Efficient Context-aware File System Approach

被引:0
作者
Razaque, Abdul [1 ]
Amsaad, Fathi [2 ]
Almiani, Muder [3 ]
Wan Xiaoya [4 ]
Li Shiyu [4 ]
Ganda, Raouf [5 ]
Rawashdeh, Majdi [6 ]
AlRahayfeh, Amer [3 ]
机构
[1] Dept Comp Engn & Telecommun, Richardson, TX 75080 USA
[2] Eastern Michigan Univ, Sch Informat Secur, Ypsilanti, MI 48197 USA
[3] Al Hussein bin Talal Univ, Coll Informat Technol, Maan, Jordan
[4] NYIT, Dept Comp Sci, Nanjing, Peoples R China
[5] Yale Univ, Yale Sch Management, New Haven, CT 06520 USA
[6] Princess Sumaya Univ Technol, Dept Business Informat Technol, Amman, Jordan
来源
2020 SEVENTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS) | 2020年
关键词
context awareness; file system; user authority;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the rapid development of science and technology, wireless networks are now widely used throughout the world. Given the requirement to improve the usability of computers, a context-aware file system has been rendered as an important research topic. Enhanced methods must be proposed to improve the accuracy of user authority in such systems. In this study, we introduce a combined approach involving the historical and physical user contexts to gain the contextual information for the file system. We proposed a role-based access control (RBAC) based on context awareness model, which is an extension of the traditional RBAC model, to implement context awareness in the users' permission for the file system. Using the context constraints, the file system can control the access of the user to protect the file system from damages caused by hackers. Results showed that the proposed method is more accurate than traditional ones because it can control the user access through context awareness.
引用
收藏
页码:226 / 230
页数:5
相关论文
共 20 条
[1]   Improving the Reliability of Deep Neural Networks in NLP: A Review [J].
Alshemali, Basemah ;
Kalita, Jugal .
KNOWLEDGE-BASED SYSTEMS, 2020, 191
[2]  
[Anonymous], 2011, WORLD WIR MOB MULT N
[3]   Experimental comparison of simulation tools for efficient cloud and mobile cloud computing applications [J].
Bahwaireth K. ;
Tawalbeh L. ;
Benkhelifa E. ;
Jararweh Y. ;
Tawalbeh M.A. .
EURASIP Journal on Information Security, 2016 (1)
[4]  
Black D., 2012, Social and Organizational Impacts of Emerging Mobile Devices: Evaluating Use, P172
[5]  
Black Darren, 2012, SOCIAL ORG IMPACTS E, P172
[6]  
Chen H., 2003, PhD Thesis,
[7]   A context-aware semantic similarity model for ontology environments [J].
Dong, Hai ;
Hussain, Farookh Khadeer ;
Chang, Elizabeth .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (05) :505-524
[8]  
Haque A, 2016, INT CONF INFORM COMM, P96, DOI 10.1109/IACS.2016.7476093
[9]   The effectiveness of a meaningful learning-based evaluation model for context-aware mobile learning [J].
Huang, Yueh-Min ;
Chiu, Po-Sheng .
BRITISH JOURNAL OF EDUCATIONAL TECHNOLOGY, 2015, 46 (02) :437-447
[10]  
Jararweh Y., 2012, J. Inf. Secur, V3, P69, DOI [10.4236/jis.2012.32008, DOI 10.4236/JIS.2012.32008]