Submit Search
Upload
Authentication and Authorization for User Roles and Device for Attack Detection in Relational Data
•
0 likes
•
48 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i7/IRJET-V4I7362.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
IRJET Journal
Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
IRJET Journal
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
AM Publications
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET Journal
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Simran Seth
E1802052327
E1802052327
IOSR Journals
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET Journal
J1802056063
J1802056063
IOSR Journals
Recommended
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
IRJET Journal
Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
IRJET Journal
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
AM Publications
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET Journal
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Simran Seth
E1802052327
E1802052327
IOSR Journals
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET Journal
J1802056063
J1802056063
IOSR Journals
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET Journal
Do4301690695
Do4301690695
IJERA Editor
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Telefónica
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET Journal
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
eSAT Publishing House
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Editor IJCATR
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
Vulnerabilities detection using attack recognition technique in multi-factor ...
Vulnerabilities detection using attack recognition technique in multi-factor ...
TELKOMNIKA JOURNAL
Final review ppt
Final review ppt
Rana sing
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
Rana sing
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
journal ijrtem
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
IRJET Journal
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
International Journal of Technical Research & Application
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
IJCI JOURNAL
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation Blast
IRJET Journal
Kg2417521755
Kg2417521755
IJERA Editor
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
IJNSA Journal
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
IJNSA Journal
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
IJRES Journal
Intrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin Authorization
IJMTST Journal
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless...
IRJET Journal
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET Journal
More Related Content
What's hot
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET Journal
Do4301690695
Do4301690695
IJERA Editor
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Telefónica
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET Journal
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
eSAT Publishing House
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Editor IJCATR
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
Vulnerabilities detection using attack recognition technique in multi-factor ...
Vulnerabilities detection using attack recognition technique in multi-factor ...
TELKOMNIKA JOURNAL
Final review ppt
Final review ppt
Rana sing
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
Rana sing
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
journal ijrtem
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
IRJET Journal
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
International Journal of Technical Research & Application
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
IJCI JOURNAL
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation Blast
IRJET Journal
Kg2417521755
Kg2417521755
IJERA Editor
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
IJNSA Journal
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
IJNSA Journal
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
IJRES Journal
What's hot
(19)
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
Do4301690695
Do4301690695
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
Vulnerabilities detection using attack recognition technique in multi-factor ...
Vulnerabilities detection using attack recognition technique in multi-factor ...
Final review ppt
Final review ppt
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation Blast
Kg2417521755
Kg2417521755
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
Similar to Authentication and Authorization for User Roles and Device for Attack Detection in Relational Data
Intrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin Authorization
IJMTST Journal
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless...
IRJET Journal
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET Journal
IRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart Grid
IRJET Journal
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
IRJET Journal
Vulnerability Management System
Vulnerability Management System
IRJET Journal
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
IRJET- Insider Interruption Identification and Protection by using Forens...
IRJET- Insider Interruption Identification and Protection by using Forens...
IRJET Journal
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM
IRJET Journal
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
YogeshIJTSRD
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
eSAT Publishing House
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing
IRJET Journal
IRJET- Machine Learning based Network Security
IRJET- Machine Learning based Network Security
IRJET Journal
A Study on Vulnerability Management
A Study on Vulnerability Management
IRJET Journal
Enhanced Security Through Token
Enhanced Security Through Token
IRJET Journal
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
IRJET Journal
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
IJRTEMJOURNAL
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
pharmaindexing
IRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET Journal
Similar to Authentication and Authorization for User Roles and Device for Attack Detection in Relational Data
(20)
Intrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin Authorization
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless...
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart Grid
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
Vulnerability Management System
Vulnerability Management System
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET- Insider Interruption Identification and Protection by using Forens...
IRJET- Insider Interruption Identification and Protection by using Forens...
