Kernel-Based Container File Access Control Architecture to Protect Important Application Information

نویسندگان

چکیده

Container platforms ease the deployment of applications and respond to failures. The advantages container have promoted their use in information services. However, is accompanied by associated security risks. For instance, malware uploaded users can leak important information, malicious operators cause unauthorized modifications files create service errors. These threats degrade quality services reduce reliability. To overcome these issues, should be protected file-access control functions. legacy techniques, such as umask SecureOS, do not support platforms. address this problem, we propose a novel kernel-based architecture study access files. proposed comprises three components. functionality performance were assessed implementing it on Linux platform. Our analysis confirmed that adequately controls users’ performs par with techniques.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

neural classifier ensemble using error-correcting output codes: access control application

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

The application of security policy to role-based access control and the common data security architecture

In this paper, the approaches to introducing security policy into Role-Based Access Control (RBAC) and the Common Data Security Architecture (CDSA) are proposed. We apply security policy to a role’s privileges in RBAC. The extended CDSA supports user-definable trust policy enforcement. Furthermore, a policy description language is discussed.

متن کامل

Novel Architecture for Controlling File System Access

File system administration directly or indirectly affects all users of computer systems today. In an organization, users interact directly with managed file systems, which provide a means of data storage. Users of on-line services, for example, search engines, social networks, photo and video sharing, web based email, etc., rely on managed file systems indirectly, for storing and accessing data...

متن کامل

Enabling Transactional File Access via Lightweight Kernel Extensions

Transactions offer a powerful data-access method used in many databases today trough a specialized query API. User applications, however, use a different fileaccess API (POSIX) which does not offer transactional guarantees. Applications using transactions can become simpler, smaller, easier to develop and maintain, more reliable, and more secure. We explored several techniques how to provide tr...

متن کامل

File Transfer Application For Sharing Femto Access

In wireless access network optimization, today’s main challenges reside in traffic offload and in the improvement of both capacity and coverage networks. The operators are interested in solving their localized coverage and capacity problems in areas where the macro network signal is not able to serve the demand for mobile data. Thus, the major issue for operators is to find the best solution at...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2022

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics12010052