Research Article
BibTex RIS Cite

Dağıtık etiketleme modeli ile bilgi akış denetimi

Year 2019, Volume: 6 Issue: 2, 231 - 242, 26.12.2019
https://doi.org/10.35193/bseufbd.592542

Abstract

Bu çalışmada, dağıtık
veritabanlarında bilgi akış denetimi ile veri gizliliği ve kullanıcıların veri
mahremiyetini sağlamak amaçlanmıştır. Özellikle, veri akış denetimi ile
gizliliği muhafaza edecek dağıtık etiket modeli tanıtılır. Bu model aktör,
nesne ve etiketten oluşur. Nesne sahibi bir aktördür ve sahip olduğu veriyi
sistemdeki başka aktörlerce paylaşmak durumundadır. Aktörler nesneleri
etiketleyerek veri gönderimini sağlar. Etiket aktörler tarafından verilen
kişisel güvenlik politikası ifadeleridir. Her aktör diğerlerinden bağımsız bir
şekilde kendi  güvenlik ve gizlilik
politikasını belirler. Etiket aracılığıyla, güvenli olmayan ulaşım
kanallarında, akış kontrolü, sistemde bulunan tüm aktörlerin veri gizliliğini
sağlar. Veri nesnesi, güvenli olmayan aktör ve ortamlarda güvenli bir şekilde
yayılır ve paylaşılır.

References

  • [1] Lin, J., & Yu, W. & Zhang, N. (2017). A survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy and Applications, IEEE Internet of Things, 4(5), 1125-1142.
  • [2] Clifton, C.W./2014). Privacy Beyond Confidentiality, In Procedings of the ACM SIGSAC Conference and Communications Security (CCS’14), 1156-1156.
  • [3] Al-Jarabi, S.,& Al-Shourbaji, M.S,& Shamshirband, S.(2017). Survey of main challenges (security and privacy) in wireless body area networks for healtcare applications, Egyptia Informatics Journal, 18, 113-122.
  • [4] Gupta, B.B.,& Shingo, Y.,& Agrawal, D.H. (2018). Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing, Multimedia Tools and Applications, 77(7), 9203-9208.
  • [5] Myers, A. C.,& Liskov, B.(2000). Protecting Privacy using the Decentralized Label Model, ACM Transactions on Software Engineering and Methodology, 9(4), 410-442.
  • [6] Myers, A. C.,& Liskov, B.(1998). Complete, Safe Information Flow with Decentralized Labels, In Proc. IEEE Symposium on Security and Privacy.
  • [7] Esfandiari, H.,& Hajigohayi, M.,& Liaghat, V.,& Monemizadeh, M.(2018). Streaming Algorithms for Estimating the Matching Size in Planar Graphs and Beyond, ACM Transactions on Algorithms, 14(8).
  • [8] Liu, J.,& Arden, O.,& George, M.,& Myers, A.C.(2017). Fabric:Building Open Distributed Systems Securely by Construction, Journal of Computer Security, 25(4-5), 367-426.
  • [9] Kim, N.Y,& Ryu, J.H.,& Kwon, B.W,& Pan, Y.(2018). CF- CloudOrch:Container fog node-based cloud orchestration for IoT networks, The Journal of Supercomputing, 74(12), 7024-7045.
  • [10] Cai, F.,& Zhu, N.,& He, J.,& Mu, P.,& Li, W.(2018). Survey of Access Control Models and Technologies for Cloud Computing, Springer Cluster Computing, 1-12.
  • [11] Aafaf, Q.,& Hajar, M.,& Anas, A.E.,& Abdellah, A.Q.(2017) Access Control in the Internet of Things: Big challenges and new opportunities, Elsevier Computer Networks, 12, 237-262.
  • [12] Elhoseny, M.,& Gustavo, O.,& Showkat, S.(2018). Secure Medical Data Transmission Model for IoT-Based Healtcare Systems, IEEE Access Special Section on Information Security Solutions, 6, 20596-20608.
  • [13] Alizadeh, M.,& Abolfazli, S.,& Zamari, M.,& Baharun,S.(2016). Authentication in Mobile cloud computing:A survey, Journal of Network and Computer Applications, 61, 59-80.
  • [14] Bakir, Ç.,& Hakkoymaz, V.(2017). Dağıtık Veritabanında Veri Etiketleme ile Bilgi Akış Denetimi, 5.Ulusal Yüksek Başarımlı Hesaplama Konferansı, Esenler İstanbul.
  • [15] Myers, A. C.,& Liskov, B.(1997). A Decentralized Model for Information Flow Control, In Proc. 17th ACM Symp. on Operating System Principles (SOSP), 129–142.
  • [16] Cecchetti, E.& Myers, A.C. (2017). Nonmalleable Information Flow Control, ACM Conference on Computer and Communication Security.
  • [17] Arden, O. & Myers. (2016). A.C. A calculus for flow-limited authorization, IEEE Computer Security Foundations, 135-149.
  • [18] Cheng, W.,& Ports,& R.K, Schultz, D.(2012). Abstractions for Usable Flow Control in Aelous, USENIX ATC'12 Proc. USENIX Conference on Annual Technical Conference, 1-12, 2012.
  • [19] Cai, F.,& Zhu, N.,& He, J.,& Mu, P.,& Li, W.(2018). Survey of Access Control Models and Technologies for Cloud Computing, Springer Cluster Computing, 1-12.
  • [20] Servos, D.,& Osborn, S.L.(2017). Current Research and Open Problems in Attribute-Based Access Control, ACM Computing Surveys, 49(4).
Year 2019, Volume: 6 Issue: 2, 231 - 242, 26.12.2019
https://doi.org/10.35193/bseufbd.592542

