Abstract
The effective management and protection of digital criminal records is a crucial concern for law enforcement agencies, legal authorities, and government organizations. Traditional paper- based record-keeping systems are increasingly being replaced by digital platforms, which offer enhanced accessibility, efficiency, and scalability. However, the transition to digital criminal record management also introduces new challenges in terms of data security, privacy, and compliance with regulatory frameworks. This dissertation presents an efficient data protection model for the management of digital criminal records. The model leverages a combination of advanced encryption techniques, access control mechanisms, and robust data backup and recovery strategies to ensure the confidentiality, integrity, and availability of sensitive criminal justice information. The proposed model is designed to be scalable in handling increased data loads and user traffic, ensuring that the system remains responsive and efficient even as more crime data is added. Its optimization performance reduced the CPU usage from 70% to 50%, Memory usage from 80% to 60%. The encryption time witnessed a significant reduction of 0.08sec for 1000KB file size as against 0.12 sec in the existing system. It is also adaptable and compliant with relevant data protection regulations, such as the General Data Protection Regulation (GDPR) and national-level data privacy laws. The implementation of this model has significantly enhanced the overall security and integrity of digital criminal record management systems, while ensuring the protection of sensitive personal and criminal justice information.
References
Janis Wong1, Tristan Henderson1, Kirstie Ball2., (2022) Data protection for the common good:Developing a frame work for a data protection-focused data commons Data & Policy 4: e3 doi:10.1017/dap.2021.40. Kashmar, N., Adda, M., Atieh, M. (2020). From Access Control Models to Access Control Metamodels:A Survey. In: Arai, K., Bhatia, R. (eds) Advances in Information and Communication. FICC 2019. Lecture Notes in Networks and Systems, vol 70. Springer, Cham. https://doi.org/10.1007/978-3-030-12385-7_61. Ebert, I., Wildhaber, I., & Adams-Prassl, J. (2021). Big Data in the workplace: Privacy Due Diligence as a human rights-based approach to employee privacy protection. Big Data & Society, 8(1). https://doi.org/10.1177/20539517211013051 Thomas, J., Güez, S., (2018) Protecting Human Subjects in the Digital Age: Issues and Best Practices of Data Protection: https://doi.org/10.29115/SP-2018-0028. Alyaa H., Aya A, Mariam K, Nour A, Sally K., (2021) Modelling of Crime Record Management System Using Unified Modeling Language https://doi.org/10.18280/isi.260404 Sachoulidou, A. (2023). Going beyond the “common suspects”: to be presumed innocent in the era of algorithms, big data and artificial intelligence. Artificial Intelligence and Law. https://doi.org/10.1007/s10506-023-09347-w Ajah, B., Chinweze, U., Ajah, I., Onyejegbu, D., Obiwulu, A., Onwuama, E., … & Okpa, J. (2022). Behind bars but not sentenced: the role of computerized central repository in addressing awaiting-trial problems in ebonyi state, nigeria. Sage Open, 12(1). https://doi.org/10.1177/21582440221079822 Biswajit Debnath, Jaafar M. Alghazo, Ghanzafar Latif, Reshma Roychoudhuri, Sadhan Kumar Ghosh (2020). An Analysis of Data Security and Protection Threat from IT Assets for middle card player, institutions and individual. Sustainable waste management: policies and case studies: 7th Icon SWM-ISWMAW2017 Volume 1, 403-419. Cleophas Mutundu Ambira, Henry Nyabuto Kemoni, Patrick Ngulube (2019) A framework for electronic record management in support of e-government in Kenya. Record Management Journal 29 (3), 305-319. Sarumi Jerry, (2022) A review of encryption methods for secure data communication. 10.22624 Servos, D. and Osborn, S.L., (2017) Current Research and Open Problems in Attribute-.Based Bccess Control, ACM Computing Surveys, 49(4): 1-45 Shakti, D., Rai, P. K., (2021) A Review of Cloud Service Security with various Access Control methods international journal of computer science and mobile computing. Vol 10, pg 39 – 45. Chougule, H., Dhadiwal, S., Lokhande, M., Naikade, R., and Patil, R., (2022) Digital Evidence Management System for Cybercrime Investigation using Proxy Re-encryption and Blockchain Procedia Computer Science 215, 71-77.