International Journal of Computer Applications (0975 8887) Volume 138 No.9, March 2016 25 A Novel Security Approach for Access Model Teena Jaiswal Department of Computer Science, Makhanlal Chaturvedi National University. BHOPAL (M.P) Umesh Kumar Singh School of Engineering & Technology, Vikram University, Ujjain(MP) Shabana Sheikh Department of computer Application, Govt. Girls PG College, Ujjain (MP) ABSTRACT In vision of the importance of researcher’s sharing the same theory of network security, this paper suggests a novel security approach for network security in which network security issues can be treated essentially. The meaning of network security has been identified for some time, but provides networks (especially public networks) with security utilities has proven difficult. The act of the network itself in computer network security has been minimum , as systems certainly preserve their own security. To resolve such problems, this paper recommends a network security approach for the access model. Keywords Access policy, network security, VPN, Close User Group, Wireless sensor network. 1. INTRODUCTION A network is considered as a wired or wireless network, if the access medium is some kind of physical cable connection between the workstations, such as a copper cable or a fiber- optic cable. Alternatively, a network is considered as a wireless network if the access medium depend on some kind of waving through the air, such as radio frequency (RF) communication. A network can also be distributed according to its geographical coverage. Depending on its size, a network can be a personal area network (PAN), a local area network (LAN), a metropolitan area network (MAN), or a wide area network (WAN).[6] The progress of the information society has carried with it a natural demand to make communications systems more open. However, performance this risk exposing systems to the vulnerability of illegal access .Systems should become available to strange users who are not regular members of a system's user group. Such users may access systems from remote sites via communication networks. To manage with new situations like these, strong security mechanisms will be required in every wired and wireless system. Furthermore, additional security roles in the networks themselves will be necessary .While the significance of network security has been accepted for some time, providing networks (especially public networks) with security utilities has verified difficult .The role of the network itself in computer network security has been minimal, as computers certainly preserve their own security. In observation of the importance of researchers sharing the same idea of network security, this paper proposes a novel approach to the reference model for network security in which network security concern scan be treated essentially. 2. SECURITY ISSUES IN NETWORKING Security issues in wired and wireless networks (especially public networks), the tapping of telephone wires has been discussed and many techniques for hiding information have been proposed. Several ways of prevent illegal access to the system have been discussed such as using ID cards or passwords when entering machine rooms and using console keyboards. As most network traffic based traditionally consisted of voice communications, network security issues other than those mention over have rarely been discuss .As a outcome of latest enhance in non-voice traffic which have mirrored the development of today's information society, the importance of network security has now been recognized. It is much more difficult to identify the receiving terminal in non- voice telecommunication services than it is in man to man voice transmission .Moreover, as network shave become more complex and as their level of functioning has increased, databases have been introduced to control service is and manage the networks themselves. A new threat from the point of view of security is the illegal accessing of such databases. Other threats are illegal leaks of important secret information as a result of complex network use such as resource common use in VPNs (virtual private networks) and connections between public network sand leased lines (or private networks). The social importance of networks has improved and providing networks (especially public networks) with their individual security purposes has become a necessary issue. In [7], a secure network access system is presented. It provides node authentication, packet authentication, packet integrity, packet confidentiality. 3. CURRENT STATUS OF NETWORK SECURITY Network security surveys other than those concerned with monitoring and the illegal accessing of systems have been done essentially in the computer network field. There, as the information society has developed, security in computer networks has been discussed as an essential issue. [5] 3.1 Computer Networks In computer systems in which a large amount of information is stored and processed, illegal leaks and the illegal alteration of information are big problems. Therefore, in the computer field, security issues such as security models and access models have been studied from the early stages, and several technical solutions for security problems related to encryption and authentication have been proposed. Examples of security models being studied include the Bell and La-Paula model [11, Take-Grant model [2], Clark-Wilson model [3] and Chinese Wall model[4].In access control design, which aims to prevent illegal access rules between the object, being accessed and the subject doing the accessing, are described and the access from subject to object is controlled by following the described rules. The principle of these rules is called "security policy" .The system in which computers are connected via a network is called a computer network. Investigations into computer network security are being focused on illegal access to computers via networks. However, in the discussion on computer network security, the role of networks as seen from the point of view of security is virtually nil. It is the computer terminals, which are equipped