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing
IRJET- Machine Learning based Network Security
IRJET- Machine Learning based Network Security
A Study on Vulnerability Management
A Study on Vulnerability Management
Enhanced Security Through Token
Enhanced Security Through Token
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
IRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication Systems
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
RajaP95
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
asadnawaz62
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
me23b1001
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Recently uploaded
(20)
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Authentication and Authorization for User Roles and Device for Attack Detection in Relational Data
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1698 AUTHENTICATION AND AUTHORIZATION FOR USER ROLES AND DEVICE FOR ATTACK DETECTION IN RELATIONAL DATA Miss. Aditi V. Bhadke1, Prof. Jyoti Raghatwan2 1Ms. Aditi V. Bhadke, R. M. Dhariwal Sinhgad School of Engineering, Pune 2Prof. Jyoti Raghatwan , R.M. Dhariwal Sinhgad School of Engineering, Pune ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract- Now a day's information security is worried for digital assaults, malicious activity, cyber crime, etc. Information sharing in industrial territory has lost protection of the information like social application, industrial data, relational database, and smart services. There are number of users with smarts gadgets and equipment, including official authorities, understudies and individuals, data administrator and so on., these user human resources different services on smart devices like smart grid devices gathering of web users for accessing web services. Likewise database administrator for accessing application database, Relational databases are used to access and update and expel information from by human resources like DBA. In this way proposed system executes secure way to deal with limits distinctive insider and outcast assault to utilize human resource data. These novel methodologies show the technique for user policy based administration. Digital signature based security is accommodated get to control for relational database. Key Words: Insider Attacks, Anomaly Detection, Application Profile, SQL Injection,digital signature, User role access control etc. 1. INTRODUCTION Relational database is wide applicationstoragefortheirdata like individual data, information records. There is insufficient security for user data storage. Relational database approaching for various users at time. There are numerous human resources used to perform operation like insert, update, erase over relational database. Because of tremendous storage of relational databases assault incorporates insider and outcast assault over information and assets. SQL infusion, XSS assault these are zombie may make genuine danger to application and database server. Existing work actualize symmetric key based security over smart network. In any case, in the event that a mutual key is traded off, it can uncover the secret data to the gatecrashers. Further, an assailant can't separateanydata in view of connection capacity among varioussmartdevices,as these gadgets store hash values comparing to every user roles. For every gadget, these qualities are diverse for every user roles. This strategy conquer distinctiveoutsideassaults and additionally insider assaults, incorporating man-in-the- middle assaults, replay assaults, SQL injection assaults, attacks by client or user of the framework, known key assaults, and denial attacks. Proposed work avoids insider assaults where (i) a user accesses the gadget with the affirmation of his/her friend or relative without exhorting him/her, and (ii) a maverick device is installed by a authorized to engineer in the framework. Relational databases, smart grid network, application service are succumbs to be threaten by unauthorized entity for information misuse. Malicious user actions can threaten the application server to misuse the data. The user and device authorizationismaintainedsothat each user can perform only those actions those are allowed under the access permissions granted to it. Authenticationis performed by verifying user identity of each user and their system resources. User and device authentication and authorization motivate both batchsignatureverificationand device verification. One time password is used to user authentication which motivate for device verificationbyone time password generation. Secure secret key generation in bilinear pairing for user and device authentication and authorization. Data computing technique motivates system to formulate problem for detecting insider and outsider attack to misuse the system. Graph based user to user relation identificationforonlineaccesscontrol forresources. Every user might need to express their own particular inclinations on how their own particular or related substance ought to be uncovered. A framework wide get to control arrangement, for example, to find incompulsoryand part based get to control, does not address this issue. Get to control in network facilitate contrasts from optional get to control in that users other than the asset proprietor are likewise permitted to arrange the strategies of the related asset. Moreover, users who are identified with the getting to user, this framework needs to on the whole use these individualized strategies from users identified with the getting to user or the objective, alongside the framework determined approaches for control choices. Proposed procedure gives a two-factor authentication. In any case the affirmation is performed for each user and moreover the device with particular kind identity in a bundle with the signature verification of each device at the server of the substation. By then, a one-time mystery key (OTP) is generated. This OTP policy follows as half part OTP is sent to the user's mobile phone with a particular ultimate objective and half part of OTP is sent by mail to the user to check the genuine user who is accessing the device. Proposed work likewise contributes for managing physical and remote access for assets like smart
