{"title":"Modified Attribute-Based Authentication for Multi-Agent Systems","authors":"Gülnihal ÖZTÜRK, Nurdan SARAN, Ali DOĞANAKSOY","doi":"10.55859/ijiss.1294580","DOIUrl":"https://doi.org/10.55859/ijiss.1294580","url":null,"abstract":"Attribute-Based Encryption (ABE) is a type of authentication mechanism that validates both the users and their attributes. It is practical for the systems that need authorization according to credentials. In a multi-agent system, specifying an access policy within the user groups is crucial to enable authentic and confidential communication. This paper proposes an attribute-based authentication framework based on elliptic curves to provide privacy in multi-agent systems. In this system, we aim to alleviate the required burden of verification by ensuring that each unit verifies only a small amount of messages. Inspired by Zhang et al. [1], we use ABE for the multi-agent system to authenticate more than one user at a time; our scheme uses elliptic curve groups, unlike Zhang et al. We have thoroughly evaluated the various security attributes and discussed computational overheads for our proposed scheme.","PeriodicalId":499704,"journal":{"name":"International Journal of Information Security Science","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136279145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High Dimensional Quantum Digital Signature Depending on Entanglement Swapping","authors":"Arzu AKTAŞ, İhsan YILMAZ","doi":"10.55859/ijiss.1294840","DOIUrl":"https://doi.org/10.55859/ijiss.1294840","url":null,"abstract":"While a single qubit information can be carried with a single photon in 2−dimensional quantum technology, it is possible to carry more than one qubit information with a single photon in high-dimensional quantum technologies. The amount of qubit to be transported depends on the size of the system obtained in the high dimension. In other words, the more high-dimensional quantum structure it creates, the more qubit-carrying system is obtained. In this study, a high dimensional quantum digital signature(QDS) scheme is proposed for multi-partied by using entanglement swapping and super-dense coding. QDS, which is proposed as highdimensional, allows more data and high-rate keys to be transferred. Security analysis of propesed QDS in high-dimensional show that the propablity of anyone obtaining information is much lower than in qubit states. Since all data(quantum and classic) in this protocol is instantly sent by using entanglement channels it is more resilient eavesdropping attacks. Today, developments in highdimensional experimental studies show that the high-dimensional QDS proposed in this study can be implemented practically.","PeriodicalId":499704,"journal":{"name":"International Journal of Information Security Science","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136279152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lambda Architecture-Based Big Data System for Large-Scale Targeted Social Engineering Email Detection","authors":"Mustafa Umut DEMİREZEN, Tuğba SELCEN NAVRUZ","doi":"10.55859/ijiss.1338813","DOIUrl":"https://doi.org/10.55859/ijiss.1338813","url":null,"abstract":"In this research, we delve deep into the realm of Targeted Social Engineering Email Detection, presenting a novel approach that harnesses the power of Lambda Architecture (LA). Our innovative methodology strategically segments the BERT model into two distinct components: the embedding generator and the classification segment. This segmentation not only optimizes resource consumption but also improves system efficiency, making it a pioneering step in the field. Our empirical findings, derived from a rigorous comparison between the fastText and BERT models, underscore the superior performance of the latter. Specifically, The BERT model has high precision rates for identifying malicious and benign emails, with impressive recall values and F1 scores. Its overall accuracy rate was 0.9988, with a Matthews Correlation Coefficient value of 0.9978. In comparison, the fastText model showed lower precision rates. Leveraging principles reminiscent of the Lambda architecture, our study delves into the performance dynamics of data processing models. The Separated-BERT (Sep-BERT) model emerges as a robust contender, adept at managing both real-time (stream) and large-scale (batch) data processing. Compared to the traditional BERT, Sep-BERT showcased superior efficiency, with reduced memory and CPU consumption across diverse email sizes and ingestion rates. This efficiency, combined with rapid inference times, positions Sep-BERT as a scalable and cost-effective solution, aligning well with the demands of Lambda- inspired architectures. This study marks a significant step forward in the fields of big data and cybersecurity. By introducing a novel methodology and demonstrating its efficacy in detecting targeted social engineering emails, we not only advance the state of knowledge in these domains but also lay a robust foundation for future research endeavors, emphasizing the transformative potential of integrating advanced big data frameworks with machine learning models.","PeriodicalId":499704,"journal":{"name":"International Journal of Information Security Science","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136279260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}