Paper Key : IRJ************857
Author: Chavan Prem Subhash,Nimse Nikhil Navnath ,Pansare Parth Jalindar ,Neharkar Roshan Navnath ,Dumbre Sankalp
Date Published: 13 Apr 2025
Abstract
There are various methods to safeguard data and networks from potential attackers. Firewalls are employed to secure passwords as necessary; however, they often fall short. Consequently, systems and networks remain vulnerable to threats. An Intrusion Detection System (IDS) monitors for unauthorized activities within computer systems that originate from the internet. Hackers may manipulate these systems to access valuable and confidential files. It is important to note that most firewalls and IDS primarily focus on defending against external attacks. Access control is a critical security component that adapts to technological advancements and contemporary social contexts. Numerous access control models emerge from specific application domains, such as healthcare and collaborative enterprises. Nevertheless, effective implementation of these models requires additional management strategies, consideration of human factors, and infringement management tailored to the specific environment. This project discusses a robust mechanism for file protection and authentication utilizing the device's MAC address. Keywords: File Access Control Mechanism, Device MAC Address Authentication