Access Control through Trust Management in Ubiquitous Computing under Uncertain Environment
Keywords:
Fuzzy Logic, Access Control, Ubiquitous Computing, Trust, Credibility Mobility, Reliability, Transitivity.Abstract
This paper describe the trust calculation method in ubiquitous computing under uncertain environment where the access is granted on having successful interactions with other devices/agents. Many researchers including us proposed the trust models where the quality features like recommendations, history, authenticity, credibility, transitivity, mobility and reliability of requester agents have been considered. But if above quality features are vague in nature, the existing model does not seem to be suitable. With this inspiration we proposed fuzzy logic based model in which the uncertainty occurred due to vagueness in various parameters like credibility, transitivity and reliability can be captured so as to get the better results and compared the results with the results obtained in [11]. This trust calculation model can be incorporated in Ubiquitous Computing for better decision making with respect to the access control when uncertainties are involved in quality features.
Downloads
References
Weiser, M. (1999). The computer for the 21 century. ACM SIGMOBILE Mobile Computing and Communications Review, 3(3), 1999, pp. 3–11. https://doi.org/10.1145/329124.329126
Hua Wang, Yanchun Zhang, Jinli Cao, Access control management for ubiquitous computing, Future Generation Computer Systems 24, 2008, pp. 870–878. https://doi.org/10.1016/j.future.2007.07.011
J. Seigneur, C. Jensen, Trust enhanced ubiquitous payment without too much privacy loss, ACM Symposium on Applied Computing, ACM Press, New York, NY, USA, 2004, pp. 1593–1599. https://doi.org/10.1145/967900.968218
G. Sampemane, P. Naldurg, R. Campbell, Access control for active spaces, ACSAC ’02: Proceedings of the 18th Annual Computer Security Applications Conference, IEEE Computer Society, Washington, DC, USA, 2002, pp. 343-352. DOI:10.1109/CSAC.2002.1176306
P. Viswanathan, B. Gill, and R. H. Campbell. Security architecture in gaia. Technical Report, University of Illinois at Urbana-Champaign, May 2001. http://gaia.cs.illinois.edu/papers/llncs.pdf
J. Jai-muhtadi, R. Campbell, A. Kapadia, M. Mickunas, S. Yi, Routing through the mist: Privacy preserving communication in ubiquitous computing environments, Proceedings of the 22nd International Conference on Distributed Computing Systems, ICDCS’02, IEEE Computer Society, Washington, DC, USA, 2002, pp. 74-83. https://homes.luddy.indiana.edu/kapadia/papers/mist.pdf.
P. N. Mahalle, P. A. Thakre, N.R. Prasad, R. Prasad , A fuzzy approach to trust based access control in internet of things, 3rd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace and Electronic Systems, VITAE, 2013, pp. 2–6. https://doi.org/10.1109/VITAE.2013.6617083.
N. Mhetre, A. Deshpande, P. Mahalle, and P.Thakre, Experience Modelling For Ubiquitous Computing A Mathematical Approach, Turkish Journal of Computer and Mathematics Education, Vol.12, No.6 (2021), pp. 5476-5488. https://turcomat.org/index.php/turkbilmat/article/view/9735/7436
M Blaze, J Feigenbaum, J Lacy, Decentralized trust management, 17th IEEE Symposium on Security and Privacy, Oakland, (1996),pp. 164–173. .https://doi.org/10.1109/SECPRI.1996.502679.
[H Jameel, LX Hung, U Kalim, A Sajjad, S Lee, Yk Lee, A trust model for ubiquitous systems based on vectors of trust values, 7th IEEE International Symposium on Multimedia, Irvine, USA, (Dec 2005),pp. 674–679. https://doi.org/10.1109/ISM.2005.22
D. S. Shelar, P. G. Andhare, S. B. Gaikwad, P. A. Thakre, A Mathematical Model For Access Control Through Trust Management In Ubiquitous Computing, Stochastic Modeling & Applications, Vol. 26, No. 3 (2022), 1002-1009. https://doi.org/10.5281/zenodo.6572635.
