Access Control through Trust Management in Ubiquitous Computing under Uncertain Environment

Authors

  • D. S. Shelar, P. B. Shinde, Santosh D. Jadhav, P. A. Thakre, N. S. Mujumdar

Keywords:

Fuzzy Logic, Access Control, Ubiquitous Computing, Trust, Credibility Mobility, Reliability, Transitivity.

Abstract

This paper describe the trust calculation method in ubiquitous computing under uncertain environment where the access is granted on having successful interactions with other devices/agents. Many researchers including us proposed the trust models where the quality features like recommendations, history, authenticity, credibility, transitivity, mobility and reliability of requester agents have been considered. But if above quality features are vague in nature, the existing model does not seem to be suitable. With this inspiration we proposed fuzzy logic based model in which the uncertainty occurred due to vagueness in various parameters like credibility, transitivity and reliability can be captured so as to get the better results and compared the results with the results obtained in [11]. This trust calculation model can be incorporated in Ubiquitous Computing for better decision making with respect to the access control when uncertainties are involved in quality features.

Downloads

Download data is not yet available.

References

Weiser, M. (1999). The computer for the 21 century. ACM SIGMOBILE Mobile Computing and Communications Review, 3(3), 1999, pp. 3–11. https://doi.org/10.1145/329124.329126

Hua Wang, Yanchun Zhang, Jinli Cao, Access control management for ubiquitous computing, Future Generation Computer Systems 24, 2008, pp. 870–878. https://doi.org/10.1016/j.future.2007.07.011

J. Seigneur, C. Jensen, Trust enhanced ubiquitous payment without too much privacy loss, ACM Symposium on Applied Computing, ACM Press, New York, NY, USA, 2004, pp. 1593–1599. https://doi.org/10.1145/967900.968218

G. Sampemane, P. Naldurg, R. Campbell, Access control for active spaces, ACSAC ’02: Proceedings of the 18th Annual Computer Security Applications Conference, IEEE Computer Society, Washington, DC, USA, 2002, pp. 343-352. DOI:10.1109/CSAC.2002.1176306

P. Viswanathan, B. Gill, and R. H. Campbell. Security architecture in gaia. Technical Report, University of Illinois at Urbana-Champaign, May 2001. http://gaia.cs.illinois.edu/papers/llncs.pdf

J. Jai-muhtadi, R. Campbell, A. Kapadia, M. Mickunas, S. Yi, Routing through the mist: Privacy preserving communication in ubiquitous computing environments, Proceedings of the 22nd International Conference on Distributed Computing Systems, ICDCS’02, IEEE Computer Society, Washington, DC, USA, 2002, pp. 74-83. https://homes.luddy.indiana.edu/kapadia/papers/mist.pdf.

P. N. Mahalle, P. A. Thakre, N.R. Prasad, R. Prasad , A fuzzy approach to trust based access control in internet of things, 3rd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace and Electronic Systems, VITAE, 2013, pp. 2–6. https://doi.org/10.1109/VITAE.2013.6617083.

N. Mhetre, A. Deshpande, P. Mahalle, and P.Thakre, Experience Modelling For Ubiquitous Computing A Mathematical Approach, Turkish Journal of Computer and Mathematics Education, Vol.12, No.6 (2021), pp. 5476-5488. https://turcomat.org/index.php/turkbilmat/article/view/9735/7436

M Blaze, J Feigenbaum, J Lacy, Decentralized trust management, 17th IEEE Symposium on Security and Privacy, Oakland, (1996),pp. 164–173. .https://doi.org/10.1109/SECPRI.1996.502679.

[H Jameel, LX Hung, U Kalim, A Sajjad, S Lee, Yk Lee, A trust model for ubiquitous systems based on vectors of trust values, 7th IEEE International Symposium on Multimedia, Irvine, USA, (Dec 2005),pp. 674–679. https://doi.org/10.1109/ISM.2005.22

D. S. Shelar, P. G. Andhare, S. B. Gaikwad, P. A. Thakre, A Mathematical Model For Access Control Through Trust Management In Ubiquitous Computing, Stochastic Modeling & Applications, Vol. 26, No. 3 (2022), 1002-1009. https://doi.org/10.5281/zenodo.6572635.

