Distributed Trust Based Access Control Architecture for Pervasive Computing

被引:0
|
作者
Javeed, M. Younas [1 ]
Nawaz, Sidra [1 ]
机构
[1] EME Coll, NUST, Dept Comp Engn, Rawalpindi, Pakistan
关键词
Trust; Pervasive computing; Access Control; Security; Distributed systems;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the demands of the handheld devices and pervasive services are increasing, the issues of security have alarmingly risen. One can wonder about the pervasive services to be free of every security flaw. The paper suggests a mechanism for a trust based ad-hoc authentication with a distributed trust based mechanism and defined security policies related to access control for pervasive devices. The openness of a true pervasive environment has been encountered with the interaction history and recommendations. The architecture is designed to provide secure autonomous services for an assumed pervasive based scenario. The nature of pervasiveness is satisfied by allowing the novel user to proceed in the system but with the minimum trust initially, which changes dynamically depending on the actions which the user performs. It secures the privacy of the user by the implementation of security policies in the Security Manger(SM) in order to gain final access to the service.
引用
收藏
页码:464 / 469
页数:6
相关论文
共 50 条
  • [1] An XML Based Access Control Architecture for Pervasive Computing
    Molla, Mohammad M.
    Madiraju, Praveen
    Malladi, Srilaxmi
    Ahamed, Sheikh Iqbal
    2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 803 - +
  • [2] A Trust-Based Access Control Model for Pervasive Computing Applications
    Toahchoodee, Manachai
    Abdunabi, Ramadan
    Ray, Indrakshi
    Ray, Indrajit
    DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 307 - 314
  • [3] Distributed, uncertainty-aware access control for pervasive computing
    Hengartner, Urs
    Zhong, Ge
    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 241 - +
  • [4] A Distributed Access Control Architecture for Cloud Computing
    Almutairi, Abdulrahman A.
    Sarfraz, Muhammad I.
    Basalamah, Saleh
    Aref, Walid G.
    Ghafoor, Arif
    IEEE SOFTWARE, 2012, 29 (02) : 36 - 44
  • [5] Trust Based Pervasive Computing
    Shane Balfe
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1477 - 1480
  • [6] Secure and Distributed Access Control for Dynamic Pervasive Edge Computing Services
    Liu, Lingshuang
    Huang, Cheng
    Zhu, Dan
    Liu, Dongxiao
    Ni, Jianbing
    Shen, Xuemin
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 5487 - 5492
  • [7] Enabling Efficient and Distributed Access Control for Pervasive Edge Computing Services
    Liu L.
    Huang C.
    Zhu D.
    Liu D.
    Ni J.
    Shen X.
    IEEE Transactions on Mobile Computing, 2024, 23 (12) : 1 - 14
  • [8] APECS: A Distributed Access Control Framework for Pervasive Edge Computing Services
    Dougherty, Sean
    Tourani, Reza
    Panwar, Gaurav
    Vishwanathan, Roopa
    Misra, Satyajayant
    Srikanteswara, Srikathyayani
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 1405 - 1420
  • [9] A distributed trust management scheme in the pervasive computing environment
    Sun, Tao
    Denko, Mieso K.
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1219 - 1222
  • [10] TrustAC:: Trust-based access control for pervasive devices
    Almenárez, F
    Marín, A
    Campo, C
    García, RC
    SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2005, 3450 : 225 - 238