INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )

E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 11 NO. 2 2025
DOI: 10.56201/ijcsmt.v11.no2.2025.pg40.58


An Efficient Data Protection Model for Digital Criminal Record Management

E O Bennett, U E Chinenye


Abstract


The effective management and protection of digital criminal records is a crucial concern for law enforcement agencies, legal authorities, and government organizations. Traditional paper- based record-keeping systems are increasingly being replaced by digital platforms, which offer enhanced accessibility, efficiency, and scalability. However, the transition to digital criminal record management also introduces new challenges in terms of data security, privacy, and compliance with regulatory frameworks. This dissertation presents an efficient data protection model for the management of digital criminal records. The model leverages a combination of advanced encryption techniques, access control mechanisms, and robust data backup and recovery strategies to ensure the confidentiality, integrity, and availability of sensitive criminal justice information. The proposed model is designed to be scalable in handling increased data loads and user traffic, ensuring that the system remains responsive and efficient even as more crime data is added. Its optimization performance reduced the CPU usage from 70% to 50%, Memory usage from 80% to 60%. The encryption time witnessed a significant reduction of 0.08sec for 1000KB file size as against 0.12 sec in the existing system. It is also adaptable and compliant with relevant data protection regulations, such as the General Data Protection Regulation (GDPR) and national-level data privacy laws. The implementation of this model has significantly enhanced the overall security and integrity of digital criminal record management systems, while ensuring the protection of sensitive personal and criminal justice information.


Crime management, access control, data protection, criminal record



Janis Wong1, Tristan Henderson1, Kirstie Ball2., (2022) Data protection for the common
good:Developing a frame work for a data protection-focused data commons Data & Policy
4: e3 doi:10.1017/dap.2021.40.
Kashmar, N., Adda, M., Atieh, M. (2020). From Access Control Models to Access Control
Metamodels:A Survey. In: Arai, K., Bhatia, R. (eds) Advances in Information and
Communication. FICC 2019. Lecture Notes in Networks and Systems, vol 70. Springer,
Cham. https://doi.org/10.1007/978-3-030-12385-7_61.
Ebert, I., Wildhaber, I., & Adams-Prassl, J. (2021). Big Data in the workplace: Privacy Due
Diligence as a human rights-based approach to employee privacy protection. Big Data &
Society, 8(1). https://doi.org/10.1177/20539517211013051
Thomas, J., Güez, S., (2018) Protecting Human Subjects in the Digital Age: Issues and Best
Practices of Data
Protection: https://doi.org/10.29115/SP-2018-0028.
Alyaa H., Aya A, Mariam K, Nour A, Sally K., (2021) Modelling of Crime Record
Management System Using
Unified Modeling Language https://doi.org/10.18280/isi.260404
Sachoulidou, A. (2023). Going beyond the “common suspects”: to be presumed innocent
in the era of
algorithms, big data and artificial intelligence. Artificial Intelligence and Law.
https://doi.org/10.1007/s10506-023-09347-w
Ajah, B., Chinweze, U., Ajah, I., Onyejegbu, D., Obiwulu, A., Onwuama, E., … & Okpa,
J. (2022). Behind
bars but not sentenced: the role of computerized central repository in addressing
awaiting-trial
problems
in
ebonyi
state,
nigeria.
Sage
Open,
12(1).
https://doi.org/10.1177/21582440221079822
Biswajit Debnath, Jaafar M. Alghazo, Ghanzafar Latif, Reshma Roychoudhuri, Sadhan
Kumar Ghosh (2020).
An Analysis of Data Security and Protection Threat from IT Assets for middle card
player, institutions and individual. Sustainable waste management: policies and case
studies: 7th Icon SWM-ISWMAW2017 Volume 1, 403-419.
Cleophas Mutundu Ambira, Henry Nyabuto Kemoni, Patrick Ngulube (2019) A framework
for electronic
record management in support of e-government in Kenya. Record Management Journal
29 (3), 305-319.
Sarumi Jerry, (2022) A review of encryption methods for secure data communication.
10.22624
Servos, D. and Osborn, S.L., (2017) Current Research and Open Problems in
Attribute-.Based Bccess Control,
ACM Computing Surveys, 49(4): 1-45
Shakti, D., Rai, P. K., (2021) A Review of Cloud Service Security with various Access
Control methods
international journal of computer science and mobile computing. Vol 10, pg 39 – 45.
Chougule, H., Dhadiwal, S., Lokhande, M., Naikade, R., and Patil, R., (2022) Digital
Evidence Management
System for Cybercrime Investigation using Proxy Re-encryption and Blockchain
Procedia Computer Science 215, 71-77.


DOWNLOAD PDF

Back


Google Scholar logo
Crossref logo
ResearchGate logo
Open Access logo
Google logo