•  
  •  
 

Abstract

At this cloud age, there is tremendous growth in business, services, resources, and cloud technology. This growth comes with a risk of unsafe, unordered, and uncertainty due to unauthorized access and theft of confidential propriety data. Our objective is to model around Read, Write and Execute to resolve these unordered, unsafe, and uncertain issues. We will develop a L-Shape pattern model matching UFS ACM to minimize the accessibilities based on RIGHT & ROLE of the resources and maximize the quality of services for safety and high availability. The preventive, detective, corrective (PDC) services are the major roles for all levels of management to coordinate, control the multiple technologies and resources which are working simultaneously. It will be more ordered, accountable, and actionable on real-time access control mechanism for scalabilities, reliability, performance, and high availability of computational services. We have to make safer, certain, unified, and step-by-step normalization by applying this UFS ACM mechanism on UNIX operating system. This proposed research paper covers a wide range of areas covering optimization, normalization, Fuzzy Low, and Risk assessment.

References

Andrew, Bill; Richard (2018) “UNIX Network Programming” New Delhi India, PHI

Aloul, F., Al-Ali, A.R., Al-Dalky, R., Al-Mardini, M., El-Hajj. (2012). Smart grid security: Threats, vulnerabilities and solutions. International Journal of Smart Grid and Clean Energy 1(1), 1–6.

Antonio F.S., Ramos Jose L.H., Moreno M.V.(March, 2014) A decentralized approach for Security and Privacy challenges in the Internet of Things. Proceedings of the IEEE World Forum on Internet of Things; Seoul, Korea, pp. 67–72.

Bernard, K. (2007). Discrete mathematical structures. New Delhi, India: Person Education India (PHI).

Busch, M., Koch, N., Suppan, S.(2014). Modeling Security Features of Web Applications. In: Heisel, M., Joosen, W., Lopez, J., Martinelli, F. (eds.) Engineering Secure Future Internet Services. LNCS, vol. 8431, pp. 119–139. Springer, Heidelberg.

Beckers, K., Faßbender, S., Heisel, M., Küster, J.-C., Schmidt. (2012). Supporting the development and documentation of ISO 27001 Information Security Management Systems through security requirements engineering approaches. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol. 7159, pp. 14–21. Springer, Heidelberg.

Beckers, K., Hatebur, D., Heisel, M. (2013). A problem-based threat analysis in compliance with Common Criteria. In: Proceedings of the International Conference on Availability, Reliability and Security (ARES 2013), pp. 111–120.

Beckers, K., Heisel, M., Solhaug, B., Stølen.(2013).: ISMS-CORAS – A structured method for establishing an ISO 27001 compliant information security management system. Tech. Rep. A25626, SINTEF ICT (2013).

Bertolino, A., Daoudagh, S., El Kateb, D., Henard, C., Le Traon, Y., Lonetti, F., Marchetti, E., Mouelhi, T., Papadakis. (2013). Similarity testing for access-control. Submitted to Information and Software Technology.

Andrew Mallet. (2014). CentOS System Administration Essential, Packt Pub;lishing https://www.packtpub.com/product/centos-system-administration-essentials/9781783985920

CISA Review Manual 26th Edition. (2013). ISAC, USA.

CISA Certification Guide. (2017). ISACA, USA

Coriolis. (2017). CISSP exam cram.Coriolis Group Books. New Delhi, India: Dreamatech.

D. Hussein, E. Bertin, and V. Frey. (2017). A community-driven access control approach in Distributed environments,” IEEE Communications Magazine, vol. 55, no. 3, pp. 146–153.

Fitzgerald, W.M., Turkmen, F., Foley, S.N., O’Sulliva, B.(2012). Anomaly analysis for physical access control security configuration. In: Proceedings of the 7th International Conference on Risks and Security of Internet and Systems.

Fotiou N, Machas A, Polyzos GC, Xylomenos G (2014) Access control delegation for the cloud In: Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference On, 13–18.. IEEE, Canada.

Hwang, Kai. (2008). Advance computer architecture. New Delhi, India: Tata McGraw Hill.

