Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 30526

Select areas to restrict search in scientific publication database:
Trust Management for an Authentication System in Ubiquitous Computing
Security of context-aware ubiquitous systems is paramount, and authentication plays an important aspect in cloud computing and ubiquitous computing. Trust management has been identified as vital component for establishing and maintaining successful relational exchanges between trading partners in cloud and ubiquitous systems. Establishing trust is the way to build good relationship with both client and provider which positive activates will increase trust level, otherwise destroy trust immediately. We propose a new context-aware authentication system using a trust management system between client and server, and between servers, a trust which induces partnership, thus to a close cooperation between these servers. We defined the rules (algorithms), as well as the formulas to manage and calculate the trusting degrees depending on context, in order to uniquely authenticate a user, thus a single sign-on, and to provide him better services.
Digital Object Identifier (DOI):


[1] M. Weiser, ”Ubiquitous Computing ”, 1996, hypertext/weiser/ UbiHome.html, (06/12/2017).
[2] A. Mansour, M. Sadik, E. Sabir, and M. Azmiy, ”A Context-Aware Multimodal Biometric Authentication for Cloud-Empowered Systems,” in Proc. of International Conference on Wireless Networks and Mobile Communications (WINCOM), 26-29 Oct., Fez, Morocco, 2016.
[3] A. Chaturvedi, A. K. Das, D. Mishra, and S. Mukhopadhyay, ”Design of a secure smart card-based multi-server authentication scheme,” Journal of Information Security and Applications, Volume 30, Issue C, pp. 64-80, October 2016.
[4] D. Hintze, S. Scholz, E. Koch, and R. Mayrhofer, ”Location-based Risk Assessment for Mobile Authentication,” UBICOMP/ISWC-16 ADJUNCT, pp. 85-88, Heidelberg, Germany, September 12-16, 2016.
[5] U. S. Premarathnea, I. Khalil, and M. Atiquzzaman, ”Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications,” Computer Networks, Vol. 88, pp.161-177, 2015.
[6] B. Shivhare, G. Sharma, and S. P. S. Kushwah, ”A Study On Geo-Location Authentication Techniques,” 2014 Sixth International Conference on Computational Intelligence and Communication Networks, CICN 2014, Bhopal, India, pp. 744-748, 14-16 November 2014.
[7] M. A. Bouazzouni, E. Conchon, and F. Peyrard, ”Trusted mobile computing: An overview of existing solutions,” Future Generation Computer Systems, Volume 80, pp.596-612, March 2018.
[8] H. Xiao, J. Malcolm, B. Christianson, and Y. Zhang, ”Trustworthiness and Authentication in Ubiquitous Computing,” in Proceedings of MobiWac-12, Paphos, Cyprus, pp.135-138, October 21-22, 2012.
[9] G. Sarojini, A. Vijayakumar, and K. Selvamani, ”Trusted and Reputed Services using Enhanced Mutual Trusted and Reputed Access Control Algorithm in Cloud,” 2nd International Conference on Intelligent Computing, Communication and Convergence (ICCC-2016), Bhubaneswar, Odisha, India, Procedia Computer Science, Vol.92, pp.506-512, 2016.
[10] K. Selvamani and P. K. Arya, ”Credential Based Authentication Approach for Dynamic Group in Cloud Environment,” International Conference on Intelligent Computing, Communication and Convergence (ICCC-2014), Bhubaneswar, Odisha, India,Procedia Computer Science, Vol.48, pp.166-172, 2015.
[11] R. Shaikh and M. Sasikumar, ”Trust Model for Measuring Security Strength of Cloud Computing Service,” International Conference on Advanced Computing Technologies and Applications (ICACTA- 2015), Procedia Computer Science, Vol. 45, pp. 380-389, 2015.
[12] S. Arimura, M. Fujita, S. Kobayashi, J. Kani, M. Nishigaki, and A. Shiba, ”i/k-Contact: a context-aware user authentication using physical social trust,” Twelfth Annual Conference on Privacy, Security and Trust (PST), Toronto, Canada, pp. 407-413, 23-24 Jul 2014.
[13] Q. G. K. Safi, S. Luo, C. Wei, L. Pan, and G. Yan, ”Cloud-based security and privacy-aware information dissemination over ubiquitous VANETs,” Computer Standards and Interfaces, Vol. 56, pp. 107-115, February 2018.
[14] S. Jain and A. Ranjan, ”A Review Study on Vehicular Ad-Hoc Networks Trust and Authentication Mechanisms,” International Journal of Technical Research (IJTR) Vol. 5, Issue 1, pp. 101-106, 2016.
[15] V. Radhaa and D. Hitha Reddya, ”A Survey on Single Sign-On Techniques,” Procedia Technology, Vol.4, pp. 134-139, 2012.
[16] R. Saadi, The Chameleon: Un Syst`eme de S´ecurit17 pour Utilisateurs Nomades en Environnements Pervasifs et Collaboratifs. PhD thesis, Institut National des Sciences Appliqu´ees (INSA) de Lyon - France, 2009.
[17] L. Rasmussen, A. Rasmussen, and S. Janson, ”Reactive Security and Social Control,” 19th National Information Systems Security Conference, Baltimore - USA, 1996.
[18] Y. Wang and J. Vassileva, ”Trust and Reputation Model in Peer-to-Peer Networks,” in proceedings of Third International Conference on Peer-to-Peer Computing, (P2P 2003). Linkoping, Sweden 1-3 Sept. 2003.
[19] X. Wang, D. Feng, X. Lai, and H. Yu, ”Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD,” Shanghai Jiaotong University, Shanghai - Chine, 2004.
[20] J. Garman, Kerberos, The Definitive Guide. Edition O’Reilly, 2010.
Vol:14 No:07 2020Vol:14 No:06 2020Vol:14 No:05 2020Vol:14 No:04 2020Vol:14 No:03 2020Vol:14 No:02 2020Vol:14 No:01 2020
Vol:13 No:12 2019Vol:13 No:11 2019Vol:13 No:10 2019Vol:13 No:09 2019Vol:13 No:08 2019Vol:13 No:07 2019Vol:13 No:06 2019Vol:13 No:05 2019Vol:13 No:04 2019Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007