Computer Sciences
Permanent URI for this collectionhttps://repository.aab-edu.net/handle/123456789/58
The Computer Sciences community showcases scholarly publications and research outputs authored by faculty and researchers in the Faculty of Computer Sciences. This collection includes journal articles, working papers, conference proceedings, and other academic works that contribute to the understanding of theory, policy, and practice. It aims to promote open access to high-quality economic research conducted within the institution.
News
Latest update: New research articles and working papers from the Computer sciences department have been added.
Browse
Search Results
Item Transactions privacy on blockchain using web of trust concept(AAB College, 2025-07-14) Dervishi, RamadanExchange of information through the web took place inside a trusted environment and thus user privacy was assured by default. Nowadays, ensuring user privacy is becoming one of the most desirable features of new technology, and Blockchain is not an exception. The Blockchain is a decentralized technology, open, and public platform where all transactions are stored and viewed from nodes, an approach known as “Web of Trust.” Although these transactions tend to be anonymous but in the case of the banking sector, user privacy requires special attention. In centralized systems, the implementation of privacy is no longer a challenge, using a hierarchical approach such as Public Key Infrastructure. This paper presents a broad landscape and state of art of user transaction privacy in Blockchain technology using the Web of Trust approach. Furthermore, we present a novel approach using the Public Key Infrastructure for assuring user privacy adding an optionally encrypted field in blocks in transactions. We have used Bithomp, as a free and opensource tool with the Testnet platform, and Ripple as the best known in the implementation of the payment system to implement the proposed approach. The paper concludes with the strengths and limitations of the proposed approach.Item Assuring Anonymity and Privacy in Electronic Voting with Distributed Technologies Based on Blockchain(AAB College, 2025-07-14) Dervishi, RamadanAnonymity and privacy in the electoral process are mandatory features found in any democratic society, and many authors consider these fundamental civil liberties and rights. During the election process, every voter must be identified as eligible, but after casting a vote, the voter must stay anonymous, assuring voter and vote unlinkability. Voter anonymity and privacy are the most critical issues and challenges of almost all electronic voting systems. However, vote immutability must be assured as well, which is a problem in many new democracies, and Blockchain as a distributed technology meets this data immutability requirement. Our paper analyzes current solutions in Blockchain and proposes a new approach through the combination of two different Blockchains to achieve privacy and anonymity. The first Blockchain will be used for key management, while the second will store anonymous votes. The encrypted vote is salted with a nonce, hashed, and finally digitally signed with the voter’s private key, and by mixing the timestamp of votes and shuffling the order of cast votes, the chances of linking the vote to the voter will be reduced. Adopting this approach with Blockchain technology will significantly transform the current voting process by guaranteeing anonymity and privacy.Item Privacy and data protection: Legal aspects in the Republic of Macedonia(AAB College, 2025-07-14) Osmani, NoraThe purpose of this paper is to present a theoretical assessment of the existing Law on Personal Data Protection in the Republic of Macedonia. The paper aims to analyse whether there is a need for additional legal tools in order to achieve a balance between maintaining data integrity in the digital age and the use of modern technology. The paper discusses the meaning of “information privacy” in the age of big data, cyber threats and the domestic and international response to these issues. Special focus is dedicated to privacy policy enforcement in European Union Law. Having regard to the development of new technologies, prevailing data protection legislation may no longer be able to provide effective protection for individuals’ personal information. Therefore, existing laws should be continuously adapted to respond to new challenges and situations deriving from different online activities and communications.Item THE RIGHT TO BE FORGOTTEN IN THE DIGITAL AGE(AAB College, 2025-07-14) Osmani, NoraThis article seeks to analyse the right to be forgotten, which was officially introduced by the European Commission on the 25th of January 2012. Lately, the concept seems to be close to its final form. Although it remains, for the most part, unchanged from the previously circulated drafts, it has been re-labelled as a “right of erasure” and a “right of oblivion”. Although the idea is intuitive and appealing, the legal form and practical implications of a right to be forgotten have not been sufficiently analysed so far. This contribution aims to assess what a right to be forgotten could or should entail in practice. This article argues that, despite its catchy terminology, the right to be forgotten can be understood as a generic term, bringing together existing legal provisions: the substantial right of oblivion and the procedural right to erasure derived from data protection. Based on the distinction between the right to identity and that of privacy, the paper presents the advantages of associating the right to be forgotten with the right to identity. It is shown that the attempt to implement oblivion, erasure and forgetting in the digital age is a complex undertaking. Despite its laudable goal, some deficiencies should be resolved. But, in general, the right seems to restore the power balance by giving (back) effective control to individuals over their personal data.Item Analysis of data security and privacy in public institutions according to GDPR in the Republic of Kosovo(AAB College, 2025-07-14) Santuri Fishekqiu, Nida; Hamdiu, Ersan; Jakupi, SamirData security is a major issue for every institution. The data for each individual who interacts with an institution, whether an employee or a seeker of services from the institution, must be stored and protected. The process of securing data and implementing privacy requires a high degree of investigation and certain professionalism. In order to provide such a service, many institutions use high standards to prevent data attacks and privacy violations. GDPR - 2016/679 - General Data Protection Regulation) comes in two versions OJ L 119, 04.05.2016; cor. OJ L 127, 23.5.2018. In this paper, we present the harmonization between the regulation which contains the privacy laws and the current state of data security in public institutions and the preservation of privacy. The paper used the method of analysis of current documents and comparison with GDPR - 2016/679 - General Data Protection Regulation.Item Comparison of cloud storage in terms of privacy and personal data - Sync, pCloud, IceDrive and Egnyte(AAB College, 2025-07-14) Hamdiu, Ersan; Santuri Fishekqiu, Nida; Qarkaxhija, Jusuf; Jakupi, SamirThe cloud, essentially a network of interconnected computers, has revolutionized data storage and sharing. Cloud storage, an integral part of this ecosystem, offers a virtual storage space spanning numerous physical devices. This technology relies on internet-based platforms hosted in data centers provided by service giants like Apple iCloud, Microsoft OneDrive, and Google Cloud Storage. While cloud storage enhances accessibility and convenience, it also introduces heightened risks, primarily due to the transfer of essential services to third-party providers. These risks encompass challenges related to security, privacy, data support, service availability, and regulatory compliance. Cloud storage, characterized by remote data transmission and storage on networked servers, offers a paradigm shift in data management. Users access these remote storage systems via the internet, paying providers based on usage rates. In this paper, we evaluate the security features of four Cloud Storage providers: Sync, pCloud, IceDrive, and Egnyte, with a specific focus on privacy and personal data protection. This paper presents a comprehensive analysis of privacy and security aspects in four prominent Cloud Storage services: Sync, pCloud, IceDrive, and Egnyte. The primary objective is to underscore the significance of privacy in the realm of Cloud Storage. Employing methods such as analysis and synthesis, comparative analysis, and empirical meta-analysis, this research delves into the core characteristics of these platforms, focusing on security, compliance, governance, and data protection.