H. Ren, Y. Song, S. Yang, and F. Situ.(2016). “Secure smart home: A voiceprint and internet-based authentication system for remote accessing,” in Proceedings of the 11th International Conference on Computer Science and Education, ICCSE 2016, pp. 247–251.

I.Agadakos, P. Hallgren, D. Damopoulos, A. Sabelfeld, and G. Portokalidis.(December 2016). “Location-enhanced authentication using the IoT because you cannot be in two places at once,” in Proceedings of the 32nd Annual Computer Security Applications Conference, ACSAC 2016, pp. 251–264, USA.

J. L. H. Ramos, M. P. Pawlowski, A. J. Jara, A. F. Skarmeta, and L. Ladid.(2015). “Toward a lightweight authentication and authorization framework for smart objects,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 4, pp. 690–702.

Montesino, R., Fenz, S.: Information security automation: How far can we go? In: Sixth International Conference on Availability, Reliability and Security (ARES 2011), pp. 280–285. IEEE Computer Society (2011).

M. Cagnazzo, M. Hertlein, and N. Pohlmann.(2016). An Usable Application for Authentication, Communication and Access Management in the Internet of Things, Springer International Publishing, Cham, Switzerland.

M. Trnka and T. Cerny.(2017). Authentication and authorization rules sharing for internet of things,” Software Networking, no. 1, pp. 35–52.

N. Shone, C. Dobbins, W. Hurst, and Q. Shi.(2015). Digital memories based mobile user authentication for IoT,” in Proceedings of the IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, pp. 1796–1802.

Padma Pradhan.(April-June, 2017). Proposed Heuristics Model Optimizing the Risk on RTS", IJSDA6.2. WOS 2160-9772.

Padma Pradhan.(2017). Proposed Round Robin CIA Pattern on RTS for Risk Assessment: IS Security & Risk Assessment", IJDCF9.1 WOS, Scopus 1941-6210.

Padma.(2018).Dynamic Scripting Language Optimizing theRisk on RTOS, IJCNIS vol.10.9(47-59).

R. Roman, J. Zhou, and J. Lopez.(2013). “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, vol. 57, no. 10, pp. 2266–2279.dministrator

Loger & Lom. (2017).System Administrator Ethics, Apress (https://www.oreilly.com/library/view/system-administration-ethics/9781484249888)

S. Bandara, T. Yashiro, N. Koshizuka, and K. Sakamura.(2016). “Access control framework for API-enabled devices in smart buildings,” in Proceedings of the 22nd Asia-Pacific Conference on Communications, APCC 2016, pp. 210–217.

S. Lee, J. Choi, J. Kim.(2017). FACT: Functionality-centric access control system for IoT programming frameworks,” in Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies, SACMAT 2017, pp. 43–54, USA.

Shon, H. (2012). Security mgmt practices. New Delhi, India: Wiley Publishing Inc.

Sumitabh, Das. (2017). UNIX system V UNIX concept & application. Delhi, India: Tata McGraw Hill.

Sun-Microsystems.(2003). UNIX Sun Solaris system administration. USA

S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini.(2015). Security, privacy and trust in Internet of Things: the road ahead,” Computer Networks, vol. 76, pp. 146–164.

Tran, L.M.S., Solhaug, B., Stølen, K.(2013) An approach to select cost-effective risk countermeasures. In: Wang, L., Shafiq, B. (eds.) DBSec 2013. LNCS, vol. 7964, pp. 266–273. Springer, Heidelberg.

Tanenbaum. (2010). Operating System Design And Implementation. New Delhi, India: Person Education India (PHI).

Tanenbaum.(2009). Computer Network. New Delhi, India: Person Education India (PHI).

O’ Reilly. (2002). Essential of system administration. O’ Reilly Media. USA

Weber, Ron. (2014). Information system control & audit. New Delhi, India: Person Education India (PHI).

Trent R Hein.(2017). Unix and Linux System Administration Hand Book, 5th Edition, Addisin Wesley, New Delhi, India.

Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao.(2017). A Survey on Security and Privacy Issues in Internet-of-Things,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1250–1258.

Xu, D., Thomas, L., Kent, M., Mouelhi, T., Le Traon.(2017). A model-based approach to automated testing of access control policies. In: Proc. of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 209–218.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.