Authentication-based access control approach for enhancing security in pervasive computing environments

R. GnaneshwariG., M. Hema, S. Lingareddy
{"title":"Authentication-based access control approach for enhancing security in pervasive computing environments","authors":"R. GnaneshwariG., M. Hema, S. Lingareddy","doi":"10.1108/ijpcc-02-2021-0044","DOIUrl":null,"url":null,"abstract":"\nPurpose\nPervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a major challenging task in the Pervasive computing environment. To solve the security issues and to increase the communication reliability, an authentication-based access control approach is developed in this research to ensure the level of security in the Pervasive computing environment.\n\n\nDesign/methodology/approach\nThis paper aims to propose authentication-based access control approach performs the authentication mechanism using the hashing, encryption, and decryption function. The proposed approach effectively achieves the conditional traceability of user credentials to enhance security. Moreover, the performance of the proposed authentication-based access control approach is estimated using the experimental analysis, and performance improvement is proved using the evaluation metrics. It inherent the tradeoff between authentication and access control in the Pervasive computing environment. Here, the service provider requires authorization and authentication for the provision of service, whereas the end-users require unlinkability and untraceability for data transactions.\n\n\nFindings\nThe proposed authentication-based access control obtained 0.76, 22.836 GB, and 3.35 sec for detection rate, memory, and time by considering password attack, and 22.772GB and 4.51 sec for memory and time by considering without attack scenario.\n\n\nOriginality/value\nThe communication between the user and the service provider is progressed using the user public key in such a way that the private key of the user can be generated through the encryption function.\n","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Pervasive Comput. Commun.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/ijpcc-02-2021-0044","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Purpose Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a major challenging task in the Pervasive computing environment. To solve the security issues and to increase the communication reliability, an authentication-based access control approach is developed in this research to ensure the level of security in the Pervasive computing environment. Design/methodology/approach This paper aims to propose authentication-based access control approach performs the authentication mechanism using the hashing, encryption, and decryption function. The proposed approach effectively achieves the conditional traceability of user credentials to enhance security. Moreover, the performance of the proposed authentication-based access control approach is estimated using the experimental analysis, and performance improvement is proved using the evaluation metrics. It inherent the tradeoff between authentication and access control in the Pervasive computing environment. Here, the service provider requires authorization and authentication for the provision of service, whereas the end-users require unlinkability and untraceability for data transactions. Findings The proposed authentication-based access control obtained 0.76, 22.836 GB, and 3.35 sec for detection rate, memory, and time by considering password attack, and 22.772GB and 4.51 sec for memory and time by considering without attack scenario. Originality/value The communication between the user and the service provider is progressed using the user public key in such a way that the private key of the user can be generated through the encryption function.
一种增强普适计算环境安全性的基于身份验证的访问控制方法
目的普适计算环境允许用户随时随地访问业务。由于普适计算环境的动态性、移动性、安全性、异构性和开放性已成为普适计算环境中的主要挑战。为了解决通信的安全问题,提高通信的可靠性,本研究提出了一种基于身份验证的访问控制方法,以保证普适计算环境下的安全水平。设计/方法/方法本文旨在提出一种基于身份验证的访问控制方法,该方法利用哈希、加密和解密功能来实现身份验证机制。该方法有效地实现了用户凭据的条件可追溯性,提高了安全性。此外,利用实验分析估计了基于身份验证的访问控制方法的性能,并利用评价指标证明了该方法的性能改进。在普适计算环境中,身份验证和访问控制之间的权衡是固有的。在这里,服务提供者需要对服务的提供进行授权和身份验证,而最终用户则需要数据事务的不可链接性和不可追溯性。结果考虑密码攻击时,基于身份验证的访问控制的检测率、内存和时间分别为0.76 GB、22.836 GB和3.35秒;考虑无攻击时,基于身份验证的访问控制的内存和时间分别为22.772GB和4.51秒。原创性/价值用户和服务提供者之间的通信使用用户公钥进行,通过加密功能可以生成用户的私钥。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信