Evolutionary trust scheme of certificate game in mobile cloud computing

被引:8
|
作者
Li, Dazhi [1 ,2 ]
Li, Minglu [1 ]
Liu, Jianhua [3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Shanghai Normal Univ, Coll Informat Mech & Elect Engn, Shanghai 200234, Peoples R China
[3] Jiaxing Univ, Coll Math Phys & Informat Engn, Jiaxing 314001, Peoples R China
基金
中国国家自然科学基金;
关键词
Mobile cloud computing; Trust; Certificate game; Access control; ACCESS-CONTROL MODEL; ANONYMOUS AUTHENTICATION; FRAMEWORK; MECHANISM; SYSTEM; SECURE;
D O I
10.1007/s00500-017-2486-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the prosperity of cloud computing, many mobile nodes choose to deliver their certificate by service AP nodes, where each service AP node as a broker is responsible for authenticating virtual resource access with mobile users who are likely to be malicious in the underlying service requests. However, this access control system requires mobile users' certificate information and may fail due to their privacy. In light of the growing privacy concerns, this paper proposes a certificate-aware framework for online access control system in mobile computing, where users are compensated for their privacy certificate and operation disclosure and are motivated to present more certificate information. In this framework, a broker pays a trust degree to users and virtual authentication coordinators for disclosing more certificate information. This paper models the interactions among virtual authentication coordinators, the authentication broker and mobile users as a three-stage game, where every player aims at maximizing its own utility, and the trust allocation is achieved by G value learning. Numerical results have shown that the proposed certificate-aware framework is effective, as it enables all players to maximize their utilities and improve the degree of the trust of mobile computing systems.
引用
收藏
页码:2245 / 2255
页数:11
相关论文
共 50 条
  • [21] Trust management on user behavioral patterns for a mobile cloud computing
    Mucheol Kim
    Sang Oh Park
    Cluster Computing, 2013, 16 : 725 - 731
  • [22] Trust management on user behavioral patterns for a mobile cloud computing
    Kim, Mucheol
    Park, Sang Oh
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 725 - 731
  • [23] Trust in Mobile Cloud Computing with LTE-based Deployment
    Hussain, Mohammed
    Al Mourad, Basel Mohamad
    2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 643 - 648
  • [24] Mobile internet mobile agent system dynamic trust model for cloud computing
    Jiang W.-J.
    Lv S.-J.
    Kongzhi yu Juece/Control and Decision, 2022, 37 (02): : 499 - 505
  • [25] Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing
    Jiang, Weijin
    Wang, Yang
    Jiang, Yirong
    Xu, Yuhui
    Chen, Jiahui
    Tan, Lina
    Liang, Guo
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 62 (01): : 123 - 136
  • [26] A Computing Offloading Game for Mobile Devices and Edge Cloud Servers
    Li, Meiwen
    Wu, Qingtao
    Zhu, Junlong
    Zheng, Ruijuan
    Zhang, Mingchuan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [27] Research on Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing
    Jiang, Weijin
    Wang, Yang
    Jiang, Yirong
    Chen, Jiahui
    Xu, Yuhui
    Tan, Lina
    CHINA COMMUNICATIONS, 2019, 16 (07) : 174 - 194
  • [28] A provable and secure mobile user authentication scheme for mobile cloud computing services
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ghani, Anwar
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)
  • [29] Research on Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing
    Weijin Jiang
    Yang Wang
    Yirong Jiang
    Jiahui Chen
    Yuhui Xu
    Lina Tan
    中国通信, 2019, 16 (07) : 174 - 194
  • [30] A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
    Li, Ruixuan
    Shen, Chenglin
    He, Heng
    Gu, Xiwu
    Xu, Zhiyong
    Xu, Cheng-Zhong
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) : 344 - 357