Robust access control framework for mobile cloud computing network

Computer Communications(2015)

引用 44|浏览88
暂无评分
摘要
We propose robust access control framework for a network which has allowed smart devices to be connected to the internal network in order to enable seamless data sharing.Smart device's sensor data such as location, app usage pattern, unlock failures are being considered for access control and data confidentialityThese sensor data and conventional static credentials are combined to develop a secure framework which verifies the users access privileges in run-timeThe algorithm supports both the access control and data confidentiality simultaneously.Algorithms are validated via simulation and the results show that the performance is comparable with existing schemes.Existing schemes are thoroughly surveyed and different between proposed and existing schemes are clearly highlighted. Unified communications has enabled seamless data sharing between multiple devices running on various platforms. Traditionally, organizations use local servers to store data and employees access the data using desktops with predefined security policies. In the era of unified communications, employees exploit the advantages of smart devices and 4G wireless technology to access the data from anywhere and anytime. Security protocols such as access control designed for traditional setup are not sufficient when integrating mobile devices with organization's internal network. Within this context, we exploit the features of smart devices to enhance the security of the traditional access control technique. Dynamic attributes in smart devices such as unlock failures, application usage, location and proximity of devices can be used to determine the risk level of an end-user. In this paper, we seamlessly incorporate the dynamic attributes to the conventional access control scheme. Inclusion of dynamic attributes provides an additional layer of security to the conventional access control. We demonstrate that the efficiency of the proposed algorithm is comparable to the efficiency of the conventional schemes.
更多
查看译文
关键词
Access control,Smart devices,Attributes,Encryption,Cloud computing
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要