Policy-based management could be a terribly effective methodology to guard sensitive info. However, the over claim of privileges is widespread in rising applications, together with mobile applications and social network services, as a result of the applications’ users concerned in policy administration have very little information of policy-based management. The over claim will be leveraged by malicious applications, then result in serious privacy leakages and loss. To resolve this issue, this paper proposes a completely unique policy administration mechanism, mentioned as cooperative policy administration CPA, to change the policy administration. In CPA, a policy administrator will talk to different similar policies to line up their own policies to guard privacy and different sensitive info. This paper formally defines controller and proposes its social control framework. What is more, to get similar policies additional effectively, that is that the key step of controller, a text mining-based similarity live methodology is conferred. We tend to valuate controller with the info of mechanical man applications and demonstrate that the text mining-based similarity live methodology is more practical in getting similar policies than the previous category-based methodology.
T. Charan Singh, B. Shyam Prasad, K. D. Nitesh Kumar
Collaborative Policy Administration, Policy-Based Management, Mobile Applications, Android, Social Network Services
- A. K. Bandara, N. Damianou, E.C. Lupu, M. Sloman, and N. Dulay, "Policy Based Management," Handbook of Network and System Administration, Elsevier, Nov. 2007.
- D. Verma, "Simplifying Network Administration Using Policy- Based Management," IEEE Network, vol. 16, no. 2, pp. 20-26, Mar./ Apr. 2002.
- W. Han and C. Lei, "A Survey on Policy Languages in Network and Security Management," Computer Networks, vol. 56, no. 1, pp. 477-489, 2012.
- R. Yavatkar, D. Pendarakis, and R. Guerin, "A Framework for Policy-Based Admission Control," RFC 2753, no. 2753, 2000.
- B. Moore, E. Ellesson, J. Strassner, and A. Westerinen, "Policy Core Information Model—Version 1 Specification," IETF, RFC 3060, http://www.ietf.org/rfc/rfc3060, Feb. 2001.
- W. Enck, M. Ongtang, and P. McDaniel, "Understanding Android Security," IEEE Security & Privacy, vol. 7, no. 1, pp. 50-57, Jan./ Feb. 2009.
- B. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru, and I. Molloy, "Android Permissions: A Perspective Combining Risks and Benefits," Proc. 17th ACM Symp. Access Control Models and Technologies, pp. 13-22, 2012.
- M. Nauman, S. Khan, and X. Zhang, "Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints," Proc. Fifth ACM Symp. Information, Computer and Comm. Security, pp. 328-332, 2010.
- D. Barrera, H. Kayacik, P. van Oorschot, and A. Somayaji, "A Methodology for Empirical Analysis of Permission-Based Security Models and Its Application to Android," Proc. 17th ACM Conf. Computer and Comm. Security, pp. 73-84, 2010.
- G. Cheek and M. Shehab, "Policy-by-Example for Online Social Networks," Proc. 17th ACM Symp. Access Control Models and Technologies, pp. 23-32, 2012.
|Published in :
||Volume 1 | Issue 5 | September-October - 2015
|Date of Publication
Cite This Article
T. Charan Singh, B. Shyam Prasad, K. D. Nitesh Kumar, "Policy Based Management in Autonomic Network Management", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 5, pp.91-94, September-October-2015.
URL : http://ijsrset.com/IJSRSET15153.php