Open Access Open Access  Restricted Access Subscription or Fee Access

Risk-Based Kerberised Service with JINI in Pervasive Environment

M. Kavitha, D. Prakash

Abstract


In pervasive computing environment, interactions are possible among different users and application anytime and anywhere. Pervasive is an open environment which requires strict control over resources. We may not want to offer all available services to every new user who enters the environment. To address the challenges posed in pervasive computing systems a resource discovery with risk is needed to resolve security and privacy issues. A risk evaluation becomes significant when a service request comes from an unknown user. Risk is calculated on the security level of the requested service. Token based approach is followed when the user uses the service. In this paper we discuss the emerging technology of kerberised service discovery with JINI.

Keywords


JINI, Kerberos, Pervasive Computing, Risk, Trust

Full Text:

PDF

References


Ping Zhang; Jianping Fan; Weimin Zheng “Privacy Protection in Ubiquitous Computing ” published by Pervasive Computing Signal Processing and Applications (PCSPA), 2010 First International Conference . pp: 391 – 393 November 2010.

Anthony D.Joseph, UC Berkeley“Security and Privacy in Pervasive Computing” Published by the IEEE Computer Society. pp: 73-75 December 2007

Herzberg, Y. Mass, and J. Michaeli, “Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers,” in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, May 2000

Baomin Xu1, Qiang Gao2 , Xiaoping Yang1 “Extensions to Jini Service Architecture for Pervasive Computing ” 2006 1st International Symposium on Pervasive Computing and Applications, pp. 90-94

Feng Zhu , wei zhu, matt W.Mutka “Private and Secure Service Discovery via Progressive and Probabilistic Exposure” IEEE Transactions on Parallel and Distributed systems, Vol 18. No. 11 Nov 2007. pp. 1565-1577.

Kui Ren, Wenjing Lou, Kwangjo Kim”Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments”, IEEE Transactions on Vehicular technology, Vol.. 55, No. 4, july 2006, pp:1373-1384

Roberto Speicys Cardoso Val´erie Issarny ,“Architecting Pervasive Computing Systems for Privacy: A Survey” in Proceedings of the Working IEEE/IFIP Conference on Software Architecture (WICSA'07). pp: 44-48

Sheikh I. Ahamed, Moushumi Sharmin, and Shameem Ahmed “A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing”, 6th Annual IEEE International conference on pervasive computing and communication. 2008. pp. 590-595.

Swaroop kalasapur “Dynamic Service composition in pervasive Computing”, IEEE transaction on parallel and distributed systems, Vol 18,No.7 july 2007. pp. 907-918.

Tao Sun Mieso.K.Denko,“A Distributed Trust Management Scheme in the Pervasive Computing Environment”, Electrical and Computer Engineering, 2007. CCECE 2007. Canadian Conference on April 2007. pp. 1219-1222.

Tao Sun, Mieso K. Denko “Performance Evaluation of Trust Management in Pervasive Computing” in 22nd International Conference on Advanced Information Networking and Applications. pp: 386-394

T. W. van der Horst et al., “Mobile Trust Negotiation: Authentication and Authorization in Dynamic, Mobile Networks,” in Proceedings of the 8th IFIP Conference on Communications and Multimedia Security, Lake Windermere, England, September 2004.

W. H. Winsborough, K. E. Seamons, and V. E. Jones, “Automated Trust Negotiation,” in Proceedings of the DARPA Information Survivability Conference and Exposition, Hilton Head, South Carolina, January 2000.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.