• Title/Summary/Keyword: Resource Access Control

Search Result 225, Processing Time 0.028 seconds

Adaptive and Prioritized Random Access and Resource Allocation Schemes for Dynamic TDMA/TDD Protocols

  • Choi, Hyun-Ho
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.1
    • /
    • pp.28-36
    • /
    • 2017
  • The medium access control (MAC) protocol based on dynamic time division multiple access/time division duplex (TDMA/TDD) is responsible for random access control and radio resource allocation in dynamic traffic environments. These functions of random access and resource allocation are very important to prevent wastage of resources and improve MAC performance according to various network conditions. In this paper, we propose new random access and resource allocation schemes to guarantee quality of service (QoS) and provide priority services in a dynamic TDMA/TDD system. First, for the QoS guarantee, we propose an adaptive random access and resource allocation scheme by introducing an access probability. Second, for providing priority service, we propose a priority-based random access and resource allocation scheme by extending the first adaptive scheme in both a centralized and a distributed manner. The analysis and simulation results show that the proposed MAC protocol outperforms the legacy MAC protocol using a simple binary exponential backoff algorithm, and provides good differential performance according to priorities with respect to the throughput and delay.

A Design of Resource Access Control Architecture Driven by Accounting in Grid Computing Environment (그리드 컴퓨팅 환경에서 어카운팅에 의해 구동되는 자원 접근 제어 구조 설계)

  • Hwang, Ho-Jeon;An, Dong-Un;Chung, Seung-Jong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.1
    • /
    • pp.1-9
    • /
    • 2007
  • At present various methods relating resource access control in grid environment are being studied. Most of the access authorization to grid resource is designed fit to the attributes and the role of user. But resource access control is to be made in the respect of business model to activate grid. Therefore this study suggests a model that can operate resource access control driven by grid accounting information. On the base of collection of accounting information about grid job, processing cost is yielded. If the user's available fund is less than processing cost, it gets to control grid job by the resource access control policy. Finally when grid job is completed, user is assigned to pay the charges for using resource of supplier. Then resource provider gets to supply stable resource in grid by participating it voluntarily to use idle resource. This study is esteemed to realize utility computing environment correspondent to economic principle by ensuring resource access policy of organizations which participate in grid.

A Resource Access Control Mechanism Considering Grid Accounting (그리드 어카운팅을 고려한 자원 접근 제어 메커니즘)

  • Hwang Ho-Joen;An Dong-Un;Chung Seung-Jong
    • The KIPS Transactions:PartA
    • /
    • v.13A no.4 s.101
    • /
    • pp.363-370
    • /
    • 2006
  • Currently, many people have been researching diverse mechansmims related to a resource access control in Grid environment. Mostly Grid user's resource access control was designed to authorize according to their attributes and roles. But, to provide Grid with resources continuously, a resource access based on utility computing must be controlled. So, in this paper we propose and implement mechanism that intergrates Grid accounting concept with resource access control. This mechanism calcuates costs of Grid service on the basis of accounting, and determines based on user's fund availibility whether they continue to make use of site resources or not. Grid jobs will be controlled according to a site resource access control policy only if the amount of available fund is less than its costs. If Grid job completed, resource consumer pays for the costs generated by using provider's idle resources. Therefore, this paper provides mechansim to be able to control user's resource access by Grid accounting, so that it is evaluated as the research to realize utility computing environment corresponding to economic principle.

Secure Attribute-Based Access Control with a Ciphertext-Policy Attribute-Based Encryption Scheme

  • Sadikin, Rifki;Park, Young Ho;Park, Kil Houm
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.1
    • /
    • pp.1-12
    • /
    • 2014
  • An access control system is needed to ensure only authorized users can access a sensitive resource. We propose a secure access control based on a fully secure and fine grained ciphertext-policy attribute-based encryption scheme. The access control for a sensitive resource is ensured by encrypting it with encryption algorithm from the CP-ABE scheme parameterized by an access control policy. Furthermore, the proposed access control supports non-monotone type access control policy. The ciphertext only can be recovered by users whose attributes satisfy the access control policy. We also implement and measure the performance of our proposed access control. The results of experiments show that our proposed secure access control is feasible.

Resource management service model implemented for the Internet of Things services access control (사물인터넷 서비스 접근제어를 위한 리소스 서비스 관리 모델 구현)

  • Kim, Jin-Bo;Kim, Mi-Sun;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.5 no.3
    • /
    • pp.9-16
    • /
    • 2016
  • Many countless services form using the Internet technology of things, in order to provide a variety of services in the current also many institutions, have created a new technology and protocols. In this paper, we design the resource service model for the efficient service provided by the system for controlling access to the Internet services of the things, to implement. The resources of the service that the user tries to access modeled using LCRS (Left Child-Right Sibling) tree, by utilizing the service token resource, it is possible to perform access control to services.

