Personal Data Access Based on Trust Assessment in Mobile Social Networking
11
Citation
24
Reference
10
Related Paper
Citation Trend
Abstract:
Trustworthy personal data access control at a semi-trusted or distrusted Cloud Service Provider (CSP) is a practical issue although cloud computing has widely developed. Many existing solutions suffer from high computation and communication costs, and are impractical to deploy in reality due to usability issue. With the rapid growth and popularity of mobile social networking, trust relationships in different contexts can be assessed based on mobile social networking activities, behaviors and experiences. Obviously, such trust cues extracted from social networking are helpful in automatically managing personal data access at the cloud with sound usability. In this paper, we propose a scheme to secure personal data access at CSP according to trust assessed in mobile social networking. Security and performance evaluations show the efficiency and effectiveness of our scheme for practical adoption.Keywords:
Popularity
Mobile Cloud Computing
Peer-to-peer(P2P) has become popular as a new technology for the resources sharing and coordination.However,the P2P environments make the task of controlling access to network security more difficult,which cannot be done by traditional access control methods.In this paper,analyses the technique of access-control requirements in such environments and proposes a trust domain-based access control framework for P2P environment.The framework is different from traditional access-control framework,which can define P2P user's trust domain-based in reputation management and define the access-control strategy for trust domain.The proposed scheme is realistic and feasible in P2P application.
Cite
Citations (4)
Role-based access control (RBAC) has been generally accepted as one of the most promising access control policies, and it has become a hot research topic in information security area. However, traditional RBAC model is not completely fit for the access control in pervasive computing environment. In this paper, trust management technology is introduced on the basis of traditional access control model and the role-trust based access control model on interval-valued fuzzy sets theory (RTBAC) is proposed. It evaluates the trust degree of subjects according to interval-valued fuzzy theory and the access control policy is made by the trust level of the subjects who request to access. The subjects with higher trust degree and reliability are classified into higher trust level, and then the role-assign procedure assigns the trust level to a corresponding role. So it meets the requirements of pervasive computing environment better.
Cite
Citations (0)
Mobile Cloud Computing (MCC) is a combination of three main parts; they are mobile device, cloud computing and mobile internet. With the help of MCC, a mobile user gets a rich application delivered over the Internet. The capabilities of mobile devices have been improving quickly than computers. Many researchers focus on the area of mobile computing and cloud computing. Cloud computing is the trend in which resources are provided to a local client on an on-demand basis, usually by means of the internet. Mobile cloud computing (MCC) is simply cloud computing in which at least some of the devices involved are mobile. This paper goes over multiple techniques and methods for mobile cloud computing. It explores both general-purpose mobile cloud computing solutions and application-specific solutions. It also discusses instances of mobile cloud computing where mobile devices serve as the cloud rather than the client. Finally it discusses some issues raised by this technology such as privacy and data ownership.
Mobile Cloud Computing
Cite
Citations (1)
The number of smartphone users has increased from 3.6 billion in 2016 to 6.25 billion by 2021, which shows that mobile phone usage has increased dramatically over the past few years. This is due to the development of mobile computing applications like commerce, healthcare, e-learning, etc. The use of mobile devices has resulted in an exponential rise in the amount of data generated and as a result the amount of energy consumed has increased. This is where cloud computing plays a major role. Cloud computing has transformed traditional mobile computing. The new mobile cloud not only provides on-demand services but also data storage and increased energy efficiency. Through mobile computing based on cloud computing, mobile device functions can be virtualized, reducing power consumption. In this paper, the authors survey application and potential of mobile cloud computing and present the energy-efficient ways. Also, the paper discusses development opportunities of mobile cloud computing. The research also mentions some of the major challenges in current mobile computing technology.
Mobile Cloud Computing
Mobile phone
Cite
Citations (27)
Handheld computing is an emerging mobile computing paradigm that promotes using handheld wireless devices (or mobile devices) such as cellular phones and Personal Digital Assistants (PDAs) to accomplish various computing tasks. As handheld devices continue to appear in many forms with diverse functionalities, handheld computing will become the dominant computing paradigm in many fields including education, enterprises, and healthcare.
Cite
Citations (0)
Mobile Cloud Computing (MCC) is an infrastructure of data storage and data processing which happens outside of the mobile devices. Mobile cloud computing is the combinations of mobile web, cloud computing, mobile computing and wireless networks. Mobile cloud computing provides unrestricted functionalities, rich mobile computational resources, computational technology, platforms, heterogeneous environment, business opportunities for cloud computing providers, mobile users and network operators. The main aim of Mobile cloud computing is provides the rich mobile applications with rich user experience of mobile devices.
Mobile Cloud Computing
Cite
Citations (0)
Mobile cloud computing (MCC) enables numerous associated mobile users to access the abundant cloud computing resources. A fundamental issue in the mobile application platform is to make deployment decision for individual tasks, when there is major concern of battery life of the mobile device for the experience of mobile user. Offloading is an effective method for extending the life time of mobile devices by executing some components of applications remotely. (E.g. Processing applications on mobile cloud). The main aim of this paper is to explore different energy saving techniques for mobile cloud. Energy saving is becoming an important and hot research topic in mobile computing. Increasing number of mobile users and various application platforms bring a new attention to energy saving in mobile cloud computing and services.
Mobile Cloud Computing
Cite
Citations (8)
Reasonable authorization and access control is one of the urgent problems that cloud computing applications need to solve, especially in the context of dynamic establishment of trust relationship between entities to study the open access security environment. This paper proposes a generation method of cross-domain access control strategy from trust evaluation to trust management. Based on the trust generation method of cross-domain access control policy, a trust-based access control system of cloud computing is designed and implemented. The system is mainly divided into four functional modules: credit evaluation module, trust relationship data mining module, trust management strategy generation module and access strategy implementation module. The main process, design and implementation method of the corresponding method are expounded. The access control file is verified, and the expected access control results are obtained.
Discretionary access control
Cite
Citations (1)
Mobile cloud computing (MCC) is the availability of cloud computing services in a mobile environment. By providing optimal services for mobile users, MCC incorporates the elements of mobile networks and cloud computing. In mobile cloud computing, all the data and complicated computing modules can be processed in clouds, and mobile devices do not need a powerful configuration like CPU speed, memory capacity, etc. However, the mobile devices are facing up with many struggles in their resources (e.g., battery life, storage, and bandwidth) and communications (e.g., privacy, mobility, and security). These challenges have a significant effect on the improvement of service qualities. In this paper, a literature survey on the MCC and security issues in MCC has presented.
Mobile Cloud Computing
Cite
Citations (0)