Somchart Fugkeaw

ORCID: 0000-0001-7156-184X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • Privacy-Preserving Technologies in Data
  • Access Control and Trust
  • Blockchain Technology Applications and Security
  • Peer-to-Peer Network Technologies
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Advanced Database Systems and Queries
  • Mobile Agent-Based Network Management
  • Multi-Agent Systems and Negotiation
  • Data Management and Algorithms
  • Information and Cyber Security
  • Privacy, Security, and Data Protection
  • Advanced Data Storage Technologies
  • Web Application Security Vulnerabilities
  • Distributed and Parallel Computing Systems
  • Digital Rights Management and Security
  • Semantic Web and Ontologies
  • IoT and Edge/Fog Computing
  • Biometric Identification and Security
  • Network Packet Processing and Optimization
  • Cryptography and Residue Arithmetic
  • Spam and Phishing Detection
  • User Authentication and Security Systems

Thammasat University
2020-2025

Sirindhorn College of Public Health
2021

The University of Tokyo
2015-2017

Tokyo University of Information Sciences
2015-2016

Digital Science (United States)
2007

Mahidol University
2006

As for the advancement of IoT and cloud computing in healthcare, outsourcing encrypted Electronic medical records (EMRs) created by aggregation treatment applications health data collected from devices enables high accessibility, effective collaboration, zero computational operation cost. Current research works generally concern privacy finest EMRs that are with secure lightweight cryptographic protocols before they outsourced to cloud. However, this process does not consider security...

10.1109/access.2023.3288332 article EN cc-by-nc-nd IEEE Access 2023-01-01

Existing single sign-on (SSO) access control systems typically rely on the traditional protocols requiring additional authentication mechanism and/or identity providers. As growing demand in outsourcing system resources such as data and applications to cloud platform, implementing SSO models support efficient fine-grained for multi-user multi-application environment is not practical. In this paper, we propose a blockchain-based identification management (IAM) scheme called D <sup...

10.1109/access.2023.3255885 article EN cc-by-nc-nd IEEE Access 2023-01-01

The electronic know your customer (e-KYC) is a system for the banking or identity provider to establish data verification process between relying parties. Due efficient resource consumption and high degree of accessibility availability cloud computing, most banks implement their e-KYC on cloud. Essentially, security privacy related documents stored in becomes crucial issue. Existing platforms generally rely strong authentication apply traditional encryption support requirement. In this...

10.1109/access.2022.3172973 article EN cc-by IEEE Access 2022-01-01

This paper introduces an advanced system designed to analyze and classify potential cyberbullying content in images from Twitter. Utilizing the image processing of OpenAI's GPT-4, generates description metadata for each image. data is then stored managed within a MongoDB database, setting stage subsequent analytical phase. We employed Language Learning Model (LLM) examine AI-generated descriptions, assessing them indicators cyberbullying. Through AI technologies, highlights integrating...

10.1109/kst61284.2024.10499678 article EN 2024-02-28

This paper proposes an access control scheme called Collaborative Cipher text-Policy Attribute Role Based Encryption (C-CP-ARBE). Our C-CP-ARBE integrates Role-based Access Control (RBAC) into a Attribute-based (CP-ABE). The proposed model provides high expressiveness of policy, scalable user management, and less revocation cost compared to the existing approach. In addition, our supports both read write in more complex data sharing collaborative cloud storage where there are multi-owner,...

10.1109/compsac.2015.216 article EN 2015-07-01

Cloud data warehouse (CDW) platforms have been offered by many cloud service providers to provide abundant storage and unlimited accessibility business users. Sensitive (DW) consisting of dimension fact is typically encrypted before it outsourced the cloud. However, query over DW not practically supported any analytical tools. The Searchable Encryption (SE) technique palpable for supporting keyword searches data. Although SE schemes introduced their own unique searching methods based on...

10.1109/access.2024.3383320 article EN cc-by-nc-nd IEEE Access 2024-01-01

Achieving privacy-preserving analytical query with fine-grained access control for cloud-based data warehouse (CDW) through the use of online processing (OLAP) tool is a real challenge. This because must be enforced differently to multiple users while OLAP should excelled from encrypted DW and results are delivered public network. Existing solutions employ encryption apply on DW. However, they mostly overlooked enforcement different efficient performance when there large number users. In...

10.1109/access.2024.3408221 article EN cc-by-nc-nd IEEE Access 2024-01-01

10.1016/j.future.2017.06.014 article EN Future Generation Computer Systems 2017-06-29

With rapidly increasing adoption of cloud computing and the advancement today mobile computing, it is inevitable that devices are used to receive send data through platform. This increases convenience flexibility access over since users able shared anytime, anywhere via devices. However, using in accessing a where sensitive encrypted not practical because have limited resources dealing with heavy cryptographic operations. In this article, we propose lightweight collaborative ciphertext...

10.1109/access.2020.3046869 article EN cc-by IEEE Access 2020-12-23

Due to the proliferation of advanced analytic applications built on a massive scale data from several sources, big technology has emerged shift paradigm management. Big management is usually taken into outsourcing environment such as cloud computing. According environment, security and privacy becomes one critical issues for business decision. Typically, cryptographic-based access control employed support privacy-preserving authentication authorization scenario. In this paper, we propose...

