Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment

Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment

G. Jagadamba (Department of Information Science and Engineering, Siddaganga Institute of Technology, Tumakuru, India) and B Sathish Babu (Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumakuru, India)
DOI: 10.4018/IJSSOE.2016100101
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

The smart spaces built on the ubiquitous network make the services available for every entity in a seamless way using the most suitable resource provider. However, all services are not equally sensitive; hence do not require the same levels of security. In this paper, the authors propose an adaptive security scheme which handles service requests originating from heterogeneous contexts and belonging to different trust levels. The adaptive security scheme includes user classification, situational analysis and dynamic generation of appropriate security policies. The proposed security scheme can be made use to secure application built on the Ubiquitous Computing Environment (UCE) such as health care, smart office, smart ubiquitous home, etc.
Article Preview

2. Literature Review

A service access based on the user behavior (Yarmand, Sartipi & Down, 2013) provided the concept of analyzing the user characteristics while designing an adaptive security policy. Our earlier work (Jagadamba and Sathish Babu, 2016a; Jagadamba & Sathish Babu, 2013) was able to examine the user request through the contextual information before fulfilling the request. The work was more of role and context based service access but did not consider the verification of the truthfulness of the user’s request. However, the basic service access model lacks provisions for context, trust and privacy issues when operated in the distributed environments. An effort to integrate trust and privacy was done in an extended Attribute-Based Access Control model for critical situations for registered and non-registered users (Sun, Lili, Yong et al., 2014). The model facilities the development of an access policy through the set of access control rules by combining subjects and objects through context and trust parameters. The concept of relating the subject and object to trust is a good idea to design security policies while accessing the services in smart spaces like health care monitoring environment, smart offices, smart campus and so on.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 7: 4 Issues (2017): 3 Released, 1 Forthcoming
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing