Distributed Trust Based Access Control Architecture for Pervasive Computing

被引:0
|
作者
Javeed, M. Younas [1 ]
Nawaz, Sidra [1 ]
机构
[1] EME Coll, NUST, Dept Comp Engn, Rawalpindi, Pakistan
来源
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009) | 2009年
关键词
Trust; Pervasive computing; Access Control; Security; Distributed systems;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the demands of the handheld devices and pervasive services are increasing, the issues of security have alarmingly risen. One can wonder about the pervasive services to be free of every security flaw. The paper suggests a mechanism for a trust based ad-hoc authentication with a distributed trust based mechanism and defined security policies related to access control for pervasive devices. The openness of a true pervasive environment has been encountered with the interaction history and recommendations. The architecture is designed to provide secure autonomous services for an assumed pervasive based scenario. The nature of pervasiveness is satisfied by allowing the novel user to proceed in the system but with the minimum trust initially, which changes dynamically depending on the actions which the user performs. It secures the privacy of the user by the implementation of security policies in the Security Manger(SM) in order to gain final access to the service.
引用
收藏
页码:464 / 469
页数:6
相关论文
共 50 条
  • [1] An XML Based Access Control Architecture for Pervasive Computing
    Molla, Mohammad M.
    Madiraju, Praveen
    Malladi, Srilaxmi
    Ahamed, Sheikh Iqbal
    2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 803 - +
  • [2] A distributed trust management scheme in the pervasive computing environment
    Sun, Tao
    Denko, Mieso K.
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1219 - 1222
  • [3] Trust Based Pervasive Computing
    Shane Balfe
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1477 - 1480
  • [4] An efficient feedback-based trust model for pervasive computing
    Chen J.
    Bruda S.D.
    International Journal of Digital Content Technology and its Applications, 2010, 4 (07)
  • [5] Secure and Distributed Access Control for Dynamic Pervasive Edge Computing Services
    Liu, Lingshuang
    Huang, Cheng
    Zhu, Dan
    Liu, Dongxiao
    Ni, Jianbing
    Shen, Xuemin
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 5487 - 5492
  • [6] Enabling Efficient and Distributed Access Control for Pervasive Edge Computing Services
    Liu, Lingshuang
    Huang, Cheng
    Zhu, Dan
    Liu, Dongxiao
    Ni, Jianbing
    Shen, Xuemin
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (12) : 11342 - 11356
  • [7] Research on cloud computing service based on trust access control
    Sun, Panjun
    INTERNATIONAL JOURNAL OF ENGINEERING BUSINESS MANAGEMENT, 2020, 12
  • [8] Trust based privacy protection method in pervasive computing
    Gao, Feng
    He, Jingsha
    Ma, Shunan
    Journal of Networks, 2012, 7 (02) : 322 - 328
  • [9] Access Control Protocol for Conversation Based Composite Web Services in Pervasive Computing
    Gao, Aiqiang
    Yang, Dongqing
    Tang, Shiwei
    Zhang, Ming
    2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 32 - +
  • [10] A context-based and associated access control model in pervasive computing environment
    Li, Ying
    Tong, Weiqin
    Zhi, Xiaoli
    2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 143 - 146