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1699 framework. These smart devices are more defenseless against intimidate for framework. The proposed framework incorporates: User to User relationship: In social media network manage security by user to user relationship for implementing user relation based access control. Access Mode based attack detection: This approach is based the investigation andprofilingof the application in wording to make succient representation of its connection with the database. Such a profile keeps a signature for each submitted query furthermore the significant constraints that the application program must finish to present the query. After that, in thedetectionphase, whenever the application issues a query, a module catches the query before it finds the database and checks the compatible signature andcontrol againstthepresentcontext of the application. If there is a mismatch,thequeryismarked as anomalous. Policy based authentication: In this approach user policy is used for access control authentication at database server and application server. It helps in authorization to user access by access policy. User role based administrative action: Multi admin user authenticationschemeisdesigned for user role policy used at service provider. In this paper we study about the related work done, in section II, the proposed approach, modules, its description, mathematical modeling, algorithms in section III, experimental setup, expected results, accuracy comparison graphs and results discussions in section IV and at final we provide a conclusion and future scope in section V. 2. LITRATURE SURVEY Some past survey for related work has been done here: In [1], the original user is accessinginformationmade by the correct device at the expected area at the best possible time, communicated by utilizing the expected protocol, and the information hasn’t been changed. Many individuals demonstrate the grid’s control frameworks as working in a situation of certain trust, which has affected design decisions. In the event that a few members aren’t trustfulness, new techniques of addressing to these past existing monitoring methodologies may be required. In [2], framework proposes a novel authentication conspire that utilizes the Merkle hash tree method to secure smart gird correspondence. Especially, the proposed authentication method considers the smart meters with count obliged assaults and puts thelessfiguringoverheadon them. Comprehensivesecurityexaminationdemonstratesits Security quality, to be specific, flexibility tothereplayattack, the message injection attack, the message investigation attack, and the message change attack. In [3], Outsider attacks give a genuine danger to grid operations on specific interest are sparse attacks that include the compromise of a moderate number of meter readings. A productive algorithm to locate all unremarkable attacks including the trade off of precisely two power injection meters and a arbitrary number of powermeterson lines is displayed. This requires flopsfora powerframework with buses and line meters. In the event that all lines are metered, there exist accepted structures that describe every one of the 3, 4, and 5-sparseun perceptible attacks. In [4], proposed work presents new approach, secure, and versatile M2M information collection protocol for the Smart Grid. Framework utilizesa hierarchical approachwith Delegate hubs gathering and relaying the information safely from measurement devices back tothepoweradministrator. While the information collectorsverifytheintegrity,they are not offered access to the content, which may likewise make ready for outsider suppliers to convey esteem included administrations or even the informationaccumulationitself. In [5], proposed a completely useful character based encryption technique(IBE).ThetechniquehaspickedCipher content text security in the arbitrary oracle model accepting a variation of the computational Diffe-Hellman issue. The framework depends on bilinear maps between groups. The Weil pairing on elliptic curves is a case of such a map. Later give exact definitions for secure identity based encryption techniques and give a few applications for suchframeworks. With the rationale all open - and shared key primitives are formalized furthermore the idea of a fresh message. This makes it conceivable to formalize a challenge response protocol. BAN logic is implied for thinking over cryptographic protocols. Confirmation with BAN logic does not really infer that no attacks on the protocol are conceivable. A proof with the BAN logic was a decent confirmation of accuracy, based on the assumptions. Be that as it may, inquiries may emerge over the semantics of the logic and the logic excludes conceivable attacks [6]. ProVerif is equipped for demonstrating reachability properties, correspondence affirmations, and observational identicalness. These capacities are especially valuabletothe PC security domain since they allow the investigation of secrecy and authentication properties. In addition, emmerging properties,for example,privacy,traceability, and irrefutability can likewise be considered. Protocol examination is considered as for an unbounded number of sessions and an unbounded message space[7].
