Trust Management for an Authentication System in Ubiquitous Computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
Trust Management for an Authentication System in Ubiquitous Computing

Authors: Malika Yaici, Anis Oussayah, Mohamed Ahmed Takerrabet

Abstract:

Security of context-aware ubiquitous systems is paramount, and authentication plays an important aspect in cloud computing and ubiquitous computing. Trust management has been identified as vital component for establishing and maintaining successful relational exchanges between trading partners in cloud and ubiquitous systems. Establishing trust is the way to build good relationship with both client and provider which positive activates will increase trust level, otherwise destroy trust immediately. We propose a new context-aware authentication system using a trust management system between client and server, and between servers, a trust which induces partnership, thus to a close cooperation between these servers. We defined the rules (algorithms), as well as the formulas to manage and calculate the trusting degrees depending on context, in order to uniquely authenticate a user, thus a single sign-on, and to provide him better services.

Keywords: Ubiquitous computing, context-awareness, authentication, trust management.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1317290

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 763

References:


[1] M. Weiser, ”Ubiquitous Computing ”, 1996, http://www.ubiq.com/ hypertext/weiser/ UbiHome.html, (06/12/2017).
[2] A. Mansour, M. Sadik, E. Sabir, and M. Azmiy, ”A Context-Aware Multimodal Biometric Authentication for Cloud-Empowered Systems,” in Proc. of International Conference on Wireless Networks and Mobile Communications (WINCOM), 26-29 Oct., Fez, Morocco, 2016.
[3] A. Chaturvedi, A. K. Das, D. Mishra, and S. Mukhopadhyay, ”Design of a secure smart card-based multi-server authentication scheme,” Journal of Information Security and Applications, Volume 30, Issue C, pp. 64-80, October 2016.
[4] D. Hintze, S. Scholz, E. Koch, and R. Mayrhofer, ”Location-based Risk Assessment for Mobile Authentication,” UBICOMP/ISWC-16 ADJUNCT, pp. 85-88, Heidelberg, Germany, September 12-16, 2016.
[5] U. S. Premarathnea, I. Khalil, and M. Atiquzzaman, ”Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications,” Computer Networks, Vol. 88, pp.161-177, 2015.
[6] B. Shivhare, G. Sharma, and S. P. S. Kushwah, ”A Study On Geo-Location Authentication Techniques,” 2014 Sixth International Conference on Computational Intelligence and Communication Networks, CICN 2014, Bhopal, India, pp. 744-748, 14-16 November 2014.
[7] M. A. Bouazzouni, E. Conchon, and F. Peyrard, ”Trusted mobile computing: An overview of existing solutions,” Future Generation Computer Systems, Volume 80, pp.596-612, March 2018.
[8] H. Xiao, J. Malcolm, B. Christianson, and Y. Zhang, ”Trustworthiness and Authentication in Ubiquitous Computing,” in Proceedings of MobiWac-12, Paphos, Cyprus, pp.135-138, October 21-22, 2012.
[9] G. Sarojini, A. Vijayakumar, and K. Selvamani, ”Trusted and Reputed Services using Enhanced Mutual Trusted and Reputed Access Control Algorithm in Cloud,” 2nd International Conference on Intelligent Computing, Communication and Convergence (ICCC-2016), Bhubaneswar, Odisha, India, Procedia Computer Science, Vol.92, pp.506-512, 2016.
[10] K. Selvamani and P. K. Arya, ”Credential Based Authentication Approach for Dynamic Group in Cloud Environment,” International Conference on Intelligent Computing, Communication and Convergence (ICCC-2014), Bhubaneswar, Odisha, India,Procedia Computer Science, Vol.48, pp.166-172, 2015.
[11] R. Shaikh and M. Sasikumar, ”Trust Model for Measuring Security Strength of Cloud Computing Service,” International Conference on Advanced Computing Technologies and Applications (ICACTA- 2015), Procedia Computer Science, Vol. 45, pp. 380-389, 2015.
[12] S. Arimura, M. Fujita, S. Kobayashi, J. Kani, M. Nishigaki, and A. Shiba, ”i/k-Contact: a context-aware user authentication using physical social trust,” Twelfth Annual Conference on Privacy, Security and Trust (PST), Toronto, Canada, pp. 407-413, 23-24 Jul 2014.
[13] Q. G. K. Safi, S. Luo, C. Wei, L. Pan, and G. Yan, ”Cloud-based security and privacy-aware information dissemination over ubiquitous VANETs,” Computer Standards and Interfaces, Vol. 56, pp. 107-115, February 2018.
[14] S. Jain and A. Ranjan, ”A Review Study on Vehicular Ad-Hoc Networks Trust and Authentication Mechanisms,” International Journal of Technical Research (IJTR) Vol. 5, Issue 1, pp. 101-106, 2016.
[15] V. Radhaa and D. Hitha Reddya, ”A Survey on Single Sign-On Techniques,” Procedia Technology, Vol.4, pp. 134-139, 2012.
[16] R. Saadi, The Chameleon: Un Syst`eme de S´ecurit17 pour Utilisateurs Nomades en Environnements Pervasifs et Collaboratifs. PhD thesis, Institut National des Sciences Appliqu´ees (INSA) de Lyon - France, 2009.
[17] L. Rasmussen, A. Rasmussen, and S. Janson, ”Reactive Security and Social Control,” 19th National Information Systems Security Conference, Baltimore - USA, 1996.
[18] Y. Wang and J. Vassileva, ”Trust and Reputation Model in Peer-to-Peer Networks,” in proceedings of Third International Conference on Peer-to-Peer Computing, (P2P 2003). Linkoping, Sweden 1-3 Sept. 2003.
[19] X. Wang, D. Feng, X. Lai, and H. Yu, ”Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD,” Shanghai Jiaotong University, Shanghai - Chine, 2004.
[20] J. Garman, Kerberos, The Definitive Guide. Edition O’Reilly, 2010.