Skip to main content
Log in

Secure access policy for efficient resource in mobile computing environment

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

As the Internet was activated and the mobile environment developed, it has become more common to access dynamic XML data regardless of location and time. XML is widely used for information exchange and representation of data for databases, applications, etc., using the advantage to describe information. As a result, large-capacity XML data becomes increasingly complex, and demand for data access policies is increasing. Security issues such as authorization of access to resources, authentication, security enhancement and privacy arise. The mobile computing environment differs from existing information systems in several ways, so it is difficult to apply the existing access control as it is. Therefore, this paper proposes a secure access policy method for query processing to enable efficient resource management in dynamic XML data environment. The results of the evaluation are also presented to show that the additionally proposed method is efficient and excellent.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Kim, J.C., Chung, K.Y.: Depression index service using knowledge based crowdsourcing in smart health. Wirel. Pers. Commun. 93(1), 255–268 (2017)

    Article  Google Scholar 

  2. Charles P.P., Shari L.P.: Security in Computing, 3rd edn. Prentice Hall, Upper Saddle River (2003)

  3. Bishop, M.: Computer Security. Addison Wesley, Boston (2003)

    Google Scholar 

  4. Bartel, M., Boyer, J., Fox, B., LaMacchia, Brian , Simon, E.: XML Signature syntax and processing. http://www.w3.org/TR/xmldsig-core/ (2002)

  5. Deutsch, A., Fernandez, M., Florescu, D., Levy, A., Suciu, D.: A query language for XML. In: International Conference on World Wide Web. http://www8.org/, (1999)

  6. Mohan, S., Sengupta, A., Wu, Y.: A Framework for access control for XML. ACM Journal, vol. v, No. pp.1–38, July (2006)

  7. Kudo, M., Hada, S.: XML Document Security based on provisional authorization. In: Proceedings of the \(7^{\rm th}\) ACM Conference on Computer and Communications Security, Athens, Greece, pp. 87–96, Nov (2000)

  8. Hada, S., Kudo, M.: XML access control language: provisional authorization for XML Documents. http://www.trl.ibm.com/projects/xml/xss4j/docs/xacl-spec.html, pp. 1–28, April (2002)

  9. Guard, C.: eXtenible Rights Markup Language (XrML) 2.0. http://www.xrml.org (2001)

  10. Gabillon, A., Bruno, E.: Regulating access to XML documents. In: Proceedings of the Fifteenth Annual IFIP WG 11.3 Working Conference on Database Security, Niagara on the Lake, Ontario, July (2001)

  11. Bose, S., Fegaras, L.: XFrag: a query processing framework for fragmented XML Data. In: Proceedings of the WebDB, pp. 97—102 (2005)

  12. Kim, J.M., Jung, H., Kang, M.A., Chung, K.: 3D human-gesture interface for fighting games using motion recognition sensor. Wirel. Pers. Commun. 89(3), 927–940 (2016)

    Article  Google Scholar 

  13. Kim, J.C., Jung, H., Chung, K.Y.: Mining based urban climate disaster index service according to potential risk. Wirel. Pers. Commun. 89(3), 1009–1025 (2016)

    Article  Google Scholar 

  14. Chung, Park, R.C.: P2P cloud network services for iot based disaster situations information. Peer-to-Peer Netw. Appl. 9(3), 566–577 (2016)

  15. Jung, H., Chung, K.Y.: P2P context awareness based sensibility design recommendation using color and bio-signal analysis. Peer-to-Peer Netw. Appl. 9(3), 546–557 (2016)

  16. Chung, K.Y., Park, R.C.: PHR open platform based smart health service using distributed object group framework. Clust. Comput. 19(1), 505–517 (2016)

  17. Huo, H., Wang, G., Hui, X., Zhou, R., Ning, B., Xiao, C.: efficient query processing for streamed xml fragments. Lecture Notes in Computer Science(LNCS), vol. 3882, DASFAA, pp. 468–482 (2006)

  18. Damiani, E., Vimercati, S., Paraboschi, S., Samarati, P.: Design and implementation of an access control processor for xml documents. In: Proceedings of the 9th International WWW Conference, Amsterdam, pp. 59–75, May (2000)

  19. Jung, H., Chung, K.Y.: PHR based life health index mobile service using decision support model. Wirel. Pers. Commun. 86(1), 315–332 (2016)

    Article  Google Scholar 

  20. Yoo, H., Chung, K.Y.: PHR based diabetes index service model using life behavior analysis. Wirel. Pers. Commun. 93(1), 161–174 (2017)

  21. Jung, H., Yoo, H., Chung, K.Y.: Associative context mining for ontology-driven hidden knowledge discovery. Clust. Comput. 19(4), 2261–2271 (2016)

  22. World Wide Web Consortium (W3C) XML path language (XPath) 2.0. http://www.w3.org/TR/xpath20 (2001)

  23. The XML benchmark project. http://www.xml-benchmark.org

Download references

Acknowledgements

This work was supported by the research grant of Pai Chai Unviersity in 2017.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sun-Moon Jo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jo, SM. Secure access policy for efficient resource in mobile computing environment. J Comput Virol Hack Tech 13, 297–303 (2017). https://doi.org/10.1007/s11416-017-0301-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-017-0301-y

Keywords

Navigation