oalogo2  

AUTHOR(S):

Seyed Mahmood Hashemi, Jingsha He

 

TITLE

A Fuzzy Layered Security Management in Distributed Scheme

pdf PDF

KEYWORDS

Layering security management, fuzzy system, fuzzy clustering

ABSTRACT

This paper presents a layering system that provides security in distributed environment such as network. There is probability to vanish security relation with disability of nodes, but in proposed layering system enables to keep security relations after disability some nodes. Security relations belong to 3 different sets, so a fuzzy system combines the security rules that describe the security policy. One layer in the proposed system assign to the security rules and another layer assign to the objects in the system. Objects are grouped to security rules. Grouping the objects is done via clustering. Access requests must be sent to security layer to check and then it decides to allow them. Fuzzy clustering is used in this paper to cluster the objects for its flexibility.

REFERENCES

[1]. Gerardo Canfora, Elisa Costante, Igino Pennino, Corrado Aaron Visaggio, “A TreeLayered Model to Implement Data Privacy Policies”, ELSEVIER, Computer Standards & Interfaces, 30 (2008) 398-409

[2]. Zheng Yan, Peng Zhang, Athanasios V. Vasilakos, “A Survey of Trust Management for Internet of Things”, ELSEVIER, Journal of Network and Computer Application, 42 (2014) 120-134

[3]. Deanna Hlavacek, J. Morris Chang, “A Layered Approach to Cognitive Radio Network Security: A Survey”, ELSEVIER, Computer Networks, 2014, http://dx.doi.org/10.1016/j.comnet.2014.10.001

[4]. Lin Cai, Roberto Rojas-Cessa, “Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme”, Supported by National Science Foundation under Grant Award 0435250

[5]. Bo Zong, Feng Xu, Jun Jiao, Jian Lv, “A Broker-Assisting Trust and Reputation System Based on Artificial Neural Network”, Proceeding of the 2009 IEEE International Conference on Systems, Man and Cybernetics, 2009

[6]. Peng Zhou, Xiapu Luo, Ang Chen, Rocky K.C. Chang, “SGor: Trust Graph based onion routing”, ELSEVIER, Computer Networks, 57 (2013) 3522-3544

[7]. Alberto Coen-Porisini, Sabrina Sicari, “Improving Data Quality Using a Cross Layer Protocol in Wireless Sensor Networks”, ELSEVIER, Computer Networks, 56 (1012) 3655-3665

[8]. Fangfei Weng, Qingshan Jiang, Liang Shi, Nannan Wu, “An Intrusion Detection System Based on the Clustering Ensemble”, IEEE, 1- 4244-1035-5/07/$25.00, 2007

[9]. Eduardo Raul Hruschka, Ricardo J. G. B. Campello, Alex A. Freitas, Andre C. Ponce Leon F. De Carvalho, “A Survey of Evolutionary Algorithms for Clustering”, IEEE TRANSACTION ON SYSTEMS, MAN AND 20 CYBERNETICS—PART C: APPLICATION AND REVIEWS, Vol. 39, No. 2, 2009

[10]. Li Tian, Wang Jianwen, “Research on Network Intrusion Detection System Based on Improved K-means Clustering Algorithm”, IEEE, 2009 International Forum on ComputerScience Technology and Applications,

[11]. Lotfi A. Zadeh, “Fuzzy Sets”, Information and Control, 338-353, 1965

[12]. Lotfi A.Zadeh, “The birth and evolution of fuzzy logic”, International Journal of General Systems 17, 95-105, 1990 [13]. Li-Xing Wang, “A Course in Fuzzy Systems and Control”, Prentice-Hall International Inc., pp 118-127

Cite this paper

Seyed Mahmood Hashemi, Jingsha He. (2016) A Fuzzy Layered Security Management in Distributed Scheme. International Journal of Computers, 1, 15-21

 

cc.png
Copyright © 2017 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0