Security Model Based on Network Business Security

Authors

  • GURAJAPU RAJ KUMAR PG scholar, Department of MCA, DNR collage, Bhimavaram, Andhra Pradesh. Author
  • B.S.MURTHY (Assistant Professor), Master of Computer Applications, DNR collage, Bhimavaram, Andhra Pradesh. Author

Abstract

Network services enable us to transfer
data from one machine to another machine like
email services, net banking, messaging and many
more but this advantage brings a security issue
where attackers my hack network connection and
steal data and to overcome from this problem
author of this paper applying data security and
network security for business application. Data
security means applying cryptography (encryption)
on the data so attackers cannot identify anything
from it and business network security means
allowing only authorized process to ONLY READ
FILE, ONLY WRITE, BOTH READ & WRITE,
NOT ALLOWED READ & WRITE. So by
applying such rules we can provide security to any
business network. This business application can
anything like banking server, furnace heat
monitoring server and by setting rules only allowed
process to perform given action.
We don’t have any banking server or
furnace server to apply such rules so I have
designed file operations application server where
admin will upload files and then set rules such as
READ ONLY FILE, WRITE ONLY FILE, BOTH
ALLOWED or NONE ALLOWED. So users of
this file will be allowed to perform rules on the file
set by admin. By setting rules we provided security
to business network and then we are saving file by
applying encryption to provide security to file data.

Downloads

Download data is not yet available.

References

Stallings, W. (2017). Cryptography and

Network Security: Principles and Practice

(7th ed.). Pearson Education.

2. Kurose, J. F., & Ross, K. W. (2016).

Computer Networking: A Top-Down

Approach (7th ed.). Pearson Education.

3. Denning, D. E. (1982). Cryptography and

Data Security. Addison-Wesley.

4. Diffie, W., & Hellman, M. (1976). New

directions in cryptography. IEEE

Transactions on Information Theory,

22(6), 644-654.

5. Bellovin, S. M., & Cheswick, W. R.

(1994). Firewalls and Internet Security:

Repelling the Wily Hacker. Addison-

Wesley.

6. Anderson, R. J. (2001). Security

Engineering: A Guide to Building

Dependable Distributed Systems. Wiley.

7. Sandhu, R., Coyne, E. J., Feinstein, H.

L., & Youman, C. E. (1996). Role-based

access control models. IEEE Computer,

29(2), 38-47.

8. Schneier, B. (1996). Applied

Cryptography: Protocols, Algorithms, and

Source Code in C (2nd ed.). Wiley.

9. Bishop, M. (2002). Computer Security:

Art and Science. Addison-Wesley.

10. Kaufman, C., Perlman, R., & Speciner,

M. (2002). Network Security: Private

Communication in a Public World (2nd

ed.). Prentice Hall.

11. Whitman, M. E., & Mattord, H. J.

(2010). Principles of Information Security

(4th ed.). Cengage Learning.

12. Zhou, L., & Haas, Z. J. (1999). Securing

ad hoc networks. IEEE Network, 13(6),

24-29.

13. Gollmann, D. (2011). Computer Security

(3rd ed.). Wiley.

14. Tanenbaum, A. S., & Wetherall, D. J.

(2010). Computer Networks (5th ed.).

Prentice Hall.

15. Bailey, D., & Chadwick, D. (2005). Trust

models for federated security: Application

to secure file exchange. Journal of

Computer Security, 13(4), 469-493.

16. Pfleeger, C. P., & Pfleeger, S. L. (2006).

Security in Computing (4th ed.). Prentice

Hall.

17. Ferguson, N., & Schneier, B. (2003).

Practical Cryptography. Wiley.

18. Gibson, D. (2006). Building secure

networks for business. Journal of Network

Security, 14(7), 1-11.

19. Schnittger, D. (2010). Network Security

and Cryptography. McGraw-Hill.

20. Xu, X., & Li, H. (2015). Secure

communication protocols for enterprise

network systems. International Journal of

Computer Networks & Communications,

7(6), 34-50.

Downloads

Published

2025-05-23

Issue

Section

Articles

How to Cite

Security Model Based on Network Business Security. (2025). International Journal of Multidisciplinary Engineering In Current Research, 10(5), 697-702. https://ijmec.com/index.php/multidisciplinary/article/view/723