Authentication-based access control approach for enhancing security in pervasive computing environments

被引:0
|
作者
Gnaneshwari, G. R. [1 ]
Hema, M. S. [2 ]
Lingareddy, S. C. [1 ]
机构
[1] Sri Venkateshwara Coll Engn, Dept Comp Sci & Engn, Bangalore, Karnataka, India
[2] Anurag Univ, Dept Informat Technol, Hyderabad, India
关键词
Security; Pervasive computing (PC); Authentication; Access control; Wireless communication; PRIVACY-PRESERVING AUTHENTICATION; CONTROL SCHEME; EFFICIENT; MODEL;
D O I
10.1108/IJPCC-02-2021-0044
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a major challenging task in the Pervasive computing environment. To solve the security issues and to increase the communication reliability, an authentication-based access control approach is developed in this research to ensure the level of security in the Pervasive computing environment. Design/methodology/approach This paper aims to propose authentication-based access control approach performs the authentication mechanism using the hashing, encryption, and decryption function. The proposed approach effectively achieves the conditional traceability of user credentials to enhance security. Moreover, the performance of the proposed authentication-based access control approach is estimated using the experimental analysis, and performance improvement is proved using the evaluation metrics. It inherent the tradeoff between authentication and access control in the Pervasive computing environment. Here, the service provider requires authorization and authentication for the provision of service, whereas the end-users require unlinkability and untraceability for data transactions. Findings The proposed authentication-based access control obtained 0.76, 22.836 GB, and 3.35 sec for detection rate, memory, and time by considering password attack, and 22.772GB and 4.51 sec for memory and time by considering without attack scenario. Originality/value The communication between the user and the service provider is progressed using the user public key in such a way that the private key of the user can be generated through the encryption function.
引用
收藏
页码:211 / 232
页数:22
相关论文
共 50 条
  • [31] A Collaborative Access Control based on XACML in Pervasive Environments
    Kim, Kyu Il
    Ko, Hyuk Jin
    Choi, Won Gil
    Lee, Eun Ju
    Kim, Ung Mo
    [J]. ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 7 - 13
  • [32] PROPOSED ACCESS CONTROL AND SECURITY ARCHITECTURE BASED ON FOG COMPUTING FOR IOT ENVIRONMENTS
    Bharathi, C. R.
    Ramesh, L. V.
    Priya, L. Vamsi
    [J]. INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (02) : 1398 - 1404
  • [33] A Domain-Oriented Approach for Access Control in Pervasive Environments
    Li, Jun
    Christianson, Bruce
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 278 - +
  • [34] Dynamic Authentication-Based Secure Access to Test Infrastructure
    Portolan, Michele
    Reynaud, Vincent
    Maistri, Paolo
    Leveugle, Regis
    [J]. 2020 IEEE EUROPEAN TEST SYMPOSIUM (ETS 2020), 2020,
  • [35] A trust-based security system for ubiquitous and pervasive computing environments
    Boukerche, Azzedine
    Ren, Yonglin
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4343 - 4351
  • [36] Context-based secure resource access in pervasive computing environments
    Tripathi, A
    Ahmed, T
    Kulkarni, D
    Kumar, R
    Kashiramka, K
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 159 - 163
  • [37] An agent approach to security in pervasive environments
    Kagal, L
    [J]. EIGHTEENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AAAI-02)/FOURTEENTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE (IAAI-02), PROCEEDINGS, 2002, : 984 - 984
  • [38] Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments
    Choi, Jung Hwan
    Kang, Dong Hyun
    Jang, Hyunsu
    Eom, Young Ik
    [J]. 2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008), 2008, : 491 - 498
  • [39] Integrating Access Control Obligations in the Session Initiation Protocol for Pervasive Computing Environments
    Sharghi, Hassan
    Liscano, Ramiro
    [J]. E-TECHNOLOGIES: EMBRACING THE INTERNET OF THINGS, MCETECH 2017, 2017, 289 : 24 - 40
  • [40] A Context-Aware Access Control Model for Pervasive Computing in Enterprise Environments
    Zhu, Zhou
    Xu, Renzuo
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4572 - 4577