Abstract
Data breaches are a critical issue and have become one of the top widespread risks in today’s data-driven digital environment. Hence, Secure data outsourcing is essential in today’s digital communications. The current interconnected network lack many core features, including privacy and security, which make it vulnerable to data leakages when transmitting sensitive information during critical circumstances (e.g., natural and human disasters). In this paper, we propose a network model that can be employed as a future private network paradigm to promptly and securely transmit confidential data, hence minimizing the chances of breaches. Our schemes provide the following contributions: (1) design a private novel network architecture to disseminate multilevel confidential packets using two routers; (2) Develop several heuristics to reduce an NP-hard problem to find an optimal solution for the studied problem; (3) Employee a developed scheduler for selecting the best algorithm that schedule packets securely and timely through two routers such that critical data packets associated to the same confidential level are prohibited from being transmitted at the same time; (4) conduct an analysis study to compare the developed heuristics and to prove the practicality of the proposed solution. The experimental results show the performance of the proposed heuristics. The results showed that the best heuristic is IFP2 in 84.4% of cases.















Similar content being viewed by others
References
Al-Sarem, M., Saeed, F., Alsaeedi, A., Boulila, W., Al-Hadhrami, T.: Ensemble methods for instance-based Arabic language authorship attribution. IEEE Access 8, 17331–17345 (2020)
Alharbi, M., Jemmali, M.: Algorithms for investment project distribution on regions. Comput. Intell. Neurosci. (2020). https://doi.org/10.1155/2020/3607547
Alquhayz, H., Jemmali, M.: Fixed urgent window pass for a wireless network with user preferences. Wirel. Pers. Commun. 120(2), 1565–1591 (2021)
Alquhayz, H., Jemmali, M.: Max-min processors scheduling. Inf. Technol. Control 50(1), 5–12 (2021)
Alquhayz, H., Jemmali, M., Otoom, M.M.: Dispatching-rule variants algorithms for used spaces of storage supports. Discrete Dyn. Nat. Soc. (2020)
Araghipour, A., Mostafavi, S.: An improved emergency response routing protocol for internet of things. Wirel. Pers. Commun. pp. 1–24 (2021)
Bell, D.E., La Padula, L.J.: Secure computer system: Unified exposition and multics interpretation. Tech. Rep., MITRE CORP BEDFORD MA (1976)
Boulila, W., Ayadi, Z., Farah, I.R.: Sensitivity analysis approach to model epistemic and aleatory imperfection: application to land cover change prediction model. J. Comput. Sci. 23, 58–70 (2017)
Boulila, W., Farah, I.R., Ettabaa, K.S., Solaiman, B., Ghézala, H.B.: Spatio-temporal modeling for knowledge discovery in satellite image databases. In: CORIA, pp. 35–49 (2010)
Canavan, J.E.: Fundamentals of network security. Artech House 685, 59–69 (2001)
Carroll, J.M.: Implementing multilevel security by violation privilege. Comput. Secur. 7(6), 563–573 (1988)
Chatfield, A.T., Reddick, C.G.: Cybersecurity innovation in government: A case study of us pentagon’s vulnerability reward program. In: Proceedings of the 18th Annual International Conference on Digital Government Research, pp. 64–73 (2017)
Chua, H.N., Ooi, J.S., Herbland, A.: The effects of different personal data categories on information privacy concern and disclosure. Comput. Secur. 110, 102453 (2021)
Ciampa, M.: CompTIA security+ guide to network security fundamentals. Cengage Learning (2021)
Driss, M., Aljehani, A., Boulila, W., Ghandorh, H., Al-Sarem, M.: Servicing your requirements: an fca and rca-driven approach for semantic web services composition. IEEE Access 8, 59326–59339 (2020)
Fuentes-García, M., Camacho, J., Maciá-Fernández, G.: Present and future of network security monitoring. IEEE Access 9, 112744–112760 (2021)
Garey, M., Johnson, D.: Computers intractability: a guide to the theory of np-completeness (San francisco: Wh freeman) (1979)
Ghaleb, F.A., Maarof, M.A., Zainal, A., Al-rimy, B.A.S., Alsaeedi, A., Boulila, W.: Ensemble-based hybrid context-aware misbehavior detection model for vehicular ad hoc network. Remote Sens. 11(23), 2852 (2019)
Haouari, M., Gharbi, A., Jemmali, M.: Bounding strategies for scheduling on identical parallel machines. In: 2006 International Conference on Service Systems and Service Management, vol. 2, pp. 1162–1166. IEEE (2006)
Harsha, B., Blocki, J., Springer, J., Dark, M.: Bicycle attacks considered harmful: quantifying the damage of widespread password length leakage. Comput. Secur. 100, 102068 (2021)
Hidri, L., Jemmali, M.: Near-optimal solutions and tight lower bounds for the parallel machines scheduling problem with learning effect. RAIRO-Oper. Res. 54(2), 507–527 (2020)
Jemmali, M.: Budgets balancing algorithms for the projects assignment. Int. J. Adv. Comput. Sci. Appl. 10(11), 574–578 (2019)
Jemmali, M., Alquhayz, H.: Equity data distribution algorithms on identical routers. In: International Conference on Innovative Computing and Communications, pp. 297–305. Springer (2020)
Jemmali, M., Alquhayz, H.: Time-slots transmission data algorithms into network. In: 2020 International Conference on Computing and Information Technology (ICCIT-1441), pp. 1–4. IEEE (2020)
Jemmali, M., Bashir, A.K., Boulila, W., Melhim, L.K.B., Jhaveri, R.H., Ahmad, J.: An efficient optimization of battery-drone-based transportation systems for monitoring solar power plant. IEEE Transactions on Intelligent Transportation Systems (2022)
