Professional Documents
Culture Documents
A Novel Approach For Speeding Up Secured Litigation Procedures
A Novel Approach For Speeding Up Secured Litigation Procedures
ISSN: 2454-1532
Information System Dept., Faculty of Computer & Information Sciences, Mansoura University, Mansoura, Egypt
Email address: 1mfadiyya@yahoo.com
AbstractIn this paper a developed efficient information system to facilitate the litigation procedures in courts is proposed. The main
objective is to reduce the long time consumed in processing cases in different courts. This is to save the time and effort of all people evolved
in the case especially judges and lawyers. In addition, we make use of the advantages of electronic systems and soft computing techniques in
reducing traffic especially in developed countries. Encryption is required to secure all of the manipulated data in courts. Thus, for each case,
AES is used to encrypt the processed data. The aim is to achieve secure litigation procedures. This is because the expected big data for all
cases will be stored on cloud to solve the problems of weak computer environment in developed countries. Implementation details of our
previous work presented in [14] are described here.
KeywordsLitigation procedures; AES encryption algorithm; big data; cloud environment.
I.
INTRODUCTION
A. Litigation Procedures
An action brought in court to enforce a particular right.
The act or process of bringing a lawsuit in and of itself; a
judicial contest; any dispute [10]. Litigation is a contest
authorized by law, in a court of justice, for the purpose of
enforcing a right [8]. When a person starts a civil lawsuit, the
person evolves into a process called litigation. Under the
different rules of civil procedure that govern actions in state
and federal courts, litigation includes a series of steps that may
lead to a court trial and ultimately a resolution of the matter
[8]. The integration of justice, Information and
communications technology is now a new way to be not only
in terms of functionality and cost management, but also to
adjust the quality standards; it is shown the procedure of civil
telematics in its architecture, in its draft implementation and
advantages arising from its actual use [12]. The operation of a
legal system may affect many branches of development:
equity, the optimal Allocation of resources, and the increase in
total factor productivity. Moreover, the role of the judicial
system in measuring its dysfunctions can affect economic
growth [13].
For example, when the investigation of money laundering
cases, it is known that banking and financial institutions
activities are carried out through computers devices where all
daily transactions are saved, when public prosecutions ordered
unloading the contents of these data. Thus, we can imagine the
vast amount of documents, evidence and data papers, which
will connect with case binders in accordance with the
traditional system. However, employing of our proposal
system will permit downloading and saving in an electronic
system through which all big data in binders of lawsuit will be
analyzed and classified easily. This will help judges in dealing
with the huge information attached in the cases easily. In
addition, it will help other parties in the lawsuit to access and
37
Fadiyya A. Mohsin and Hazem M. El-Bakry, A novel approach for speeding up secured litigation procedures, International Journal of
Scientific and Technical Advancements, Volume 1, Issue 4, pp. 37-43, 2015.
view these large data, thus the proposal system will save time,
efforts and costs. In addition to the era crimes, especially
terrorist crimes that contain huge and numerous evidences to
the extent make their inventorying may be difficult to link
them on paper, because of the geographical area to commit the
crime on the one hand, and the multiplicity of the perpetrators
and the diversity of its means on the other hand, which makes
dealing with the large number of evidence and information
Crime According to the paper-based system, is very difficult.
Not to mention the IT crimes which has spread dramatically in
the present day as a result of technological development,
which calls for considering the large of the data, which is
important evidence of the lawsuit, whether it was civil or
criminal. We cannot forget that international crimes as a crime
of genocide that are too big data [7].
It can be concluded the ability of our proposed system in
achieving the highest level of justice for litigants. Since, it
facilitate the judges to adopting and consider all the evidences
in the lawsuits which help to achieving justice, unlike the
traditional system, which relies large paper data that cannot be
examined by the judge and thus justice will not be achieved.
B. Cloud Computing
There different types of data for each investigated case in
the court. It is expected that, there will be a huge amount of
stored data especially in developed countries. So, it is needed
to store these huge data in cloud environment. The concept of
cloud computing, or computer services within internet
network, means a set of tasks related to a set of
communications and software that employing the software and
hardware devices connected to network servers which are
loaded with their data in a virtual cloud ,aiming to
guaranteeing continuous contact without interruption. This
technological boom has caused a big shift in ideas and
applications related to information technology services,
especially with regard to the infrastructure solutions on which
the companies and institutions depend in their completion and
facilitating of activities [1].We can say that the adoption of
cloud computing technologies is no longer an option for
organizations that seek for safety but it can be considered an
obligatory issue in its strategically fate. National Institute of
Standards and Technology has confronted (NIST) to
determine the meaning of cloud computing, this concept has
some significance in light of the prevailing belief is standard
and relying upon by them when dealing with cloud computing,
that perception to this concept has evolved along passage of
time.
The definition of the Institute as [5]: (cloud computing is a
model for enabling a timely and permanent access to the
network at any time, for the participation of a wide range of
computing services, which can be published and made
available with minimal effort or interaction with the service
provider) "By the definition of the National Institute several
characteristics of cloud computing can be extracted, that are
represented by the following
self-service without support
Easy access to the network
Fadiyya A. Mohsin and Hazem M. El-Bakry, A novel approach for speeding up secured litigation procedures, International Journal of
Scientific and Technical Advancements, Volume 1, Issue 4, pp. 37-43, 2015.
II.
Fadiyya A. Mohsin and Hazem M. El-Bakry, A novel approach for speeding up secured litigation procedures, International Journal of
Scientific and Technical Advancements, Volume 1, Issue 4, pp. 37-43, 2015.
40
Fadiyya A. Mohsin and Hazem M. El-Bakry, A novel approach for speeding up secured litigation procedures, International Journal of
Scientific and Technical Advancements, Volume 1, Issue 4, pp. 37-43, 2015.
R2013a) that has been used to create the program figure 4. The
case-study scenario consists of two forms; judge Form to
encrypt data and member form to decrypt data as shown in
figure 5(a, b).Performance of the method depends on the
devices specifications. During experiments judge car encrypt
various number of files system respond with (Size of file and
Encryption Time). Members can decrypt the Files again the
system responds with (Replacements, Size of file and
Decryption Time).
EXPERIMENTAL RESULTS
A. Data Measurements
The proposed system has been tested on large number of
data. The device specification (CPU Core I5 2.30 GHz,
4096RAM, Windows 10 Operating System and Matlab
Fig. 4. Main program form that control the entrance to the program as: 1judge 2-member.
(a)
(b)
Fig. 5. Log in form there are two login form; (a) Judge login form, (b) member login form.
(a)
(b)
Fig. 6. Two operational forms; (a) Upload form for judge to encrypt data with private key, (b) Download form for members to decrypt data with the same private
key.
41
Fadiyya A. Mohsin and Hazem M. El-Bakry, A novel approach for speeding up secured litigation procedures, International Journal of
Scientific and Technical Advancements, Volume 1, Issue 4, pp. 37-43, 2015.
B. Data Presentation
At the beginning of the experiments the system check the
type of entered person depends on (type and Account
information the system open the desired form). There exit two
operational forms; Upload form that can be accessed via Judge
(a)
(b)
Fig. 7. Number of characters respect to time; (a) No of encrypted char respect to time, (b) No of Decrypted char respect to time.
[6]
[7]
[8]
[9]
IV.
CONCLUSION
[10]
REFERENCES
[16]
[17]
[1]
[2]
[3]
[4]
[5]
[11]
[12]
[13]
[14]
[15]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26] http://courts.oregon.gov/Clackamas/docs/eCourt/UPDATED_Clackamas
-Oregon-eCourt-Bullet-Presentation-2014-11-12.pdf
[27] https://www.osbar.org/publications/bulletin/15febmar/ecourt.html
[28] https://www.osbplf.org/assets/in_briefs_issues/Oregon%20eCourt%20U
pdate%209%202015%20In%20Brief%20rev%201072015.pdf
[29] http://himachal.nic.in/WriteReadData/l892s/22_l892s/10-13678994.pdf
[30] http://www.sarkarinaukrisarch.in/e-courts-recruitment/
[31] http://www.egov.ufsc.br/portal/sites/default/files/06641835_0.pdf
[32] http://www.coe.int/t/dghl/cooperation/cepej/evaluation/2012/Rapport_en
.pdf
[33] http://www.flcourts.org/resources-and-services/court-technology/efiling/
[34] http://www.led.go.th/inter/pdf/2_Dr.Wan_presentation.pdf
[35] http://www.ibimapublishing.com/journals/JEGSBP/2012/925115/92511
5.pdf
[36] http://aja.ncsc.dni.us/courtrv/cr42-3and4/CR42-3McMillan.pdf
[37] http://oregonlawpracticemanagement.com/2014/11/24/are-you-ecourtready/
[38] http://www.p-a.it/images/pdf/jus_ecourt.pdf
[39] https://www.nycourts.gov/forms/
[40] http://www.apjrf.com/Beijing_Malaysia.pdf
[41] http://www.garph.co.uk/IJARMSS/Apr2014/4.pdf
[42] http://www.hershnerhunter.com/wordpress/wpcontent/uploads/KPN/ECourt_Diagram.pdf
[43] http://www.ojasmahiti.com/tag/e-courts-study-material-free-downloadpdf-in-hindi/
[44] http://content.tylerhost.net/docs/or/help/OdysseyFileandServeFAQ.pdf
[45] https://www.tenniscanada.com/wpcontent/uploads/2015/01/HalfcourtcurriculumMarch09.pdf
[46] http://www.lml.bas.bg/iccs2002/acs/breuker.pdf
[47] http://www.slideshare.net/WacomIndia/e-court-solution
[48] http://www.mncourts.gov/file-a-case/file-in-a-district-trial-court.aspx
[49] http://www.ecourt.ie/
[50] http://delhihighcourt.nic.in/writereaddata/upload/Notification/Notificatio
nFile_LC0S0PP0.PDF
[51] https://www.tylertech.com/productsheets/Odyssey/E-Court-MaturityModel-Brochure.pdf
[52] http://www.imagesoftinc.com/documents/pr/courts-today-bud-borja.pdf
43
Fadiyya A. Mohsin and Hazem M. El-Bakry, A novel approach for speeding up secured litigation procedures, International Journal of
Scientific and Technical Advancements, Volume 1, Issue 4, pp. 37-43, 2015.