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1700 In [8], the survey proposed system integrates attribute based policies into user relationship based access control. This attribute aware ReBAC improves access control capacity and allows fine -grained access controls which is not available in ReBAC. The policy specification languagefor the user to user relationship-based access control (UURAC) model proposed in is extended to enable such attribute- aware access control. Proposed methodology presents an improved path checking algorithm for checking existence of the required attributes and relationships in for allowing access. In this work a formal access control model thatisusedto confirm ideas from relationship based access control and a two stage method for evaluating policies. This methodologies are defined using path conditions, which are similar to regular expressions.Thesystemdefinedsemantics for path conditions, which are use to develop a rigorous method for evaluating policies. Proposed system presents the algorithm needed to check policies and create its complexity. At last, This paper elaborate the advantages of our model using an example and describe a preliminary implementation of our algorithm [9]. 3. PROPOSED SYSTEM Proposed system enhanced with Anomaly Detection and path extraction. 3.1 Problem Definition To formulate problem for graph based user to user relation identification in online access control by defining user roles and device attributes for the purpose of secure and efficient mutual authentication and authorization. As well as also to prevent from various insider and outsider attacks. 3.2 Proposed System Overview This scheme empowers two-factor authentication so that a rouge device couldn’t re-utilize the previous caught data of a legitimate user. A bilinear pairing cryptography- based shared secrete key is created between the user and the device for further secure communication during a session. The proposed scheme is effective as far as both, communication and calculation overheads in comparison with the existing techniques, and can crush some notable outsider attacks and additionally insider attacks. Here’s the idea of OTP which is send on users portable phone(mobno) is utilized howeverithaspoorcorrespondenceoverhead and calculation overhead. In this framework every one of the issues will be recouped and thrashing all the insider and outcast assaults and enhance the effectiveness of correspondence overhead and calculation overhead. Proposed system present secure and efficient mutual authentication and authorization methods are required in the smart devices to prevent different insider and outsider attacks on many different devices. This work propose a verification and approval plot for reducing outsider and insider attacks the user approval and performing the user validation together at whatever point a user accesses the application resources. This technique considers user-role dynamically using an attribute-based access control [9] and verifies the identity of user together with the device. User resource security and framework performance examinationportraythattheproposedmethod maintains a strategic distance from different insider and in addition outsider attacks, and is more effective as far as communication and calculation costs in correlation withthe existing methods. The accuracy of the proposed scheme is also defined byusingBAN-LogicandProverifmechanism [1]. Proposed system design model is as per following: Fig – 1: Proposed System Architecture 1. User to user relation identification Here proposed model that designed for identification of user to user relation in system network for online security. User needs to find relation with the other user or resource that he/she is using. 2. Secure OTP Generation To improve the qualityofauthenticationsystemproposes the secure OTP as half on OTP comes by SMS and half OTP comes to e-mail. User has to enter final OTP in the combination of both. This can be veryuseful toovercomethe man-in-the-middle attack. 3. Hospitalize management application Designing application for online hospital management purpose. Here resource access likewise relational database. Each user role access the system or operate only those actions who has rights to do. 4. Man in Middle attack Prevention Avoid unauthorized access for relational database over online access to the system.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1701 5. Response action Generation Generate response actions/ alarm for user request for Resources. As the malicious user can be block for specific time stamp. 3.3 Algorithms Algorithm 1: MD5 message-digest algorithm Step 1: Add Padding Bits. The genuine message is broadened with the goal that its length (in bits) is compatible to 448, modulo 512. The cushioning rules are: • The first message is constantly padded with one bit "1" first. • After zero or more bits "0" are padded to bring the length of the message up to 64 bits not exactly a various of 512. Step 2: Annexing Length. 