Design and Implementation of a Web-based Access Control Service (웹 기반의 접근 제어 서비스에 대한 설계 및 구현)

  • 김흥기;이용환;민덕기
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.208-210
    • /
    • 2001
  • 본 논문은 기존에 운영되고 있는 접근 제한을 고려하지 않고 만들었던 웹사이트를 회전 접근 관리가 가능한 웹사이트로 확장하는 방법을 제안한다. 제시하는 방법은 확장에 필요한 모듈들을 컴포넌트 방식으로 추가하여 기존의 사이트의 수정이 필요 없이 회원관리가 가능하도록 한다. 특히 기존의 ACL(Access Control List)에 없는 새로운 방식인 Resource Grouping 방식을 제시하여 좀더 체계적이고 일괄적인 리소스 관리가 가능하게 한다. 이 Resource Grouping 방식은 Simple Resource Grouping, Resource Grouping With Attributes, Resource Grouping with Parameter로 세부 분류되어 소개된다.

Authentication and Trust Relationship Chaining for Resource Sharing Community (자원 공유 커뮤니티를 위한 인증 기술과 신뢰관계사슬)

  • Kim, Jeong Gon;Kim, Shin Kon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.55-69
    • /
    • 2010
  • This article proposed the authentication protocol for peer-to-peer resource sharing community. The proposed protocol does not require a priori information for generating and exchanging authentication key. Also this protocol can provide the delicate access control by allowing the user(authenticator) to assign the trust level to the authentication supplicant, which can be used to decide if the resource providing node will accept the resource sharing request from a resource requesting node. Trust Relationship Chaining provides the environment where trust levels (included in the trust table) of nodes in the resource sharing community are propagated among nodes when trust tables are exchanged between two nodes engaged in mutual authentication process and authentication refresh so that any two nodes which are not directly mutual-authenticated can assign the trust level each other for the access control for resource sharing. In the proposed protocol a node can implements the authentication refresh continuously to verify the effectiveness of authentication after mutual authentication so that the authentication of new node or authentication revocation(effectiveness cancellation) of the departed node can be propagated to the all the nodes in RSC and eventually safe resource sharing community is configured.

Design of U-Healthcare Access Authority Control Model Using Context Constrain RBAC Model (상황제한 RBAC 모델을 이용한 U-헬스케어 접근권한 제어모델 설계)

  • Kim, Chang-Bok;Kim, Nam-Il;Park, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.233-242
    • /
    • 2009
  • The security of medical information need continued research about steady and flexible security model because of privacy of patient's as well as directly relation in the patient's life. In particular, u-healthcare environment is need flexible and detailed access control by variety changes of context. Control model analyzed relation of resource and authority, and analyzed authority about all accessible resource from access point using K2BASE. The context-based access control model can change flexibly authority change and role, and can obtain resource of authority granted and meaningly connected resource. As a result, this thesis can apply flexible and adaptive access control model at u-healthcare domain which context change various.

  • PDF

Advanced Resource Management with Access Control for Multitenant Hadoop

  • Won, Heesun;Nguyen, Minh Chau;Gil, Myeong-Seon;Moon, Yang-Sae
    • Journal of Communications and Networks
    • /
    • v.17 no.6
    • /
    • pp.592-601
    • /
    • 2015
  • Multitenancy has gained growing importance with the development and evolution of cloud computing technology. In a multitenant environment, multiple tenants with different demands can share a variety of computing resources (e.g., CPU, memory, storage, network, and data) within a single system, while each tenant remains logically isolated. This useful multitenancy concept offers highly efficient, and cost-effective systems without wasting computing resources to enterprises requiring similar environments for data processing and management. In this paper, we propose a novel approach supporting multitenancy features for Apache Hadoop, a large scale distributed system commonly used for processing big data. We first analyze the Hadoop framework focusing on "yet another resource negotiator (YARN)", which is responsible for managing resources, application runtime, and access control in the latest version of Hadoop. We then define the problems for supporting multitenancy and formally derive the requirements to solve these problems. Based on these requirements, we design the details of multitenant Hadoop. We also present experimental results to validate the data access control and to evaluate the performance enhancement of multitenant Hadoop.

An Access Control using SPKI Certificate in Web Environment (웹 환경에서 SPKI 인증서를 이용한 접근 제어)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.11-19
    • /
    • 2006
  • Web service is giving an equal privilege to all user for sharing their resources. Under this situation, a lot of vulnerability against the various attacks through the Internet is possible, more sophisticated security services are necessary. In this paper, we propose an access control scheme using SPKI (Simple Public Infrastructure). The scheme designates an access control by providing the certificate to users who request a connection for resource sharing and limits the resource usage of information provider according to the access right that is given to their own rights.

  • PDF