Security Model Based on Network Business Security
Abstract
Network services enable us to transfer
data from one machine to another machine like
email services, net banking, messaging and many
more but this advantage brings a security issue
where attackers my hack network connection and
steal data and to overcome from this problem
author of this paper applying data security and
network security for business application. Data
security means applying cryptography (encryption)
on the data so attackers cannot identify anything
from it and business network security means
allowing only authorized process to ONLY READ
FILE, ONLY WRITE, BOTH READ & WRITE,
NOT ALLOWED READ & WRITE. So by
applying such rules we can provide security to any
business network. This business application can
anything like banking server, furnace heat
monitoring server and by setting rules only allowed
process to perform given action.
We don’t have any banking server or
furnace server to apply such rules so I have
designed file operations application server where
admin will upload files and then set rules such as
READ ONLY FILE, WRITE ONLY FILE, BOTH
ALLOWED or NONE ALLOWED. So users of
this file will be allowed to perform rules on the file
set by admin. By setting rules we provided security
to business network and then we are saving file by
applying encryption to provide security to file data.
Downloads
References
Stallings, W. (2017). Cryptography and
Network Security: Principles and Practice
(7th ed.). Pearson Education.
2. Kurose, J. F., & Ross, K. W. (2016).
Computer Networking: A Top-Down
Approach (7th ed.). Pearson Education.
3. Denning, D. E. (1982). Cryptography and
Data Security. Addison-Wesley.
4. Diffie, W., & Hellman, M. (1976). New
directions in cryptography. IEEE
Transactions on Information Theory,
22(6), 644-654.
5. Bellovin, S. M., & Cheswick, W. R.
(1994). Firewalls and Internet Security:
Repelling the Wily Hacker. Addison-
Wesley.
6. Anderson, R. J. (2001). Security
Engineering: A Guide to Building
Dependable Distributed Systems. Wiley.
7. Sandhu, R., Coyne, E. J., Feinstein, H.
L., & Youman, C. E. (1996). Role-based
access control models. IEEE Computer,
29(2), 38-47.
8. Schneier, B. (1996). Applied
Cryptography: Protocols, Algorithms, and
Source Code in C (2nd ed.). Wiley.
9. Bishop, M. (2002). Computer Security:
Art and Science. Addison-Wesley.
10. Kaufman, C., Perlman, R., & Speciner,
M. (2002). Network Security: Private
Communication in a Public World (2nd
ed.). Prentice Hall.
11. Whitman, M. E., & Mattord, H. J.
(2010). Principles of Information Security
(4th ed.). Cengage Learning.
12. Zhou, L., & Haas, Z. J. (1999). Securing
ad hoc networks. IEEE Network, 13(6),
24-29.
13. Gollmann, D. (2011). Computer Security
(3rd ed.). Wiley.
14. Tanenbaum, A. S., & Wetherall, D. J.
(2010). Computer Networks (5th ed.).
Prentice Hall.
15. Bailey, D., & Chadwick, D. (2005). Trust
models for federated security: Application
to secure file exchange. Journal of
Computer Security, 13(4), 469-493.
16. Pfleeger, C. P., & Pfleeger, S. L. (2006).
Security in Computing (4th ed.). Prentice
Hall.
17. Ferguson, N., & Schneier, B. (2003).
Practical Cryptography. Wiley.
18. Gibson, D. (2006). Building secure
networks for business. Journal of Network
Security, 14(7), 1-11.
19. Schnittger, D. (2010). Network Security
and Cryptography. McGraw-Hill.
20. Xu, X., & Li, H. (2015). Secure
communication protocols for enterprise
network systems. International Journal of
Computer Networks & Communications,
7(6), 34-50.