Open Access Open Access  Restricted Access Subscription Access

Adaptive Security Schemes based on Context and Trust for Ubiquitous Computing Environment: A Comprehensive Survey


Affiliations
1 Department of ISE, Siddaganga Institute of Technology, Tumakuru - 532103, Karnataka, India
2 Department of CSE, Siddaganga Institute of Technology, Tumakuru - 532103, Karnataka
 

Objectives: To present the principle of working of some of the widely used adaptive security schemes in the domain of ubiquitous computing. Methods/Statistical Analysis: The main focus of the study includes analysis of the security schemes with respect to the use of security parameters such as context and trust. Many security schemes applied for various applications are considered and evaluated by considering the security credentials such as access control, privacy, and context-awareness. The study finds context and trust as essential to develop adaptive and accurate security framework. Findings: The paper identified different taxonomies built for trust, context, policy and adaptive security. It pointed many solutions to couple with the security issues like access control, and authentication that are more appropriate to the today’s world. It also discussed many security and implementation credentials with a review summary and suggested the findings could be used to propose adaptive security frameworks which can offer the required level of security. Application/Improvements: The proposed framework can be used to applications built in the Ubiquitous Computing Environment (UCE) such as Ubiquitous-healthcare, U-learning, U-smart campus, and so on.

Keywords

Access Control, Adaptive Security, Context, Privacy, Trust, Ubiquitous Computing Environment
User

Abstract Views: 148

PDF Views: 0




  • Adaptive Security Schemes based on Context and Trust for Ubiquitous Computing Environment: A Comprehensive Survey

Abstract Views: 148  |  PDF Views: 0

Authors

G. Jagadamba
Department of ISE, Siddaganga Institute of Technology, Tumakuru - 532103, Karnataka, India
B. Sathish Babu
Department of CSE, Siddaganga Institute of Technology, Tumakuru - 532103, Karnataka

Abstract


Objectives: To present the principle of working of some of the widely used adaptive security schemes in the domain of ubiquitous computing. Methods/Statistical Analysis: The main focus of the study includes analysis of the security schemes with respect to the use of security parameters such as context and trust. Many security schemes applied for various applications are considered and evaluated by considering the security credentials such as access control, privacy, and context-awareness. The study finds context and trust as essential to develop adaptive and accurate security framework. Findings: The paper identified different taxonomies built for trust, context, policy and adaptive security. It pointed many solutions to couple with the security issues like access control, and authentication that are more appropriate to the today’s world. It also discussed many security and implementation credentials with a review summary and suggested the findings could be used to propose adaptive security frameworks which can offer the required level of security. Application/Improvements: The proposed framework can be used to applications built in the Ubiquitous Computing Environment (UCE) such as Ubiquitous-healthcare, U-learning, U-smart campus, and so on.

Keywords


Access Control, Adaptive Security, Context, Privacy, Trust, Ubiquitous Computing Environment



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i48%2F136210