Distributed Trust Based Access Control Architecture for Pervasive Computing

被引:0
|
作者
Javeed, M. Younas [1 ]
Nawaz, Sidra [1 ]
机构
[1] EME Coll, NUST, Dept Comp Engn, Rawalpindi, Pakistan
关键词
Trust; Pervasive computing; Access Control; Security; Distributed systems;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the demands of the handheld devices and pervasive services are increasing, the issues of security have alarmingly risen. One can wonder about the pervasive services to be free of every security flaw. The paper suggests a mechanism for a trust based ad-hoc authentication with a distributed trust based mechanism and defined security policies related to access control for pervasive devices. The openness of a true pervasive environment has been encountered with the interaction history and recommendations. The architecture is designed to provide secure autonomous services for an assumed pervasive based scenario. The nature of pervasiveness is satisfied by allowing the novel user to proceed in the system but with the minimum trust initially, which changes dynamically depending on the actions which the user performs. It secures the privacy of the user by the implementation of security policies in the Security Manger(SM) in order to gain final access to the service.
引用
下载
收藏
页码:464 / 469
页数:6
相关论文
共 50 条
  • [41] Pervasive Computing Secure Application Models Based on Trust Algorithm
    Yong, Ting
    Qin, Jun
    Chen, Yanling
    Fang, Shanyao
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 606 - 609
  • [42] An Adaptive Framework for Trust based Security in Pervasive Computing Environment
    Iltaf, Naima
    Ghafoor, Abdul
    Hussain, Khtar
    2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 624 - 628
  • [43] An Artificial Intelligence-based Trust Model for Pervasive Computing
    D'Angelo, Gianni
    Rampone, Salvatore
    Palmieri, Francesco
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 701 - 706
  • [44] Agent-based automated trust negotiation for pervasive computing
    Liu, ZY
    Xiu, DX
    ICESS 2005: SECOND INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2005, : 300 - 307
  • [45] A novel cloud-based trust model for pervasive computing
    He, R
    Niu, JW
    Yuan, M
    Hu, JP
    FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2004, : 693 - 700
  • [46] A system architecture for pervasive computing
    Xu, Wenshuan
    Xin, Yunwei
    Lu, Guizhang
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 5, PROCEEDINGS, 2007, : 772 - +
  • [47] Context-Aware Role-based Access Control in Pervasive Computing Systems
    Kulkarni, Devdatta
    Tripathi, Anand
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 113 - 122
  • [48] Authentication-based access control approach for enhancing security in pervasive computing environments
    Gnaneshwari, G. R.
    Hema, M. S.
    Lingareddy, S. C.
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 211 - 232
  • [49] Exploiting hierarchical identity-based encryption for access control to pervasive computing information
    Hengartner, U
    Steenkiste, P
    FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, : 384 - 393
  • [50] Trust Service Selection in Pervasive Computing
    Wang, Xiaoying
    Chen, Yingge
    Xu, Benlian
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 173 - 176