A trustworthy access control model for mobile cloud computing based on reputation and mechanism design

نویسندگان

  • Hui Lin
  • Li Xu
  • Xinyi Huang
  • Wei Wu
  • Yijie Huang
چکیده

Mobile cloud computing (MCC) is an emerging technology that has gained ever-increasing popularity, which makes the generation and large-scale collection of private personal data possible. However, new security issues arise when MCC offers big data analytics and management services. In particular, there is an absence of fine-grained secure access control model to protect privacy information from unauthorized access, especially launched by internal malicious nodes with legal identity and authority. To fill the gap, this paper proposes a reputation and mechanism design based trustworthy access control model (RMTAC) to provide secure and privacy-aware big data access control in MCC. The RMTAC integrates the access control scheme with Vickrey–Clark–Groves (VCG) based adaptive reputation mechanism (VARM), the distributedmulti-level security scheme and the hierarchical keymanagement protocol to provide secure and privacy-aware access control and defend against the internal attacks. Simulation results demonstrate the superior performance of the VARM in terms of utility, effective recommendation rate, and accuracy rate compared to the existing reputation mechanisms. Moreover, the RMTAC shows better performance in terms of success rate of malicious access and successful acceptance rate compared to the role-based encryption access control model (RBE) mechanism, in the presence of collusion attacks, bad mouthing attacks and information disclosure attacks. © 2015 Elsevier B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Reduction of Energy Consumption in Mobile Cloud Computing by ‎Classification of Demands and Executing in Different Data Centers

 In recent years, mobile networks have faced with the increase of traffic demand. By emerging mobile applications and cloud computing, Mobile Cloud Computing (MCC) has been introduced. In this research, we focus on the 4th and 5th generation of mobile networks. Data Centers (DCs) are connected to each other by high-speed links in order to minimize delay and energy consumption. By considering a ...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

A Model based on Cloud Computing for the implementation and management IT services in Banks

In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...

متن کامل

A Model based on Cloud Computing for the implementation and management IT services in Banks

In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Ad Hoc Networks

دوره 35  شماره 

صفحات  -

تاریخ انتشار 2015