Jemmali, M., Hidri, L.: Hybrid flow shop with setup times scheduling problem. Comput. Syst. Sci. Eng. 44(1), 563–577 (2023)
Jemmali, M., Hidri, L.: Bounding schemes for the parallel machine scheduling problem with Dejong’s learning effect. J. Parallel Distrib. Comput. 156, 101–118 (2021)
Jemmali, M., Melhim, L.K.B., Al Fayez, F.: Real time read-frequency optimization for railway monitoring system. RAIRO-Oper. Res. 56(4), 2721–2749 (2022)
Kizza, J.M.: Kizza, Wheeler: Guide to computer network security, vol. 8. Springer (2013)
Liu, F., Huo, W., Han, Y., Yang, S., Li, X.: Study on network security based on pca and bp neural network under green communication. IEEE Access 8, 53733–53749 (2020)
Mahmoud, M.S., Sabih, M.: Networked event-triggered control: an introduction and research trends. Int. J. General Syst. 43(8), 810–827 (2014)
Numani, A., Gulfam, S.M., Javed, M.A., Muhammad, B., Prasad, R., Nawaz, S.J.: Network architecture and wireless ad hoc routing for airborne internet services. Wirel. Pers. Commun. pp. 1–15 (2021)
Pfleeger, C.P., Pfleeger, S.L., Margulies, J.: Security in Computing. Prentice-Hall, Inc. (2015)
Praveen, K., Prathap, P.J.: Energy efficient congestion aware resource allocation and routing protocol for iot network using hybrid optimization techniques. Wirel. Pers. Commun. 117(2), 1187–1207 (2021)
Qiu, T., Qiao, R., Wu, D.O.: Eabs: an event-aware backpressure scheduling scheme for emergency internet of things. IEEE Trans. Mobile Comput. 17(1), 72–84 (2017)
Qiu, T., Zheng, K., Han, M., Chen, C.P., Xu, M.: A data-emergency-aware scheduling scheme for internet of things in smart cities. IEEE Trans. Industr. Inform. 14(5), 2042–2051 (2017)
Ramadhani, E.: Anonymity communication vpn and tor: a comparative study. J. Phys.: Conf. Ser. 983, 012060 (2018)
Rao, Z., Xu, Y., Pan, S.: An intelligent routing method based on network partition. Comput. Commun. 160, 25–33 (2020)
Saleem, J., Adebisi, B., Ande, R., Hammoudeh, M.: A state of the art survey-impact of cyber attacks on sme’s. In: Proceedings of the International Conference on Future Networks and Distributed Systems (2017)
Sarhan, A., Jemmali, M.: Novel intelligent architecture and approximate solution for future networks. Plosone 18(3), e0278183 (2023)
Sarhan, A., Jemmali, M., Ben Hmida, A.: Two routers network architecture and scheduling algorithms under packet category classification constraint. In: The 5th International Conference on Future Networks & Distributed Systems, pp. 119–127 (2021)
Sarhan, A., Lilien, L.: An approach to identity management in clouds without trusted third parties. arXiv preprint arXiv:1904.00880 (2019)
Sarhan, A.Y., Carr, S.: A highly-secure self-protection data scheme in clouds using active data bundles and agent-based secure multi-party computation. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 228–236. IEEE (2017)
Schurgers, C., Srivastava, M.B.: Energy efficient routing in wireless sensor networks. In: 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No. 01CH37277), vol. 1, pp. 357–361. IEEE (2001)
Sengupta, S., Chowdhary, A., Sabur, A., Alshamrani, A., Huang, D., Kambhampati, S.: A survey of moving target defenses for network security. IEEE Commun. Surv. Tutorials 22(3), 1909–1941 (2020)
Shiravi, H., Shiravi, A., Ghorbani, A.A.: A survey of visualization systems for network security. IEEE Trans. visual. comput. graph. 18(8), 1313–1329 (2011)
von Solms, S.H., Geldenhuys, J.: Managing multi level security in a military intranet environment. Comput. Secur. 18(3), 257–270 (1999)
Vakilinia, I., Sengupta, S.: Vulnerability market as a public-good auction with privacy preservation. Comput. Secur. 93, 101807 (2020)
Wright, M.A.: The need for information security education. Comput. Fraud Secur. 1998(8), 14–17 (1998)
Wu, Y., Song, W., Cao, Z., Zhang, J., Lim, A.: Learning improvement heuristics for solving routing problems.. IEEE Transactions on Neural Networks and Learning Systems (2021)
Xia, F., Dai, X., Wang, Z., Sun, Y.: Feedback based network scheduling of networked control systems. In: 2005 International Conference on Control and Automation, vol. 2, pp. 1231–1236. IEEE (2005)
Zhang, Dg., Niu, H. I., Liu, S.: Novel peecr-based clustering routing approach. Soft Comput. 21(24), 7313–7323 (2017)
Acknowledgements
The authors would like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under project no. R-2023-458.
Funding
The authors would like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under project no. R-2023-458.
Author information
Authors and Affiliations
Contributions
MJ conceived and designed the experiments, performed the experiments, analyzed the data, performed the computation work, prepared figures and/or tables, authored or reviewed drafts of the paper, and approved the final draft. ABH coding the proposed algorithms performed the experiments, analyzed the data, authored or reviewed drafts of the paper, and approved the final draft. AS analyzed the data, prepared figures and/or tables, authored or reviewed drafts of the paper, and approved the final draft.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no competing interests..
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Jemmali, M., Ben Hmida, A. & Sarhan, A. A Novel Two-Routers Model Based on Category Constraints Secure Data-Dissemination-Aware Scheduling in Next-Generation Communication Networks. J Netw Syst Manage 31, 59 (2023). https://doi.org/10.1007/s10922-023-09747-y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10922-023-09747-y