Author:
G.R. Gnaneshwari,Hema M.S.,Lingareddy S.C.
Abstract
Purpose
Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a major challenging task in the Pervasive computing environment. To solve the security issues and to increase the communication reliability, an authentication-based access control approach is developed in this research to ensure the level of security in the Pervasive computing environment.
Design/methodology/approach
This paper aims to propose authentication-based access control approach performs the authentication mechanism using the hashing, encryption, and decryption function. The proposed approach effectively achieves the conditional traceability of user credentials to enhance security. Moreover, the performance of the proposed authentication-based access control approach is estimated using the experimental analysis, and performance improvement is proved using the evaluation metrics. It inherent the tradeoff between authentication and access control in the Pervasive computing environment. Here, the service provider requires authorization and authentication for the provision of service, whereas the end-users require unlinkability and untraceability for data transactions.
Findings
The proposed authentication-based access control obtained 0.76, 22.836 GB, and 3.35 sec for detection rate, memory, and time by considering password attack, and 22.772GB and 4.51 sec for memory and time by considering without attack scenario.
Originality/value
The communication between the user and the service provider is progressed using the user public key in such a way that the private key of the user can be generated through the encryption function.
Subject
General Computer Science,Theoretical Computer Science
Reference35 articles.
1. Adult dataset (1996), available at: https://archive.ics.uci.edu/ml/datasets/Adult (accessed February 2020).
2. Security middleware approaches and issues for ubiquitous applications;Computers and Mathematics with Applications,2010
3. Privacy, trust and identity in pervasive computing: a review of technical challenges and future research directions;International Journal of Distributed and Parallel Systems (IJDPS),2012
4. Efficient authentication for mobile and pervasive computing;IEEE Transactions on Mobile Computing,2014
5. Context-aware access control and anonymous authentication in WBAN;Computers and Security,2020