Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Privacy Enhanced Pervasive Computing Model with Dynamic Trust and Security

1Geetha Mariappan and 2Manjula Dhanabalachandran
1Department of CSE, Rajalakshmi Institute of Technology
2Department of CSE, CEG, Anna University, Chennai, Tamil Nadu, India
Research Journal of Applied Sciences, Engineering and Technology  2014  23:4872-4876
http://dx.doi.org/10.19026/rjaset.7.877  |  © The Author(s) 2014
Received: November 13, 2013  |  Accepted: December 04, 2013  |  Published: June 20, 2014

Abstract

The objective of the research work is to propose a policy aware privacy enhancement model using dynamic trust and security management techniques. The different polices of the stakeholders incorporating device manufacturer, service provider, Mobile agents and mobile users are considered to achieve an enhanced privacy for on-demand request. The entities involving direct and indirect trust establishment with all forms of uncertainties like DDoS attacks are considered along with multiple layers of security management operations across varying trusted entities. The focus is to enhance the existing privacy through an efficient, preventive, detective, response mechanisms for those attacks, which will address the problem of DDoS before, during and after an actual attack. The session time and access time are controlled by the privileges and rights for disclosure of information in pervasive environment.

Keywords:

DDoS attack, flooding, reliability, routing,


References

  1. Al-Karkhi, A., A. Al-Yasiri and N. Linge, 2012. Privacy, trust and identity in pervasive computing: A review of technical challenges and future research directions. Int. J. Distrib. Parallel Syst., 3: 197-218.
    CrossRef    
  2. Anup, B., S. Amber and S.T. Satyendra, 2012. DDoS attacks impact on network traffic and its detection approach. Int. J. Comput. Appl., 40(11): 36-40.
  3. Dhakal, D. and K. Gautham, 2013. Performance comparison of AoDV and DSR Routing protocols in mobile ad-hoc networks: A survey. Int. J. Eng. Sci. Innov. Technol. (IJESIT), 2(3): 258-265.
  4. Lu, R., X. Lin and X. Shen, 2012. SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE T. Parall. Distr., 24(3): 614-624.
    CrossRef    
  5. Ramli, R., N. Zakaria and P. Sumari, 2010. Privacy issues in pervasive healthcare monitoring system: A review. World Acad. Sci. Eng. Technol., 50: 741.
  6. Sharma, P., N. Sharma and R. Singh, 2012. A secure Intrusion detection system against DDOS attack in wireless mobile Ad-hoc network. Int. J. Comput. Appl., 41(21).
    CrossRef    
  7. Singh, G. and A. Singh, 2012. Performance evaluation of Aodv and Dsr routing protocols for Vbr Traffic for 150 nodes in manets. Int. J. Comput. Eng. Res. (IJCER), 2(5): 1583-1587.
  8. Thakare, A.N. and M.Y. Joshi, 2010. Performance analysis of AODV and DSR routing protocols in mobile Ad hoc networks. IJCA Special Issue MANETs, 4: 211-218.
  9. Zargar, S.T., J. Joshi and D. Tipper, 2013. A survey of defense mechanisms against Distributed Denial of Service (DDoS) flooding attacks. IEEE Commun. Surv. Tutorials, 15(4): 2046-2069.
    CrossRef    

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved