the leading baseline approach, NTSC, CA2T reduces false positives by 9.48 %, computational overhead by 12.28 %, authentication time by 11.38 %, and failure rates by 11.48 %. With these improvements CA2T has emerged as much more effective than previous security frameworks for protecting SCS environments; it remains scalable, has minimal latency, and can adapt to new environments.
期刊介绍:
The Egyptian Informatics Journal is published by the Faculty of Computers and Artificial Intelligence, Cairo University. This Journal provides a forum for the state-of-the-art research and development in the fields of computing, including computer sciences, information technologies, information systems, operations research and decision support. Innovative and not-previously-published work in subjects covered by the Journal is encouraged to be submitted, whether from academic, research or commercial sources.