Research Article | OPEN ACCESS
Privacy Enhanced Pervasive Computing Model with Dynamic Trust and Security
1Geetha Mariappan and 2Manjula Dhanabalachandran
1Department of CSE, Rajalakshmi Institute of Technology
2Department of CSE, CEG, Anna University, Chennai, Tamil Nadu, India
Research Journal of Applied Sciences, Engineering and Technology 2014 23:4872-4876
Received: November 13, 2013 | Accepted: December 04, 2013 | Published: June 20, 2014
Abstract
The objective of the research work is to propose a policy aware privacy enhancement model using dynamic trust and security management techniques. The different polices of the stakeholders incorporating device manufacturer, service provider, Mobile agents and mobile users are considered to achieve an enhanced privacy for on-demand request. The entities involving direct and indirect trust establishment with all forms of uncertainties like DDoS attacks are considered along with multiple layers of security management operations across varying trusted entities. The focus is to enhance the existing privacy through an efficient, preventive, detective, response mechanisms for those attacks, which will address the problem of DDoS before, during and after an actual attack. The session time and access time are controlled by the privileges and rights for disclosure of information in pervasive environment.
Keywords:
DDoS attack, flooding, reliability, routing,
References
-
Al-Karkhi, A., A. Al-Yasiri and N. Linge, 2012. Privacy, trust and identity in pervasive computing: A review of technical challenges and future research directions. Int. J. Distrib. Parallel Syst., 3: 197-218.
CrossRef -
Anup, B., S. Amber and S.T. Satyendra, 2012. DDoS attacks impact on network traffic and its detection approach. Int. J. Comput. Appl., 40(11): 36-40.
-
Dhakal, D. and K. Gautham, 2013. Performance comparison of AoDV and DSR Routing protocols in mobile ad-hoc networks: A survey. Int. J. Eng. Sci. Innov. Technol. (IJESIT), 2(3): 258-265.
-
Lu, R., X. Lin and X. Shen, 2012. SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE T. Parall. Distr., 24(3): 614-624.
CrossRef -
Ramli, R., N. Zakaria and P. Sumari, 2010. Privacy issues in pervasive healthcare monitoring system: A review. World Acad. Sci. Eng. Technol., 50: 741.
-
Sharma, P., N. Sharma and R. Singh, 2012. A secure Intrusion detection system against DDOS attack in wireless mobile Ad-hoc network. Int. J. Comput. Appl., 41(21).
CrossRef -
Singh, G. and A. Singh, 2012. Performance evaluation of Aodv and Dsr routing protocols for Vbr Traffic for 150 nodes in manets. Int. J. Comput. Eng. Res. (IJCER), 2(5): 1583-1587.
-
Thakare, A.N. and M.Y. Joshi, 2010. Performance analysis of AODV and DSR routing protocols in mobile Ad hoc networks. IJCA Special Issue MANETs, 4: 211-218.
-
Zargar, S.T., J. Joshi and D. Tipper, 2013. A survey of defense mechanisms against Distributed Denial of Service (DDoS) flooding attacks. IEEE Commun. Surv. Tutorials, 15(4): 2046-2069.
CrossRef
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|