Distributed Trust Based Access Control Architecture for Pervasive Computing

被引:0
|
作者
Javeed, M. Younas [1 ]
Nawaz, Sidra [1 ]
机构
[1] EME Coll, NUST, Dept Comp Engn, Rawalpindi, Pakistan
关键词
Trust; Pervasive computing; Access Control; Security; Distributed systems;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the demands of the handheld devices and pervasive services are increasing, the issues of security have alarmingly risen. One can wonder about the pervasive services to be free of every security flaw. The paper suggests a mechanism for a trust based ad-hoc authentication with a distributed trust based mechanism and defined security policies related to access control for pervasive devices. The openness of a true pervasive environment has been encountered with the interaction history and recommendations. The architecture is designed to provide secure autonomous services for an assumed pervasive based scenario. The nature of pervasiveness is satisfied by allowing the novel user to proceed in the system but with the minimum trust initially, which changes dynamically depending on the actions which the user performs. It secures the privacy of the user by the implementation of security policies in the Security Manger(SM) in order to gain final access to the service.
引用
下载
收藏
页码:464 / 469
页数:6
相关论文
共 50 条
  • [31] Zero-trust based dynamic access control for cloud computing
    Ri Wang
    Chen Li
    Kun Zhang
    Bibo Tu
    Cybersecurity, 8 (1)
  • [32] MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing
    Lin Guoyuan
    Wang Danru
    Bie Yuyu
    Lei Min
    CHINA COMMUNICATIONS, 2014, 11 (04) : 154 - 162
  • [33] An adaptive access control scheme based on trust degrees for edge computing
    Zheng, Wenying
    Chen, Bing
    He, Debiao
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [34] A Distributed Fog-based Access Control Architecture for IoT
    Alnefaie, Seham
    Cherif, Asma
    Alshehri, Suhair
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (12): : 4545 - 4566
  • [35] Distributed Access Control on IoT Ledger-based Architecture
    Lunardi, Roben Castagna
    Michelin, Regio Antonio
    Neu, Charles Varlei
    Zorzo, Avelino Francisco
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [36] Spatial Connector: Mapping Access Control Models for Pervasive Computing and Cloud Computing
    Satoh, Ichiro
    14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS, 2017, 110 : 174 - 181
  • [37] MediaBroker: An architecture for pervasive computing
    Modahl, M
    Bagrak, I
    Wolenetz, M
    Hutto, P
    Ramachandran, U
    SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2004, : 253 - 262
  • [38] An attribute aggregation architecture with trust-based evaluation for access control
    Lee, Jaewon
    Kim, Heeyoul
    Hong, Joon Sung
    2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, : 1011 - 1014
  • [39] An efficient feedback-based trust model for pervasive computing
    Chen J.
    Bruda S.D.
    International Journal of Digital Content Technology and its Applications, 2010, 4 (07)
  • [40] Trust-based dynamic authorization model for pervasive computing
    Guo, Yajun
    Wang, Liang
    Hong, Fan
    Han, Lansheng
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2007, 35 (08): : 70 - 73