Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

CONTEXT AWARE ACCESS CONTROL MODEL FOR TRUSTED USER IN PERVASIVE APPLICATION

Author : A.M.Hema 1 K.Kuppusamy 2

Date of Publication :12th August 2020

Abstract: In modern world of pervasive era, everything happens in distributed digital form. This feature provides an opportunity for the learner community to learn their course from any place at their preferable time span through any e- gadget. In this scenario, there is a possibility for security vulnerability during service access in pervasive manner. Hence, we propose an access control model, adapt dynamically by the context between trusted entities in pervasive environment. Trust computation done on user preference. The access decision to allow or deny the request from the trusted entity is based on the trust computation and the dynamic role of the user. The model was implemented and the results were analyzed for the valid users.

Reference :

    1. Bertino, Elisa, Piero Andrea Bonatti, and Elena Ferrari. "TRBAC: A temporal role-based access control model." ACM Transactions on Information and System Security (TISSEC) 4.3 (2001): 191-233.
    2. Chakraborty, Sudip, and Indrajit Ray. "TrustBAC: integrating trust relationships into the RBAC model for access control in open systems." Proceedings of the eleventh ACM symposium on Access control models and technologies. 2006.
    3. Chandran, Suroop Mohan, and James BD Joshi. "LoT-RBAC: a location and time-based RBAC model." International Conference on Web Information Systems Engineering. Springer, Berlin, Heidelberg, 2005.)
    4. Chen, Liang, and Jason Crampton. "On spatiotemporal constraints and inheritance in role based access control." Proceedings of the 2008 ACM symposium on Information, computer and communications security. 2008.
    5. Toahchoodee, Manachai, et al. "A trust-based access control model for pervasive computing applications." IFIP Annual Conference on Data and Applications Security and Privacy. Springer, Berlin, Heidelberg, 2009.
    6. A.M.Hema, Dr.K.Kuppusamy , "Trust based access control schemes for pervasive computing environment" , in Proc. of 2nd International Conference on Recent Trends In Information Technology (ICRTIT), 2012.IEEE Xplore ,Page 157-161.
    7. Ray, I., Ray, I., Chakraborty, S,” An Interoperable Context Sensitive Model of Trust.”, Journal of Intelligent Information Systems 32(1), 75–104 (2009)
    8. Ray, I., Toahchoodee, M.,” A Spatio-Temporal Access Control Model Supporting Delegation for Pervasive Computing Applications.”, In: Proceedings of the 5th International Conference on Trust, Privacy & Security in Digital Business, Turin, Italy (September 2008)
    9. Geepalla, Emsaieb, Behzad Bordbar, and Kozo Okano. "Verification of spatio-temporal role based access control using timed automata." 2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA). IEEE, 2012.
    10. Toahchoodee, M., Ray, I.: On the Formal Analysis of a Spatio-Temporal Role-Based Access Control Model. In: Atluri, V. (ed.) DAS 2008. LNCS, vol. 5094, pp. 17–32. Springer, Heidelberg (2008)
    11. Marsh, S.P, “Formalising Trust as a Computational Concepts” . Ph.D. Thesis , Ray, I., Kumar, M., Yu, L.,” LRBAC: A LocationAware Role-Based Access Control Model.”, In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol. 4332, pp. 147–161. Springer, Heidelberg (2006)
    12. University of Stirling (1994)
    13. Lamsal,P, “Requriements for modelling trust in ubiquitous computing and ad hoc networks”, Ad hoc mobile wireless netwoks- Research seminar on Telecommunications software(2002).
    14. Aime, M.D. and Lioy, “A.: Incremental trust: building trust from past experience.” In Proc. of IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, Italy (2005) 603-608
    15. Shand, B , Dimmock, N, Bacon , “J : Trust for Ubiquitous , Transaparent Collabration.” In Proc. of ACM: Special issue: Pervasive compurting and communications(2004) , 711-721.
    16. He, R. Niu, J.W, Yuan , “M : A novel CloudBased Trust model for pervasive computing .” In Proc. of the Fourth International Conference on Computer and Infromation Technology (2004) 693-700
    17. Pierre E. ABI-CHAR ‘A Dynamic Trust Based Context aware secure authentication framework for pervasive computing environment’, Ph.D. Dissertation , May 2010.

Recent Article