Papers by Vincent Amankona
Several attempts to incorporate temporal extensions into the Structured Query Language, SQL, one ... more Several attempts to incorporate temporal extensions into the Structured Query Language, SQL, one of the most popular query languages for databases date back to the nineteenth and twentieth century. Although a lot of work and research has been done on temporal databases and SQL, there exist very limited literature clearly outlining the various events which have taken place with regards to temporal extensions of SQL over the years till the present state in a concise document. Consequently, researchers need to gather several pieces of literature before they can obtain a vivid pictorial timeline of the history and the current state of these temporal extensions for research and software development purposes. In order to align current research with that from the past, there is the need for a consolidation of information. In this paper, we seek to present the past and current state of temporal support in relational databases and also describe the various attempts and proposals to introduce...
2021 International Conference on Electrical, Computer and Energy Technologies (ICECET), 2021
Technology has changed how services are provided and activities are performed in today's worl... more Technology has changed how services are provided and activities are performed in today's world. The increased usage of technology has resulted in the development of hardware and software-based solutions. The healthcare industry, which cannot be left out, also uses these hardware and software-based solutions to perform activities and provide services. Some African countries have also adopted these solutions to provide healthcare to their citizens. The reliance on technology requires the tackling of security and privacy issues. As a developing continent with fragile health systems, adopting e-health presents numerous security and privacy concerns that must be addressed. Privacy by Design, which is regarded as a privacy protection paradigm, is critical for African countries that want to or have already adopted e-health. Therefore, the adoption of e-health necessitates the implementation of Privacy by Design to mitigate security and privacy incidents. In this study, we propose a Privacy by Design framework for e-health. The framework consists of the following components: management, people, technology, and users. The proposed framework is intended to improve privacy by design procedures when implementing e-health. This framework would ensure to improve privacy protection as well as information security. Integrating privacy by design into e-health will improve the handling of security and privacy incidents while also protecting personal data and privacy.
International Journal of Advanced Computer Science and Applications
The utilization of the internet within organizations has surged over the past decade. Though, it ... more The utilization of the internet within organizations has surged over the past decade. Though, it has numerous benefits, the internet also comes with its own challenges such as intrusions and threats. Bring Your Own Device (BYOD) as a growing trend among organizations allow employees to connect their portable devices such as smart phones, tablets, laptops, to the organization’s network to perform organizational duties. It has gained popularity over the years because of its flexibility and cost effectiveness. This adoption of BYOD has exposed organizations to security risks and demands proactive measures to mitigate such incidents. In this study, we propose a Digital Forensic Readiness (DFR) framework for BYOD using honeypot technology. The framework consists of the following components: BYOD devices, Management, People, Technology and DFR. It is designed to comply with ISO/IEC 27043, detect security incidents/threats and collect potential digital evidence using lowand high-level inte...
2021 International Conference on Electrical, Computer and Energy Technologies (ICECET), 2021
Every firm survives on data, which is an essential resource. In our contemporaries, it is not jus... more Every firm survives on data, which is an essential resource. In our contemporaries, it is not just the possession of the data that is crucial but the protection that can be offered to ensure its safety and utilization. This study presents the application of Reed Solomon error-correcting coding scheme and two variants of elliptic curve cryptosystems, namely: Elliptic Curve Integrated Encryption Scheme and Fast Elliptic Curve Digital Signature Algorithm to improve the integrity and confidentiality of data. A data protection framework that combines both encryption and encoding schemes to offer integrity and confidentiality to data. The framework draws on the strengths of both encryption and encoding schemes to secure medium and protect data in transit and at storage. The protection scheme obfuscates and signs data in transit by using the Elliptic Curve Cryptographic algorithms to prevent unauthorized access and modification. The Reed Solomon encoding scheme is utilized to correct any corrupted data, in order to maintain the integrity of data.
International Research Journal of Engineering and Technology (IRJET), 2017
Cloud computing (CC) is a set of services that provide infrastructure resources using internet me... more Cloud computing (CC) is a set of services that provide infrastructure resources using internet media and data storage on a third party server. SMEs are said to be the lifeblood of any vibrant economy. They are known to be the silent drivers of a nation's economy. This paper seeks ascertain how SMEs could adopt this new revolutionary to its operations. If SMEs have access to scalable, on demand and robust technologies they could possibly deliver products and services that in the past only large enterprises could deliver, levelling the competitive field. By adopting the Technological, Organizational and Environmental (TOE) framework as a theoretical base, this research will use quantitative exploratory study by closed-questionnaires to collect data from 25 SMEs in the Ghana. The study ascertained that though some SMEs have basic knowledge of the ICT infrastructure yet they are a bit skeptical about adopting this revolutionary in IT world due to inherent security issues and limited knowledge about the prospects that CC offers them. Therefore, the study recommends IT players to engage and make the term a home buzz word as it offers a competitive edge to SMEs.
