Abstract
As the Internet was activated and the mobile environment developed, it has become more common to access dynamic XML data regardless of location and time. XML is widely used for information exchange and representation of data for databases, applications, etc., using the advantage to describe information. As a result, large-capacity XML data becomes increasingly complex, and demand for data access policies is increasing. Security issues such as authorization of access to resources, authentication, security enhancement and privacy arise. The mobile computing environment differs from existing information systems in several ways, so it is difficult to apply the existing access control as it is. Therefore, this paper proposes a secure access policy method for query processing to enable efficient resource management in dynamic XML data environment. The results of the evaluation are also presented to show that the additionally proposed method is efficient and excellent.
Similar content being viewed by others
References
Kim, J.C., Chung, K.Y.: Depression index service using knowledge based crowdsourcing in smart health. Wirel. Pers. Commun. 93(1), 255–268 (2017)
Charles P.P., Shari L.P.: Security in Computing, 3rd edn. Prentice Hall, Upper Saddle River (2003)
Bishop, M.: Computer Security. Addison Wesley, Boston (2003)
Bartel, M., Boyer, J., Fox, B., LaMacchia, Brian , Simon, E.: XML Signature syntax and processing. http://www.w3.org/TR/xmldsig-core/ (2002)
Deutsch, A., Fernandez, M., Florescu, D., Levy, A., Suciu, D.: A query language for XML. In: International Conference on World Wide Web. http://www8.org/, (1999)
Mohan, S., Sengupta, A., Wu, Y.: A Framework for access control for XML. ACM Journal, vol. v, No. pp.1–38, July (2006)
Kudo, M., Hada, S.: XML Document Security based on provisional authorization. In: Proceedings of the \(7^{\rm th}\) ACM Conference on Computer and Communications Security, Athens, Greece, pp. 87–96, Nov (2000)
Hada, S., Kudo, M.: XML access control language: provisional authorization for XML Documents. http://www.trl.ibm.com/projects/xml/xss4j/docs/xacl-spec.html, pp. 1–28, April (2002)
Guard, C.: eXtenible Rights Markup Language (XrML) 2.0. http://www.xrml.org (2001)
Gabillon, A., Bruno, E.: Regulating access to XML documents. In: Proceedings of the Fifteenth Annual IFIP WG 11.3 Working Conference on Database Security, Niagara on the Lake, Ontario, July (2001)
Bose, S., Fegaras, L.: XFrag: a query processing framework for fragmented XML Data. In: Proceedings of the WebDB, pp. 97—102 (2005)
Kim, J.M., Jung, H., Kang, M.A., Chung, K.: 3D human-gesture interface for fighting games using motion recognition sensor. Wirel. Pers. Commun. 89(3), 927–940 (2016)
Kim, J.C., Jung, H., Chung, K.Y.: Mining based urban climate disaster index service according to potential risk. Wirel. Pers. Commun. 89(3), 1009–1025 (2016)
Chung, Park, R.C.: P2P cloud network services for iot based disaster situations information. Peer-to-Peer Netw. Appl. 9(3), 566–577 (2016)
Jung, H., Chung, K.Y.: P2P context awareness based sensibility design recommendation using color and bio-signal analysis. Peer-to-Peer Netw. Appl. 9(3), 546–557 (2016)
Chung, K.Y., Park, R.C.: PHR open platform based smart health service using distributed object group framework. Clust. Comput. 19(1), 505–517 (2016)
Huo, H., Wang, G., Hui, X., Zhou, R., Ning, B., Xiao, C.: efficient query processing for streamed xml fragments. Lecture Notes in Computer Science(LNCS), vol. 3882, DASFAA, pp. 468–482 (2006)
Damiani, E., Vimercati, S., Paraboschi, S., Samarati, P.: Design and implementation of an access control processor for xml documents. In: Proceedings of the 9th International WWW Conference, Amsterdam, pp. 59–75, May (2000)
Jung, H., Chung, K.Y.: PHR based life health index mobile service using decision support model. Wirel. Pers. Commun. 86(1), 315–332 (2016)
Yoo, H., Chung, K.Y.: PHR based diabetes index service model using life behavior analysis. Wirel. Pers. Commun. 93(1), 161–174 (2017)
Jung, H., Yoo, H., Chung, K.Y.: Associative context mining for ontology-driven hidden knowledge discovery. Clust. Comput. 19(4), 2261–2271 (2016)
World Wide Web Consortium (W3C) XML path language (XPath) 2.0. http://www.w3.org/TR/xpath20 (2001)
The XML benchmark project. http://www.xml-benchmark.org
Acknowledgements
This work was supported by the research grant of Pai Chai Unviersity in 2017.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jo, SM. Secure access policy for efficient resource in mobile computing environment. J Comput Virol Hack Tech 13, 297–303 (2017). https://doi.org/10.1007/s11416-017-0301-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11416-017-0301-y