Proactive Security Framework for Online Business Web Portals with Implementation Details
Abstract
Most of the critical information is stored or travelled throughout the Internet and prone to cyber threats all the time. The current manuscript provides a process to develop and implement an automated proactive security framework to alert/avoid such cyber threats for the critical online information. In addition, it also describes a feasibility study towards the adoption of the proposed process by the current user community with favorable results.
The proposed work is able to help for the development of security add-ons to almost all the embedded software applications for the better secured services to the users.
Keywords
References
- H. Saini and T. C. Panda, “Extended Cyber Defense Architecture for a University –A Case study”, The IUP Journal of Science & Technology, 6(2):33-47, 2010.
- H. Saini and D. Saini, “Proactive cyber Defense and Reconfigurable Framework of Cyber Security”, International journal named International Review on Computer and Software (IRECOS), 2(2):89-97, 2007.
- S. Bayat, R.H.Y. Louie, Z. Han, B. Vucetic and Y. Li, “Physical-Layer Security in Distributed Wireless Theory”, Networks Information Forensics and Security, IEEE Transactions on, Volume: 8, Issue: 5, pp.- 717-732, 2013.
- E. Harrin, “Taking a Layered Approach to IT Security”, Retrieved April, http://www.esecurityplanet.com/network-security/taking- a-layered-approach-to-it-security.html Available at: I. Lien, Y. Lin, J. Shieh and J. Wu, “A Novel Privacy Preserving Location-Based Service Protocol with Secret Circular Shift for k-NN Search”, Information Forensics and Security, IEEE Transactions on , Volume: PP , Issue: 99, 2013, DOI: 10.1109/TIFS.2013.2252011.
- H. Saini, K. D. Sharma, P. Dadheech and T. C. Panda, “Enhanced 4-way Handshake Process in IEEE802.11i with Cookies”, International Journal of Information & Network Security (IJINS), 2(3), pp. 229~238, 2013.
- L. Sankar, S. Rajagopalan and H. Poor, “Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach”, Information Forensics and Security, IEEE Transactions on,Volume: PP , Issue: 99, pp.-1-15, 2013.
- J. Han, W. Susilo, and Y. Mu, “Identity-Based Secure Distributed Data Storage Schemes”, Computers, IEEE Transactions on, Volume: PP , Issue: 99, 2013, DOI: 10.1109/TC.2013.26.
- H. Saini, B. K. Mishra and T. C. Panda, “Computing the Spreading Power of a Business Portal to Propagate the Malicious Information in the Network”, International Journal of Web Protals, 3(2), 14-22, 2011.
Details
Primary Language
English
Subjects
-
Journal Section
-
Authors
Hemraj Saini
This is me
Publication Date
June 28, 2014
Submission Date
January 30, 2016
Acceptance Date
-
Published in Issue
Year 2014 Volume: 3 Number: 2