Main purpose of using different data mining techniques is to find novel, potentially useful patterns which can be useful in real world applications to derive best knowledge and using it into useful way. For identifying the usefulness of patterns, many constraints has been proposed by many researchers are like time-interval between itemsets, utility parameters (price, profit, quantity etc.), weight of an itemset etc. Among these, time-interval between items is useful to learn about at what time next item will be purchased and utility parameters are useful to mine patterns which are more profitable in real world from huge transaction database. Here, we miss hybridization of these constraints so that more useful patterns can be derived. Hybridization of these constraints can give more useful pattern by combining advantages of each constraint.
Information is a key component in today’s global business environment. An organization, institute, or business firm uses various database management systems for managing its crucial information. The security mechanism provides by DBMS is not enough to prevent intruders or detect anomalous behavior. Unauthorized users and sometimes authorized users to execute malicious commands intentionally or by mistake, cannot be detected and prevented by a typical security mechanism. Intrusion detection system finds intrusive action and attempts by detecting the behavior of user’s action. Security features can be enhanced by adding intrusive detection technology to the Database management system. Data mining is to identify valid, novel, potentially useful, and ultimately understandable patterns in massive data. It is required to apply data mining techniques to detect various intrusions. In this paper mechanism based on data mining is discussed to detect malicious action in DBMS.
In compare to Authentication for identification and relationship of an identity of a user with its task and process within the system, authorization in access control is much anxious about confirming that user and its task in the form of system process, access to the assets of any particular domain is only approved when proven obedient to the identified policies. Access control and authorization is always an area of interest for researchers for enhancing security of critical assets from many decades. Our prime focus and interest is in the field of access control model based on Attribute base access control (ABAC) and with this paper we tried to integrate ABAC with openstack cloud for achieving finer level of granularity in access policies for domain like smart grid. Technical advancement of current era demands that critical infrastructure like traditional electrical grid open ups to the modern information and communication technology to get the benefit in terms of efficiency, scalability, accessibility and transparency for better adaptability in real world. Incorporation of ICT with electric grid makes it possible to do greater level of bi-directional interaction among stake holders like customer, generation units, distribution units and administrations and these leads international organization to contribute for standardization of smart grid concepts and technology so that the realization of smart grid becomes reality. Smart grid is a distributed system of very large scale by its nature and needs to integrate available legacy systems with its own security requirements. Cloud computing proven to be most efficient approach for said requirements and we have identified openstack as our cloud platform. We have integrated ABAC approach with default RBAC approach of openstack and provide a frame work that supports and integrate multiple access control polices in making authorization decisions. Smart grid domain in considered as case study which requires support of multiple access policies (RBAC, ABAC or DAC etc) with our model for access control and authorization.
Cloud Computing becomes most preferable solution for satisfying the various requirements of organizations and institutions. Different types of clouds like IaaS, PaaS, SaaS makes cloud capable to fulfills the client's different kind of needs like computer processing power, storage spaces, databases, software, application, web based solutions. Cloud computing can also be useful and worthy in providing certain customized solutions to enhance the capability of legacy systems in terms of effectiveness, reliability and optimization by replication of environment up to satisfactory extent. To provide adequate security solutions for cloud is still a challenging task and access control mechanism is one of the domain which demands significant attention on the mission towards securing clouds. In this paper, our work primarily focus on defining ABAC components, mapping functions and access control policies composed by access rules. Amazon Web Services is one of the most prominent cloud providers. Identity and Access Management (IAM) and Amazon S3 are access management and storage facilities of AWS respectively. ABAC based access policies are attached with the user and storage components for authorization.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.