Multi-Level security model in distributed database systems

被引:0
作者
Bakir, Cigdem [1 ]
Guclu, Mehmet [1 ]
机构
[1] Yildiz Tekn Univ, Bilgisayar Muhendisligi Bolumu, Elekt Elekt Fak, Istanbul, Turkey
来源
PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI | 2022年 / 28卷 / 02期
关键词
Access control; Bell-Lapuda; Security; Confidentilality; INTERNET;
D O I
10.5505/pajes.2021.69947
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Information security is related with efforts put in to avoid activities such as unauthorized usage, changing or disseminating of information by having access to this information. This should not be only thought as capturing of information but also as avoiding the violation of particulars such as integrity, availability, and confidentiality. Vulnerability that occurs in any one of these three basic elements will be evaluated as violation of information security. In this study, a multi-level access control method was developed. With the model proposed, in addition to the security policies offered by the Bell-LaPadula access control model, a new set of rules was defined and expanded, and a flexible and dynamic access control model was presented. The developed model being proposed in the study has been applied on data cluster which has been obtained from real life. Performance of the proposed model has been compared with the performances of Traditional Access Control models. When the obtained results were compared, it was observed that object access levels were presented more consistently and quickly with the proposed model.
引用
收藏
页码:266 / 276
页数:11
相关论文
共 30 条
[1]  
Abidin S, ADV COMPUTER COMMUNI, V1158, P2021
[2]  
Andress Jason., 2011, The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
[3]  
[Anonymous], 2009, NDSS
[4]  
Balamurugan B, 2015, INNOVATION INFORM CO
[5]   Database security - Concepts, approaches, and challenges [J].
Bertino, E ;
Sandhu, R .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (01) :2-19
[6]   A metamodel of access control for distributed environments: Applications and properties [J].
Bertolissi, Clara ;
Fernandez, Maribel .
INFORMATION AND COMPUTATION, 2014, 238 :187-207
[7]  
Charaf L., 2020, 2020 1 INT C INNOVAT
[8]  
Crampton J, 2006, ACM S ACC CONTR MOD
[9]   Multi-user permission strategy to access sensitive information [J].
Dasgupta, Dipankar ;
Roy, Arunava ;
Ghosh, Debasis .
INFORMATION SCIENCES, 2018, 423 :24-49
[10]  
Elmagarmid A., 1999, MANAGEMENT HETEROGEN