C English, P Nixon, S Terzis, A McGettrick, H Lowe, Security models for trusting network appliances, 5th IEEE International Workshop on Networked Appliances, Liverpool, (Oct 2002),pp. 39–44. http://dx.doi.org/10.1109/IWNA.2002.1241334

R He, J Niu, M Yuan, J Hu, A novel cloud-based trust model for pervasive computing, 4th International Conference on Computer and Information Technology, China, (Sept 2004), pp. 693–700. http://dx.doi.org/10.1109/CIT.2004.1357276

V Cahill, E Gray, J. Seigneur, C Jensen, Y Chen, B Shand, N Dimmock, A Twigg, J Bacon, W Wagealla, S Terzis, P Nixon, G Serugendo, C Bryce, M Carbone, K Krukow, M Nielsen, Using trust for secure collaboration in uncertain environments, IEEE Pervasive Computing Mobile and Ubiquitous Computing. 2(2003), pp. 52–61. DOI: 10.1109/MPRV.2003.1228527

S. Prajapati, S.Changder, A. Sarkar, Trust Management Model for Cloud Computing Environment,Proceding of the International Conference on Computing. Communication and Advanced Network - ICCCAN,2013, pp.509-513.

https://doi.org/10.48550/arXiv.1304.5313

Malika Yaici, A. Oussayah, M.Ahmed.Takerrabet, Trust Management for an Authentication System in Ubiquitous Computing, International Journal of Electronics and Communication Engineering Vol:12, No:6, (2018) pp.469-478. DOI:10.1016/j.procs.2018.07.141

Jøsang Simon, Siman Pope, Semantic Constraints for Trust Transitivity, Conceptual Modelling, Second Asia-Pacific Conference on Conceptual Modelling(APCCM2005), Newcastle, NSW, Australia, 2005,pp.1-10. https://crpit.scem.westernsydney.edu.au/confpapers/CRPITV43Josang.pdf

Xiang Qiu, Li Zhang, Shouxin Wang and GuanqunbQian, A Trust Transitivity Model Based-on Dempster-Shafer Theory, Journal of Networks, Vol. 5, No. 9, 2010, pp.25-32. https://doi.org/10.4304/jnw.5.9.1025-1032

Jun Xu, Carol J. Fung, dblp Computer Science Bibliography. A Risk-defined Trust Transitivity Model for Group Decisions in Social Networks. IM 2019, pp. 415-420. https://dblp.org/rec/conf/im/XuF19.html

C. Castillo, M. Mendoza, and B. Poblete, Information credibility on twitter, In Proceedings of the 20th international conference on World wide web, ACM, 2011, pp. 675–684. https://doi.org/10.1145/1963405.1963500

G. Barbier and H. Liu, Information provenance in social media. Social Computing, Behavioral-Cultural Modeling and Prediction, 2011, pp. 276–283. https://doi.org/10.1007/978-3-642-19656-0_39

Jiaxi Sun, Research on the Credibility of Social Media Information Based on User Perception, Security and Communication Networks Volume 2021, pp.1-10. https://doi.org/10.1155/2021/5567610

Seungsoo Baek, Seungjoo Kim, Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment, The Scientific World Journal, vol.1, 2014, pp.1-8. DOI: 10.1155/2014/936319.

X. Qian, T. F. Lunt, A MAC policy framework for multilevel relational databases, IEEE Transactions on Knowledge and Data Engineering, vol. 8, no. 1, 1996, pp.3–15. .https://doi.org/10.1109/69.485625.

L. Snyder, Formal models of capability-based protection systems, IEEE Transactions on Computers, vol. 30, no. 3, 1981, pp. 172– 181. https://doi.org/10.1109/TC.1981.1675753

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based access control models", Computer, vol. 29, no. 2,1996, pp. 38–47. https://profsandhu.com/journals/computer/i94rbac(org).pdf

L. A. Zadeh, Fuzzy set, Information and control, 8(1965), pp. 338-353. https://doi.org/10.1016/S0019-9958(65)90241-X .

L.A. Zadeh, Outline of A New Approach to the Analysis of complex Systems and Decision Processes, 1973.pp.28-44. DOI: 10.1109/TSMC.1973.5408575

L. A. Zadeh, Fuzzy algorithms Information and control, Vol 12 (1968), pp.94-102.

https://doi.org/10.1016/S0019-9958(68)90211-8

Downloads

Published

26.03.2024

How to Cite

D. S. Shelar. (2024). Access Control through Trust Management in Ubiquitous Computing under Uncertain Environment. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 4552–4563. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6338

Issue

Section

Research Article