Distributed Trust Based Access Control Architecture for Pervasive Computing

被引:0
作者
Javeed, M. Younas [1 ]
Nawaz, Sidra [1 ]
机构
[1] EME Coll, NUST, Dept Comp Engn, Rawalpindi, Pakistan
来源
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009) | 2009年
关键词
Trust; Pervasive computing; Access Control; Security; Distributed systems;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the demands of the handheld devices and pervasive services are increasing, the issues of security have alarmingly risen. One can wonder about the pervasive services to be free of every security flaw. The paper suggests a mechanism for a trust based ad-hoc authentication with a distributed trust based mechanism and defined security policies related to access control for pervasive devices. The openness of a true pervasive environment has been encountered with the interaction history and recommendations. The architecture is designed to provide secure autonomous services for an assumed pervasive based scenario. The nature of pervasiveness is satisfied by allowing the novel user to proceed in the system but with the minimum trust initially, which changes dynamically depending on the actions which the user performs. It secures the privacy of the user by the implementation of security policies in the Security Manger(SM) in order to gain final access to the service.
引用
收藏
页码:464 / 469
页数:6
相关论文
共 50 条
  • [41] Trust Management in the Pervasive Computing Era
    Trcek, Denis
    IEEE SECURITY & PRIVACY, 2011, 9 (04) : 52 - 55
  • [42] Context-Aware Role-based Access Control in Pervasive Computing Systems
    Kulkarni, Devdatta
    Tripathi, Anand
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 113 - 122
  • [43] Trust Based Access Control Framework for R-OSGi
    Zhang, Luyang
    Rao, Ruonan
    2010 2ND INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS PROCEEDINGS (DBTA), 2010,
  • [44] Secure Pervasive Social Communications Based on Trust in a Distributed Way
    Huang, Chaoyin
    Yan, Zheng
    Li, Ning
    Wang, Mingjun
    IEEE ACCESS, 2016, 4 : 9225 - 9238
  • [45] Private Blockchain Envisioned Access Control System for Securing Industrial IoT-Based Pervasive Edge Computing
    Saha, Sourav
    Bera, Basudeb
    Das, Ashok Kumar
    Kumar, Neeraj
    Islam, Sk Hafizul
    Park, Youngho
    IEEE ACCESS, 2023, 11 : 130206 - 130229
  • [46] A Study of Trust & Privacy Models in Pervasive Computing Approach to Trusted Computing Platforms
    Khiabani, Hamed
    Ab Manan, Jamalul-Lail
    Sidek, Zailani Mohamed
    2009 INTERNATIONAL CONFERENCE FOR TECHNICAL POSTGRADUATES (TECHPOS 2009), 2009, : 140 - +
  • [47] Fuzzy-Based Integration of Security and Trust in Distributed Computing
    Kumar, P. Suresh
    Ramachandram, S.
    SOFT COMPUTING FOR PROBLEM SOLVING, SOCPROS 2017, VOL 1, 2019, 816 : 899 - 912
  • [48] Design and Implementation of Trust - based Access Control System fo Cloud Computing
    Xia, Hui
    2017 IEEE 3RD INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC), 2017, : 922 - 926
  • [49] Dynamic Game Access Control based on Trust
    Ma, Shunan
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1369 - 1373
  • [50] Access Control System for Distributed Computing Networks
    Konoplev, A. S.
    Kalinin, M. O.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2016, 50 (08) : 664 - 668