Professional Documents
Culture Documents
Available at http://www.ijcsonline.com/
Department of Information Science and Engineering, Siddaganga Institute of Technology, Karnataka, India
Department of Computer Science and Engineering, Siddaganga Institute of Technology, Karnataka, India
Abstract
Networks are distributed, and nodes spontaneously move from one network to another to access service in the ubiquitous
computing environments. In these situations, adaptive security is systems require self adaptive nature by monitoring the
changes occurring in the operating environment and act accordingly at the runtime to overcome the security trade-offs.
The adaptive security is achieved through continuous monitoring, observations, analysis and working adaptive security
policies for the applications. This paper surveys adaptive security systems and evaluates critical security services (i.e.
authentication, and authorization,). Based on our evaluation results, we provide future research recommendation in the
ubiquitous computing environment.
Keywords: Policy, Trust, Taxonomy, Context, Adaptive Security, Ubiquitous Network
I.
INTRODUCTION
II.
MOTIVATION
102 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016
III.
Policy
Role based policy
(adaptive or predefined)
(adaptive or predefined)
(adaptive or predefined)
Hierarchy of role
(adaptive or predefined)
Context of role
(adaptive or predefined)
103 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016
contradictory,
context
awareness
enhances
the
effectiveness of the mechanisms by incorporating
contextual data into a decision-making process [23]. The
context can be behavioral, computing or physical. Context
is nothing but the information that defines the situation,
status, environment, device capability, QoS (Quality of
Service), availability and activity about an entity. Fig 2 and
Fig 3 shows the detailed taxonomy of the context and trust
respectively in the ubiquitous environment.
Location
Activity
Behavioural
context
Time
Situation
Surroundings
Device
Capacity
Context
Computing
context
Network
Capacity
Service
Bandwidth
Communication
Cost
Computation
Cost
Physical
context
Temperature
Light
Noise
Sensitivity level
104 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016
Level of security
service requirement
Physical context
Computing context
Behavioural/User
context
Trust based
security
Direct/Experience
trust
Recommendation/
Indirect trust
Reputation trust
Continues positive/negative
feedback
Predefined policy
Adaptive Policy
Contest-Role based
trust
105 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016
Trust Evalauation
Classification
Situation Analysis
Change in context
Security policy
New Request
IV.
FUTURE WORK
V.
CONCLUSION
REFERENCES
[1]
[2]
[3]
106 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
107 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016