Secured Framework Facilitator with Essential Tool Sets

Authors

  • Dr. V. Ilango  Department of MCA, New Horizon College of Engineering, Bengaluru, Karnataka, India
  • Abhishek Kumar  Department of MCA, New Horizon College of Engineering, Bengaluru, Karnataka, India

Keywords:

Tunneling Topology, Monitor, Manage, Analyze, Workflow, Model, Customizable, Framework, Risk, Cross Platform, Performance, Economy, Structural Grid.

Abstract

In current scenario various company uses a group of people to manage and analyze the work and the workflow. The main parts of them are to manage, monitor, analyze and provide various security layers to the company processes. The proposed model will be able to do the mentioned works from a single place with minimum amount of effort required to be done. It helps to monitor and analyze the business for the company by generating the customizable report accordingly for each and different branch of company. For organizational mobility of an integrated working on a large scale, the tunneling topology fulfill the requirements which need to be matched up according to the company’s distribution requirements. In this, different prospectus of arrangements has to be considered. A set of multiple structural grids will be required with different functional accessibility irrespective of operational environment from various offices. Service based rule mechanism will be set from the proposed work which incorporates design that will help the companies and provide a substantial work processing provided by a central console that minimizes the related complexity which currently institutions are facing. Due to major technical perception, an outlying establishment is required that will be administrated for various framework identity to reduce the potential risk of security and performance. An isolated accessibility platform would be provided to help and identify the technical challenges on a cross platform alliance with various tunneling information. To curtail the economic perception on any organization, the significant commercial use will be needed when the companies are based in multiple constituents.

References

  1. Peter R.J. Trim, Yang-Im Lee, "A security framework for protecting business, government and society from cyber attacks", System of Systems Engineering (SoSE), 2010 5th International Conference, 22-24 June 2010.
  2. Hamza Djigal, Feng Jun, Jiamin Lu, "Smart Framework for future Smart City", Cyber Security and Cloud Computing (CSCloud), 2017 IEEE 4th International Conference, 26-28 June 2017.
  3. D. Kelaidonis, "Cloud Internet of Things Framework for Enabling Services in Smart Cities", Designing Developing and Facilitating Smart Cities 2017.
  4. L. Lopez, F. J. Nieto, T.-H. Velivassaki, S. Kosta, C.-H. Hong, R. Montella et al., "Heterogeneous Secure Multi-level Remote Acceleration Service for Low-power Integrated Systems and Devices", Procedia Computer Science.
  5. Mohammad Irshad, "A Systematic Review of Information Security Frameworks in the Internet of Things (IoT)", High Performance Computing and Communications, 12-14 Dec 2016.
  6. J. Thelin, P.J. Murray, "A Public Web Services Security Framework Based on Current and Future Usage Scenarios", Proceedings of the International Conference on Internet Computing, Las Vegas, Nevada, USA, June 23-27, 2002.
  7. Subhamoy Chakraborti, D. P. Acharjya, Sugata Sanyal, "Application Security framework for Mobile App Development in Enterprise setup".
  8. Machigar Ongtang, Stephen McLaughlin, William Enck and Patrick McDaniel, "Semantically rich application-centric security in Android", Security and Communication Networks, Volume 5, Issue 6, 2012.
  9. William Enck, Machigar Ongtang, and Patrick McDaniel, "Mitigating Android Software Misuse Before It Happens", Networking and Security Research Center Technical Report, NAS-TR-0094-2008.
  10. G. Delac, M. Silic and J. Krolo, "Emerging Security Threats for Mobile Platforms", MIPRO, 2011 Proceedings of the 34th International Convention, pp 1468 – 1473, Print ISBN: 978-14577-0996-8, 2011.
  11. K. Munir and S. Palaniappan, "Security Threats\Attacks present in Cloud Environment", International Journal of Computer Science and Network Security (IJCSNS) vol 12, No.12,December 2012, pp. 107-114, ISSN : 1738-7906.
  12. Kashif Munir, Prof Dr. Sellapan Palaniappan, "FRAMEWORK FORSECURECLOUD COMPUTING", International Journal on Cloud Computing: Services and Architecture (IJCCSA),2013.
  13. Gael I. Orsmond and Ellen S. Cohn, "The Distinctive Features of a Feasibility Study: Objectives and Guiding Questions", OTJR: Occupation, Participation and Health 2015.
  14. Bowen, D. J., Kreuter, M., Spring, B., Cofta-Woerpel, L., Linnan, L., Weiner, Fernandez, M, "How we design feasibility studies", American Journal of Preventive Medicine 2009.
  15. Anurag Kumar Jain, and Shanbhag Devendra, "Addressing Security and Privacy Risks in Mobile Applications", IT Professional 14.5 (2012): 28-33.
  16. M.Jensen ,N.Gruschka et al., "The impact of flooding Attacks on network based services", Proceedings of the IEEE International conference on Availiabilty,Reliability and Security (ARES) 2008.
  17. R. Sravan Kumar and A. Saxena, "Data integrity proofs in cloud storage", Third International Conference on Communication Systems and Networks (COMSNETS), 2011.
  18. James Joshi, Rafae Bhatti, Elisa Bertino, Arif Ghafoor, "Access-Control Language for Multi domain Environments," IEEE Internet Computing, 2004.
  19. Dongwan Shin and Gail-J. Ahn, "Role-based Privilege and Trust Management," Computer Systems Science and Engineering Journal, Vol. 20, No. 6, CRL Publishing, 2005.
  20. K. Munir & S. Palaniappan, "Security Threats\Attacks present in Cloud Environment", International Journal of Computer Science and Network Security (IJCSNS) vol 12, No.12,December 2012.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. V. Ilango, Abhishek Kumar, " Secured Framework Facilitator with Essential Tool Sets, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.1650-1656, March-April-2018.