Skip to main content

    Sunday Idowu

    BABCOCK, Computer Science, Faculty Member
    There have been several attempts made in literature to develop access control techniques to stem data security problems. Many of these techniques had been found to have one deficiency or other. Hence, this study developed a Symbolic... more
    There have been several attempts made in literature to develop access control techniques to stem data security problems. Many of these techniques had been found to have one deficiency or other. Hence, this study developed a Symbolic Attribute-Based Access Control (SABAC) system for data security in the cloud service environment. SABAC system was implemented by developing Hash-tag Symbol Authentication (HSA) algorithm using the Message Digest-5 encryption. SABAC utilizes a 3-Tier continuous authentication method by combining the use of username and password, HSA code, and real-time image monitoring and verification. HSA code is generated by combining 5-tuple user attributes and the string generated from the user’s image using Obfuscation Technique. The concatenated string is converted to hexadecimal which serves as input to MD5 to produces a unique HSA code. SABAC was evaluated using three major security metrics of confidentiality, integrity, and avail-ability. The result of security...
    The Internet has experienced a phenomenal growth as a result of increasing demands for contents, content distributions and other services. CDNs have evolved as cooperative and collaborative groups of networks over the Internet where... more
    The Internet has experienced a phenomenal growth as a result of increasing demands for contents, content distributions and other services. CDNs have evolved as cooperative and collaborative groups of networks over the Internet where contents are replicated over the surrogate servers for efficient delivery performance to the clients and improved service cost to the CDN providers. However, a CDN is limited in terms of Point of Presence (PoP) and scalability. This work is concerned with content object replication among peering CDNs. It provides an analytical model for the replication problem in terms of a constrained optimization problem subject to a mix of QoS requirements (bandwidth and delay). The objective is to minimize the service cost which consists of both the storage and consistency management cost. In order to ensure content objects consistency in replica placement different values of reading and writing rates were considered assuming a flat update delivery. A greedy algorith...
    The turn of the 21st Century brought with it the Information Age. Over the years, Information Technology (IT) has evolved, producing a lot of breakthroughs in various sectors and bringing about the automation of various processes around... more
    The turn of the 21st Century brought with it the Information Age. Over the years, Information Technology (IT) has evolved, producing a lot of breakthroughs in various sectors and bringing about the automation of various processes around the world, thereby making life easier and more comfortable. It has brought about the sharing of information on a global scale, leading to the growth of developing countries and advancement of already developed countries. This paper takes an exploratory look at the concept of Information Technology, its evolution and effects on personal and national development. Findings suggest that Information Technology platforms and paradigms now pervade all conceivable aspects of human endeavor, and has gone a long way in enhancing and in some cases, optimizing outputs in these areas. These domains of interest include education, health, communication, banking, security, mass media, recreation and tourism, which have all translated into wealth creation both at per...
    Research Interests: