International Journal of P2P
Network Trends and Technology

Research Article | Open Access | Download PDF
Volume 8 | Issue 5 | Year 2018 | Article Id. IJPTT-V8I5P402 | DOI : https://doi.org/10.14445/22492615/IJPTT-V8I5P402

An Enhanced Approach of Access Control Method in a Distributed Environment


Abdullah Shakoor, Ali Raza

Citation :

Abdullah Shakoor, Ali Raza, "An Enhanced Approach of Access Control Method in a Distributed Environment," International Journal of P2P Network Trends and Technology (IJPTT), vol. 8, no. 5, pp. 6-8, 2018. Crossref, https://doi.org/10.14445/22492615/IJPTT-V8I5P402

Abstract

The purpose of this research is to enhance access control method in a distributed environment. An analysis was discussed among different access control methods. Data on a distributed link is at high risk now days. It should be secured from both internal and external attacks. An unauthorized access towards a data may harm the privacy and policies of an organization. So, it is necessary to secure the database from unauthorized access in a distributed environment. Different Access control techniques were used to secure the database from an intruder. With the growth of internet distributed databases are being used a growing number of rate. It is very important to control the access mechanism in a distributed data-base. Distributed database is distributed physically in a variety of web sites and is integrated logically together. To access the data different privileges are granted to make sure that your data is secure from an unauthorized access as well as from bad use. An approach that works efficiently was preferred by comparing all approaches. In this regard major focus was on privilege of data authorization

Keywords

Access Control; Authorization; Distributed Environment

References

[1] Fan, Y., Z. Han, J. Liu and Y., Zhao. 2009. A mandatory access control model with enhanced flexibility. In 2009 International Conference on Multimedia Information Networking and Security. 1: 120-124.
[2] Gorla, D. and R. Pugliese. 2009. Dynamic management of capabilities in a network aware coordination language. The Journal of Logic and Algebraic Programming. 78(8): 665-689.
[3] Msahli, M., R. Abdeljaoued and A. Serhrouchni. 2013. Access control in probative value cloud. In Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for 607-611.
[4] Bacon, J., K. Moody and W. Yao. 2002. A model of OASIS role-based access control and its support for active security. ACM Transactions on Information and System Security (TISSEC), 5(4): 492-540.
[5] Bellavista, P., A. Corradi, R. Montanari and C. Stefanelli. 2003. Dynamic binding in mobile applications. IEEE Internet Computing. 7(2): 34-42.
[6] Cuppens, F. and A. Miège. 2003. Modelling contexts in the Or-BAC model. In Computer Security Applications Conference, 2003. Proceedings. 19th Annual.416-425.