64 bits are added to the finish of the padded message to show the length of the first message in bytes. The standards of affixing length are: The length of the first message in bytes is changed over to its binary format of 64 bits. On the off chance that overflow happens, just the low-order 64 bits are utilized. Step 3: Break the 64-bit length into 2 words (32 bits each). • The lower order word is added first and took after by the higher order word. Step 4: Instating MD Buffer.MD5algorithmrequiresa 128- bits buffer with a particular initial value. The guidelines of instating buffer are: • The buffer is separated into 4 words (32 bits each), named as A, B, C, and D. Algorithm 1: AES Encryption Algorithm Step 1: Derive the set of round keys from the cipher key. Step 2: Sub-Bytes: Substitution that converts every byte into a different value. Step 3: Shift-Rows: Each row is rotated to the right by a certain number of bytes Step 4: Mix-colomns: Processing involves a matrix multiplication. Step 5: Xor-Round Key: XORs the value of the appropriate round key, and replaces the state array with the result. It is done once before the rounds start and then once per round, using each of the round keys in turn. Step 6: Operation in decryption is: decryption involves reversing all the steps taken in encryption using inverse functions: 1. Perform initial decryption round: Xor-Round Key InvShift-Rows InvSub-Bytes 2. Perform nine full decryption rounds: Xor-Round Key InvMix-Columns InvShift-Rows InvSub-Bytes 3. Perform final Xor-Round Key 3.4 Mathematical Modeling Let us consider S as a system. S= {I, F, O} Identify the inputs I= {i1, i2, i3,….., in} where ‘I’ sets of inputs to the function set F = {f1, f2, f3, ….., fn} where ‘F’ as set of functions to execute commands. O= {o1, o2, o3,…., on} where ‘O’ Set of outputs from the function sets I = user credential and user authentication details F = User role assignment, Policy matching, Secure OTP Generation O = User Access control Given an user n 2 N, her groups Gn, her individual privacy policy Pn = < A, E > , and a user t ∈ T; we define the action function as: The definition of this function will vary according to the access control model used, but it will be defined in a similar way. That is, the idea is to know, given a target user t, whether the privacy policy will allow/denyt’saccesscontrol to the item with respect to the access control model being utilized. In particular, we assume that the available actions are either 0 (denying access) or 1 (granting access). Input:- User system access time and device, time interval and access frequency limit. Output:- Response alert and action log Time related constraint such as time interval limit and frequency limit is considered as user action. If the same action command is performed too frequently, that violates the following rules. In each case the detector will initiate some actions (alert and log). CV(n) – CV(n-1) < T → Actions(alert, log);
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1702 Where CV is Control command and n is positive integer value, T is Time Limit of time interval. Where, F represents Frequency Limit to access resource or request for application 4. RESULTS AND DISCUSSION Proposed systems experimental setup and resultsdiscussed here with the help of comparison graphs. 4.1 Experimental Setup Proposed system has implemented the algorithms in Java, and designed two sets of experiments to test the runtime execution of an access request evaluation using both algorithms. We design an access control decider with user policy authenticationinhospital managementapplicationfor user group authentication with 4 GB memoryanda 2.53GHz quad-core CPU. The access control to be tested is stored in MySQL databases on the testing machine along with the sample access control policies. We designed sample policies and access requests that would require the access control decider to gather necessary information and crawl on the user policy for access decisions. We then measured the time the algorithms take to complete a path checking over the graph and return a result to the decider. 4.2 Expected Result Proposed system analysis shows that user and device authentication for online user accesscontrol isimplemented mechanically. Proposed user to user relationship based access control leads to online industrial network by using user policy. User relationship extracted based on user to user path extraction. This model uses regular expression notation for policy specification [11], such policies includes sharing, download, upload, modify etc these are requested action, multiple relationship type are used. Following figure 2 shows the graph of the proposed system with computation overhead. The X-axis represents the authentication levels and Y-axisrepresentsthesignature verification overhead range. Fig - 2: Computation Overhead Graph User and device authenticationrequirevalidationat different level i.e. at User login and proxy authenticationand finally system access control for system resources. Authenticationandauthorizationverificationtakesoverhead at authentication, where overhead is calculated for number of hop visited for authentication is purpose. User validation phase, device verification, policy authorization and user to user relation in terms of communication between customer to customer and officials to official in the industrial management. Following graph shows result of existing and proposed system for authentication and authorization techniques used with usage percentage. In this graph authentication is performed at different level i.e.foranalysis of SQL injected information or cross site scriptingtogetdata from website by web scrapping. Access control is proposed technique to user validation by policy grant by main admin. Where, Existing system only uses user role to authenticate user to grant for access resources. Permission defines user operation on the medical data manipulation. Fig- 3: Accuracy Graph This graph compares accuracy level for different authentication scheme for user and device validation. This accuracy is measured in terms of time required to compute the process in the system. Time is measured in milliseconds.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1703 User and device authentication for authorizing access control using system resources in industrial organization. Proposed system identifies the intrusion for using system and resources. Followinggraphshowsnumber of malicious user, suspicious user and normal user in the system to achieve access control for system admin in the industrial organization. User with unauthorized privilege named as malicious or suspicious for system usage. 5. CONCLUSION AND FUTURE SCOPE Proposed work implemented with novel model that provide mutual authentication and authorization as perdefineduser roles. Access control strategies on users and resources are created in terms of requested activity, various relationship sorts, the beginning stage of the evaluation, and the number of hops on the way. Generate user policy to access resource for information need. User has assigned policy by assigning signature to the user request. User rolebasedauthentication check user access type such that MD, Doctor, System admin, Receptionist, normal user etc. Administrative actions over relational database management by authentication and authorization, approach user is not permitted to access resource if he is anomalous behavior. Userserviceisblocked for some time Man in middle attack detection for relational database by means of online network in the form of authentication and authorization schemes. ACKNOWLEDGEMENT It is my privilege to acknowledge with deep sense of gratefulness to my guide Prof. Jyoti Raghatwan for her kind cooperation, valuable suggestions and capableguidanceand timely help given to me in completion of my paper. I express my appreciation to Prof. Vina M.Lomte,HeadofDepartment, RMDSSOE (Computer Science) for her constant support, suggestions, assistance and cooperation. REFERENCES [1]N. Saxena, B. J. Choi and R. Lu, “Authentication and Authorization Scheme forVariousUserRolesandDevices in Smart Grid”, IEEE transactions on information forensics and security, Vol. 11, No. 5, May 2016. [2]“Guidelines for smart grid cyber security vol. 3, supportive analyses and references,” NISTIR 7628, The Smart Grid Interoperability Panel - Cyber Security Working Group, Aug. 2010. [3]“Smart grid information assurance and security technology assessment, Energy Research and Development Division,” Final Project Report, 2010. [4]N. Saxena and B. J. Choi, “State of the art authentication, access control, and secure integration in smart grid”, Energies, vol. 8, pp. 11883-11915, Oct. 2015. [5]H. Khurana and M. Hadley, “Smart-grid security issues”,IEEE Security and Privacy Magazine, vol. 8, no. 1, pp. 81-85, Feb. 2010. [6]H. Li, R. Lu, L. Zhou, B. Yang, and X. Shen, “An efficient merkletreebased authentication scheme for smart grid”,IEEE Systems Journal, vol. 8, no.2,pp.655-662,May 2014. [7]H. Nicanfar, P. Jokar, K. Beznosov and V. C. M. Leung, “Efficient authentication and key management mechanisms for smart grid communication”, IEEE Systems Journal, vol. 8, no. 2, pp. 629-640, Jun. 2014. [8]proverif, “ProVerif: cryptographic protocol verifier.” [Online].http://prosecco.gforge.inria.fr/personal/bblanc he/proverif. [9]Y. Cheng, J. Park, and R. Sandhu, “Attribute-aware relationship based access control for online social networks,” in Proc. 27th Data Appl. Secur. Privacy, 2014, pp. 292306. [10]J. Crampton and J. Sellwood, “Path conditions and principal matching: A new approach to accesscontrol,”in Proc. 19th ACM SACMAT, 2014, pp. 187198. [11]Y. Cheng, J. Park and R. Sandhu, “An Access Control Model for Online Social Networks Using User-to-User Relationships”, IEEE transactions on dependable and secure computing, Vol. 13, No. 4, July/August 2016. BIOGRAPHIES Miss. Aditi V. Bhadke, ME Second year Student of R.M. Dhariwal Sinhgad School of Engineering, Pune
Download now