Trust Management for an Authentication System in Ubiquitous Computing

Security of context-aware ubiquitous systems is
paramount, and authentication plays an important aspect in cloud
computing and ubiquitous computing. Trust management has been
identified as vital component for establishing and maintaining
successful relational exchanges between trading partners in cloud
and ubiquitous systems. Establishing trust is the way to build good
relationship with both client and provider which positive activates will
increase trust level, otherwise destroy trust immediately. We propose
a new context-aware authentication system using a trust management
system between client and server, and between servers, a trust which
induces partnership, thus to a close cooperation between these servers.
We defined the rules (algorithms), as well as the formulas to manage
and calculate the trusting degrees depending on context, in order to
uniquely authenticate a user, thus a single sign-on, and to provide
him better services.




References:
[1] M. Weiser, ”Ubiquitous Computing ”, 1996, http://www.ubiq.com/
hypertext/weiser/ UbiHome.html, (06/12/2017).
[2] A. Mansour, M. Sadik, E. Sabir, and M. Azmiy, ”A Context-Aware
Multimodal Biometric Authentication for Cloud-Empowered Systems,”
in Proc. of International Conference on Wireless Networks and Mobile
Communications (WINCOM), 26-29 Oct., Fez, Morocco, 2016.
[3] A. Chaturvedi, A. K. Das, D. Mishra, and S. Mukhopadhyay, ”Design of
a secure smart card-based multi-server authentication scheme,” Journal of
Information Security and Applications, Volume 30, Issue C, pp. 64-80,
October 2016.
[4] D. Hintze, S. Scholz, E. Koch, and R. Mayrhofer, ”Location-based
Risk Assessment for Mobile Authentication,” UBICOMP/ISWC-16
ADJUNCT, pp. 85-88, Heidelberg, Germany, September 12-16, 2016.
[5] U. S. Premarathnea, I. Khalil, and M. Atiquzzaman, ”Location-dependent
disclosure risk based decision support framework for persistent
authentication in pervasive computing applications,” Computer Networks,
Vol. 88, pp.161-177, 2015.
[6] B. Shivhare, G. Sharma, and S. P. S. Kushwah, ”A Study On
Geo-Location Authentication Techniques,” 2014 Sixth International
Conference on Computational Intelligence and Communication Networks,
CICN 2014, Bhopal, India, pp. 744-748, 14-16 November 2014.
[7] M. A. Bouazzouni, E. Conchon, and F. Peyrard, ”Trusted mobile
computing: An overview of existing solutions,” Future Generation
Computer Systems, Volume 80, pp.596-612, March 2018.
[8] H. Xiao, J. Malcolm, B. Christianson, and Y. Zhang, ”Trustworthiness
and Authentication in Ubiquitous Computing,” in Proceedings of
MobiWac-12, Paphos, Cyprus, pp.135-138, October 21-22, 2012.
[9] G. Sarojini, A. Vijayakumar, and K. Selvamani, ”Trusted and
Reputed Services using Enhanced Mutual Trusted and Reputed
Access Control Algorithm in Cloud,” 2nd International Conference on
Intelligent Computing, Communication and Convergence (ICCC-2016),
Bhubaneswar, Odisha, India, Procedia Computer Science, Vol.92,
pp.506-512, 2016.
[10] K. Selvamani and P. K. Arya, ”Credential Based Authentication
Approach for Dynamic Group in Cloud Environment,” International
Conference on Intelligent Computing, Communication and Convergence
(ICCC-2014), Bhubaneswar, Odisha, India,Procedia Computer Science,
Vol.48, pp.166-172, 2015.
[11] R. Shaikh and M. Sasikumar, ”Trust Model for Measuring Security
Strength of Cloud Computing Service,” International Conference on
Advanced Computing Technologies and Applications (ICACTA- 2015),
Procedia Computer Science, Vol. 45, pp. 380-389, 2015.
[12] S. Arimura, M. Fujita, S. Kobayashi, J. Kani, M. Nishigaki, and A.
Shiba, ”i/k-Contact: a context-aware user authentication using physical
social trust,” Twelfth Annual Conference on Privacy, Security and Trust
(PST), Toronto, Canada, pp. 407-413, 23-24 Jul 2014.
[13] Q. G. K. Safi, S. Luo, C. Wei, L. Pan, and G. Yan, ”Cloud-based security
and privacy-aware information dissemination over ubiquitous VANETs,”
Computer Standards and Interfaces, Vol. 56, pp. 107-115, February 2018.
[14] S. Jain and A. Ranjan, ”A Review Study on Vehicular Ad-Hoc Networks
Trust and Authentication Mechanisms,” International Journal of Technical
Research (IJTR) Vol. 5, Issue 1, pp. 101-106, 2016.
[15] V. Radhaa and D. Hitha Reddya, ”A Survey on Single Sign-On
Techniques,” Procedia Technology, Vol.4, pp. 134-139, 2012.
[16] R. Saadi, The Chameleon: Un Syst`eme de S´ecurit17 pour Utilisateurs
Nomades en Environnements Pervasifs et Collaboratifs. PhD thesis,
Institut National des Sciences Appliqu´ees (INSA) de Lyon - France, 2009.
[17] L. Rasmussen, A. Rasmussen, and S. Janson, ”Reactive Security and
Social Control,” 19th National Information Systems Security Conference,
Baltimore - USA, 1996.
[18] Y. Wang and J. Vassileva, ”Trust and Reputation Model in Peer-to-Peer
Networks,” in proceedings of Third International Conference on
Peer-to-Peer Computing, (P2P 2003). Linkoping, Sweden 1-3 Sept. 2003.
[19] X. Wang, D. Feng, X. Lai, and H. Yu, ”Collisions for Hash Functions
MD4, MD5, HAVAL-128 and RIPEMD,” Shanghai Jiaotong University,
Shanghai - Chine, 2004.
[20] J. Garman, Kerberos, The Definitive Guide. Edition O’Reilly, 2010.