Distributed Trust Based Access Control Architecture for Pervasive Computing

被引:0
|
作者
Javeed, M. Younas [1 ]
Nawaz, Sidra [1 ]
机构
[1] EME Coll, NUST, Dept Comp Engn, Rawalpindi, Pakistan
关键词
Trust; Pervasive computing; Access Control; Security; Distributed systems;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the demands of the handheld devices and pervasive services are increasing, the issues of security have alarmingly risen. One can wonder about the pervasive services to be free of every security flaw. The paper suggests a mechanism for a trust based ad-hoc authentication with a distributed trust based mechanism and defined security policies related to access control for pervasive devices. The openness of a true pervasive environment has been encountered with the interaction history and recommendations. The architecture is designed to provide secure autonomous services for an assumed pervasive based scenario. The nature of pervasiveness is satisfied by allowing the novel user to proceed in the system but with the minimum trust initially, which changes dynamically depending on the actions which the user performs. It secures the privacy of the user by the implementation of security policies in the Security Manger(SM) in order to gain final access to the service.
引用
收藏
页码:464 / 469
页数:6
相关论文
共 50 条
  • [31] A Distributed Fog-based Access Control Architecture for IoT
    Alnefaie, Seham
    Cherif, Asma
    Alshehri, Suhair
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (12): : 4545 - 4566
  • [32] Distributed Access Control on IoT Ledger-based Architecture
    Lunardi, Roben Castagna
    Michelin, Regio Antonio
    Neu, Charles Varlei
    Zorzo, Avelino Francisco
    [J]. NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [33] Spatial Connector: Mapping Access Control Models for Pervasive Computing and Cloud Computing
    Satoh, Ichiro
    [J]. 14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS, 2017, 110 : 174 - 181
  • [34] MediaBroker: An architecture for pervasive computing
    Modahl, M
    Bagrak, I
    Wolenetz, M
    Hutto, P
    Ramachandran, U
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2004, : 253 - 262
  • [35] An attribute aggregation architecture with trust-based evaluation for access control
    Lee, Jaewon
    Kim, Heeyoul
    Hong, Joon Sung
    [J]. 2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, : 1011 - 1014
  • [36] Pervasive Computing Secure Application Models Based on Trust Algorithm
    Yong, Ting
    Qin, Jun
    Chen, Yanling
    Fang, Shanyao
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 606 - 609
  • [37] Agent-based automated trust negotiation for pervasive computing
    Liu, ZY
    Xiu, DX
    [J]. ICESS 2005: SECOND INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2005, : 300 - 307
  • [38] An Adaptive Framework for Trust based Security in Pervasive Computing Environment
    Iltaf, Naima
    Ghafoor, Abdul
    Hussain, Khtar
    [J]. 2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 624 - 628
  • [39] An Artificial Intelligence-based Trust Model for Pervasive Computing
    D'Angelo, Gianni
    Rampone, Salvatore
    Palmieri, Francesco
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 701 - 706
  • [40] A novel cloud-based trust model for pervasive computing
    He, R
    Niu, JW
    Yuan, M
    Hu, JP
    [J]. FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2004, : 693 - 700