C English, P Nixon, S Terzis, A McGettrick, H Lowe, Security models for trusting network appliances, 5th IEEE International Workshop on Networked Appliances, Liverpool, (Oct 2002),pp. 39–44. http://dx.doi.org/10.1109/IWNA.2002.1241334
R He, J Niu, M Yuan, J Hu, A novel cloud-based trust model for pervasive computing, 4th International Conference on Computer and Information Technology, China, (Sept 2004), pp. 693–700. http://dx.doi.org/10.1109/CIT.2004.1357276
V Cahill, E Gray, J. Seigneur, C Jensen, Y Chen, B Shand, N Dimmock, A Twigg, J Bacon, W Wagealla, S Terzis, P Nixon, G Serugendo, C Bryce, M Carbone, K Krukow, M Nielsen, Using trust for secure collaboration in uncertain environments, IEEE Pervasive Computing Mobile and Ubiquitous Computing. 2(2003), pp. 52–61. DOI: 10.1109/MPRV.2003.1228527
S. Prajapati, S.Changder, A. Sarkar, Trust Management Model for Cloud Computing Environment,Proceding of the International Conference on Computing. Communication and Advanced Network - ICCCAN,2013, pp.509-513.
https://doi.org/10.48550/arXiv.1304.5313
Malika Yaici, A. Oussayah, M.Ahmed.Takerrabet, Trust Management for an Authentication System in Ubiquitous Computing, International Journal of Electronics and Communication Engineering Vol:12, No:6, (2018) pp.469-478. DOI:10.1016/j.procs.2018.07.141
Jøsang Simon, Siman Pope, Semantic Constraints for Trust Transitivity, Conceptual Modelling, Second Asia-Pacific Conference on Conceptual Modelling(APCCM2005), Newcastle, NSW, Australia, 2005,pp.1-10. https://crpit.scem.westernsydney.edu.au/confpapers/CRPITV43Josang.pdf
Xiang Qiu, Li Zhang, Shouxin Wang and GuanqunbQian, A Trust Transitivity Model Based-on Dempster-Shafer Theory, Journal of Networks, Vol. 5, No. 9, 2010, pp.25-32. https://doi.org/10.4304/jnw.5.9.1025-1032
Jun Xu, Carol J. Fung, dblp Computer Science Bibliography. A Risk-defined Trust Transitivity Model for Group Decisions in Social Networks. IM 2019, pp. 415-420. https://dblp.org/rec/conf/im/XuF19.html
C. Castillo, M. Mendoza, and B. Poblete, Information credibility on twitter, In Proceedings of the 20th international conference on World wide web, ACM, 2011, pp. 675–684. https://doi.org/10.1145/1963405.1963500
G. Barbier and H. Liu, Information provenance in social media. Social Computing, Behavioral-Cultural Modeling and Prediction, 2011, pp. 276–283. https://doi.org/10.1007/978-3-642-19656-0_39
Jiaxi Sun, Research on the Credibility of Social Media Information Based on User Perception, Security and Communication Networks Volume 2021, pp.1-10. https://doi.org/10.1155/2021/5567610
Seungsoo Baek, Seungjoo Kim, Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment, The Scientific World Journal, vol.1, 2014, pp.1-8. DOI: 10.1155/2014/936319.
X. Qian, T. F. Lunt, A MAC policy framework for multilevel relational databases, IEEE Transactions on Knowledge and Data Engineering, vol. 8, no. 1, 1996, pp.3–15. .https://doi.org/10.1109/69.485625.
L. Snyder, Formal models of capability-based protection systems, IEEE Transactions on Computers, vol. 30, no. 3, 1981, pp. 172– 181. https://doi.org/10.1109/TC.1981.1675753
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based access control models", Computer, vol. 29, no. 2,1996, pp. 38–47. https://profsandhu.com/journals/computer/i94rbac(org).pdf
L. A. Zadeh, Fuzzy set, Information and control, 8(1965), pp. 338-353. https://doi.org/10.1016/S0019-9958(65)90241-X .
L.A. Zadeh, Outline of A New Approach to the Analysis of complex Systems and Decision Processes, 1973.pp.28-44. DOI: 10.1109/TSMC.1973.5408575
L. A. Zadeh, Fuzzy algorithms Information and control, Vol 12 (1968), pp.94-102.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 D. S. Shelar, P. B. Shinde, Santosh D. Jadhav, P. A. Thakre, N. S. Mujumdar
![Creative Commons License](http://i.creativecommons.org/l/by-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.