Abstract

References

  • [1] Lin, J., & Yu, W. & Zhang, N. (2017). A survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy and Applications, IEEE Internet of Things, 4(5), 1125-1142.
  • [2] Clifton, C.W./2014). Privacy Beyond Confidentiality, In Procedings of the ACM SIGSAC Conference and Communications Security (CCS’14), 1156-1156.
  • [3] Al-Jarabi, S.,& Al-Shourbaji, M.S,& Shamshirband, S.(2017). Survey of main challenges (security and privacy) in wireless body area networks for healtcare applications, Egyptia Informatics Journal, 18, 113-122.
  • [4] Gupta, B.B.,& Shingo, Y.,& Agrawal, D.H. (2018). Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing, Multimedia Tools and Applications, 77(7), 9203-9208.
  • [5] Myers, A. C.,& Liskov, B.(2000). Protecting Privacy using the Decentralized Label Model, ACM Transactions on Software Engineering and Methodology, 9(4), 410-442.
  • [6] Myers, A. C.,& Liskov, B.(1998). Complete, Safe Information Flow with Decentralized Labels, In Proc. IEEE Symposium on Security and Privacy.
  • [7] Esfandiari, H.,& Hajigohayi, M.,& Liaghat, V.,& Monemizadeh, M.(2018). Streaming Algorithms for Estimating the Matching Size in Planar Graphs and Beyond, ACM Transactions on Algorithms, 14(8).
  • [8] Liu, J.,& Arden, O.,& George, M.,& Myers, A.C.(2017). Fabric:Building Open Distributed Systems Securely by Construction, Journal of Computer Security, 25(4-5), 367-426.
  • [9] Kim, N.Y,& Ryu, J.H.,& Kwon, B.W,& Pan, Y.(2018). CF- CloudOrch:Container fog node-based cloud orchestration for IoT networks, The Journal of Supercomputing, 74(12), 7024-7045.
  • [10] Cai, F.,& Zhu, N.,& He, J.,& Mu, P.,& Li, W.(2018). Survey of Access Control Models and Technologies for Cloud Computing, Springer Cluster Computing, 1-12.
  • [11] Aafaf, Q.,& Hajar, M.,& Anas, A.E.,& Abdellah, A.Q.(2017) Access Control in the Internet of Things: Big challenges and new opportunities, Elsevier Computer Networks, 12, 237-262.
  • [12] Elhoseny, M.,& Gustavo, O.,& Showkat, S.(2018). Secure Medical Data Transmission Model for IoT-Based Healtcare Systems, IEEE Access Special Section on Information Security Solutions, 6, 20596-20608.
  • [13] Alizadeh, M.,& Abolfazli, S.,& Zamari, M.,& Baharun,S.(2016). Authentication in Mobile cloud computing:A survey, Journal of Network and Computer Applications, 61, 59-80.
  • [14] Bakir, Ç.,& Hakkoymaz, V.(2017). Dağıtık Veritabanında Veri Etiketleme ile Bilgi Akış Denetimi, 5.Ulusal Yüksek Başarımlı Hesaplama Konferansı, Esenler İstanbul.
  • [15] Myers, A. C.,& Liskov, B.(1997). A Decentralized Model for Information Flow Control, In Proc. 17th ACM Symp. on Operating System Principles (SOSP), 129–142.
  • [16] Cecchetti, E.& Myers, A.C. (2017). Nonmalleable Information Flow Control, ACM Conference on Computer and Communication Security.
  • [17] Arden, O. & Myers. (2016). A.C. A calculus for flow-limited authorization, IEEE Computer Security Foundations, 135-149.
  • [18] Cheng, W.,& Ports,& R.K, Schultz, D.(2012). Abstractions for Usable Flow Control in Aelous, USENIX ATC'12 Proc. USENIX Conference on Annual Technical Conference, 1-12, 2012.
  • [19] Cai, F.,& Zhu, N.,& He, J.,& Mu, P.,& Li, W.(2018). Survey of Access Control Models and Technologies for Cloud Computing, Springer Cluster Computing, 1-12.
  • [20] Servos, D.,& Osborn, S.L.(2017). Current Research and Open Problems in Attribute-Based Access Control, ACM Computing Surveys, 49(4).
There are 20 citations in total.

Details

Primary Language Turkish
Subjects Engineering
Journal Section Articles
Authors

Cigdem Bakir 0000-0001-8482-2412

Veli Hakkoymaz This is me 0000-0002-3245-4440

Mehmet Güçlü 0000-0001-8482-2412

Publication Date December 26, 2019
Submission Date July 16, 2019
Acceptance Date November 10, 2019
Published in Issue Year 2019 Volume: 6 Issue: 2

Cite

APA Bakir, C., Hakkoymaz, V., & Güçlü, M. (2019). Dağıtık etiketleme modeli ile bilgi akış denetimi. Bilecik Şeyh Edebali Üniversitesi Fen Bilimleri Dergisi, 6(2), 231-242. https://doi.org/10.35193/bseufbd.592542