10.1109/icsec.2015.7401416 article EN 2015-11-01

In this paper, we propose a Very Lightweight Proxy Re-Encryption (VL-PRE) scheme to efficiently support attribute-based revocation and policy update in the collaborative data sharing cloud systems. To end, three-phase VL-PRE protocol including re-encryption key generation, update, renewal for supporting optimized attribute update. Finally, conduct experiments evaluate performance of our show that it supports management through resource-constrained mobile devices with practical scalable manner.

10.1109/cloud.2016.0131 article EN 2016-06-01

Existing fine-grained and secure access control systems deployed in mobile cloud computing (MCC) typically focus on offloading encryption and/or decryption workloads to the delegated proxy server. However, privacy authenticity management of outsourced data with flexible efficient policy update MCC is generally overlooked by existing works. In fact, signcryption feature required system where trust between owner multiple users crucial while deals dynamic handling user privilege lifecycle. this...

10.1109/access.2023.3341095 article EN cc-by-nc-nd IEEE Access 2023-01-01

Existing solutions for data protection and privacy in outsourcing scenario generally emphasize on the access control model integrated with advanced cryptographic techniques. However, complexity of key management is still a recurrent problem when environment composes enormous numbers users several resource owners. In addition, administrative capabilities to policies enforced collaborative cloud where owners have not been explicitly provided by existing works. this paper, we propose enhancing...

10.1109/icdim.2012.6360134 article EN 2012-08-01

Cloud computing has emerged as a successful paradigm to deliver flexible and convenient data processing sharing. Security privacy management of outsourced is among the top concerns for cloud adoption. To this end, attribute-based encryption primitive been recognised achieve secure access control with preserving data. However, dealing evolution user attribute policy update limits efficiency control. In paper, we propose lightweight proxy re-encryption (L-PRE) technique enable efficient...

10.1504/ijhpcn.2016.077822 article EN International Journal of High Performance Computing and Networking 2016-01-01

In this paper, we propose a novel single sign-on (SSO) approach based on multi-agent system (MAS) and public key infrastructure (PKI) authentication scheme. This allows the model to benefit from advantages of two schemes, i.e. capability technique strength PKI. addition also deal with issue agent service disruption recovery as well real-time client privilege management. We apply MAS concept facilitate multi-application authorization process for multiple concurrent users. Depending type, an...

10.1109/icn.2007.10 article EN 2007-04-01

With high flexibility and accessibility of data outsourcing environment such as cloud computing environment, several healthcare providers implement electronic personal health records (PHRs) to enable individual patients manage their own in resilient scalable environment. However, PHRs contain highly sensitive information which the security privacy issues are critical concern. Besides, owners should be capable flexibly securely define access policy for outsourced data. In addition basic...

10.1109/access.2021.3071150 article EN cc-by IEEE Access 2021-01-01

Vulnerability assessment (VA) and penetration test (PenTest) are required by many organizations to satisfy their security auditing compliance. VA PenTest conducted in the different stage they done through software tools. Implementing system that is able convert scan result be rendered tool a real challenge. This paper proposes design development of called VAPE-BRIDGE provides automatic conversion Open scanner (OpenVAS) exploitable scripts will executed Metasploit which widely-used opensource...

10.1109/kst53302.2022.9729085 article EN 2022-01-26

This paper presents the first measurement of investigation health impacts indoor radon exposure and external dose from terrestrial radiation in Chiang Mai province during dry season burning between 2018 2020. Indoor activity concentrations were carried out using a total 220 RADUET detectors 45 dwellings (7 districts) non-burning seasons. Results show that concentration (63 ± 33 Bq/m3) was significantly higher (p < 0.001) compared to (46 19 Bq/m3), with an average annual value 55 28 Bq/m3....

10.3390/life12060853 article EN cc-by Life 2022-06-08

Image steganography is one of the common techniques used in information-hiding applications. Existing image solutions generally focus on improving both computation data embedding and completeness extraction. However, service providing adaptive matching multiple ciphertexts suitable files with support fast stego retrieval mostly overlooked by existing works. This paper introduces a cloud-based system imperceptibility preservation between text, file, or ciphertext within randomly selected...

10.1109/kst61284.2024.10499672 article EN 2024-02-28

Implementing a cloud-based data warehouse to store sensitive or critical strategic presents challenges primarily related the security of stored information and exchange OLAP queries between cloud server users. Although encryption is viable solution for safeguarding outsourced data, applying it involving multidimensional measures, Multidimensional Expressions (MDX) operations on encrypted poses difficulties. Existing searchable solutions are inadequate handling such complex queries, which...

10.1186/s13677-024-00692-y article EN cc-by-nc-nd Journal of Cloud Computing Advances Systems and Applications 2024-08-15

Sharing data in industrial cloud requires both secure and flexibility management of shared among users the industry. Users should have ability to access authorized portion from smart edge devices with integrated protocol for interacting storage. Among cryptographic-based control solutions, ciphertext-policy attribute-based encryption (CP-ABE) is recognized as a suitable solution supporting fine-grained outsourced data. However, attribute revocation major drawback CP-ABE since it introduces...

10.1109/tsc.2021.3110828 article EN IEEE Transactions on Services Computing 2021-01-01
Coming Soon ...