International Research Journal of Engineering and Technology (IRJET), 2017
Several attempts to incorporate temporal extensions into the Structured Query Language, SQL, one ... more Several attempts to incorporate temporal extensions into the Structured Query Language, SQL, one of the most popular query languages for databases date back to the nineteenth and twentieth century. Although a lot of work and research has been done on temporal databases and SQL, there exist very limited literature clearly outlining the various events which have taken place with regards to temporal extensions of SQL over the years till the present state in a concise document. Consequently, researchers need to gather several pieces of literature before they can obtain a vivid pictorial timeline of the history and the current state of these temporal extensions for research and software development purposes. In order to align current research with that from the past, there is the need for a consolidation of information. In this paper, we seek to present the past and current state of temporal support in relational databases and also describe the various attempts and proposals to introduce temporal extensions into SQL over the years, discuss their level of success and impact on the most recent SQL standard. We also identify desirable temporal features which have not yet been introduced into any of the SQL standards and also determine the level of acceptance of the available SQL temporal extensions by some commercial database management system vendors.
Journal of Digital Forensics, Security and Law, 2021
The utilization of the internet within organizations has surged over the past decade. Though, it ... more The utilization of the internet within organizations has surged over the past decade. Though, it has numerous benefits, the internet also comes with its own challenges such as intrusions and threats. Bring Your Own Device (BYOD) as a growing trend among organizations allow employees to connect their portable devices such as smart phones, tablets, laptops, to the organization's network to perform organizational duties. It has gained popularity over the years because of its flexibility and cost effectiveness. This adoption of BYOD has exposed organizations to security risks and demands proactive measures to mitigate such incidents. In this study, we propose a Digital Forensic Readiness (DFR) framework for BYOD using honeypot technology. The framework consists of the following components: BYOD devices, Management, People, Technology and DFR. It is designed to comply with ISO/IEC 27043, detect security incidents/threats and collect potential digital evidence using low-and high-level interaction honeypots. Besides, the framework proffers adequate security support to the organization through space isolation, device management, crypto operations, and policies database. This framework would ensure and improve information security as well as securely preserve digital evidence. Embedding DFR into BYOD will improve security and enable an organization to stay abreast when handling a security incident.
Conference Presentations by Vincent Amankona
IEEE, 2021
Every firm survives on data, which is an essential resource. In our contemporaries, it is not jus... more Every firm survives on data, which is an essential resource. In our contemporaries, it is not just the possession of the data that is crucial but the protection that can be offered to ensure its safety and utilization. This study presents the application of Reed Solomon error-correcting coding scheme and two variants of elliptic curve cryptosystems, namely: Elliptic Curve Integrated Encryption Scheme and Fast Elliptic Curve Digital Signature Algorithm to improve the integrity and confidentiality of data. A data protection framework that combines both encryption and encoding schemes to offer integrity and confidentiality to data. The framework draws on the strengths of both encryption and encoding schemes to secure medium and protect data in transit and at storage. The protection scheme obfuscates and signs data in transit by using the Elliptic Curve Cryptographic algorithms to prevent unauthorized access and modification. The Reed Solomon encoding scheme is utilized to correct any corrupted data, in order to maintain the integrity of data.
IEEE, 2021
Technology has changed how services are provided and activities are performed in today's world. T... more Technology has changed how services are provided and activities are performed in today's world. The increased usage of technology has resulted in the development of hardware and software-based solutions. The healthcare industry, which cannot be left out, also uses these hardware and software-based solutions to perform activities and provide services. Some African countries have also adopted these solutions to provide healthcare to their citizens. The reliance on technology requires the tackling of security and privacy issues. As a developing continent with fragile health systems, adopting e-health presents numerous security and privacy concerns that must be addressed. Privacy by Design, which is regarded as a privacy protection paradigm, is critical for African countries that want to or have already adopted e-health. Therefore, the adoption of e-health necessitates the implementation of Privacy by Design to mitigate security and privacy incidents. In this study, we propose a Privacy by Design framework for e-health. The framework consists of the following components: management, people, technology, and users. The proposed framework is intended to improve privacy by design procedures when implementing e-health. This framework would ensure to improve privacy protection as well as information security. Integrating privacy by design into e-health will improve the handling of security and privacy incidents while also protecting personal data and privacy.
ACM - ITCC 2021: 3rd International Conference on Information Technology and Computer Communications, 2021
Teaching and learning are both influenced by technology. Adoption of online learning platforms co... more Teaching and learning are both influenced by technology. Adoption of online learning platforms come with its own challenges and issues. Emergency remote learning was adopted by many educational institutions around the world during the COVID-19 pandemic to enable the continuation of teaching and learning. This was a shift from the traditional face-to-face to virtual classroom environment. As a result of its adoption, some institutions were exposed to security risks, necessitating proactive measures to mitigate them.
In this study, a comparison of existing online security solutions is made, and a security framework is presented that can be used to guide the adoption of remote learning. The framework provides adequate security support through identity management, crypto operations, policy database, deception technology, web and email security, API security and ATP technology. This framework enhances security by ensuring that organizations are aware of current security incidents.
Uploads
Papers by Vincent Amankona
Conference Presentations by Vincent Amankona
In this study, a comparison of existing online security solutions is made, and a security framework is presented that can be used to guide the adoption of remote learning. The framework provides adequate security support through identity management, crypto operations, policy database, deception technology, web and email security, API security and ATP technology. This framework enhances security by ensuring that organizations are aware of current security incidents.
In this study, a comparison of existing online security solutions is made, and a security framework is presented that can be used to guide the adoption of remote learning. The framework provides adequate security support through identity management, crypto operations, policy database, deception technology, web and email security, API security and ATP technology. This framework enhances security by ensuring that organizations are aware of current security incidents.