Evolutionary trust scheme of certificate game in mobile cloud computing

被引:8
|
作者
Li, Dazhi [1 ,2 ]
Li, Minglu [1 ]
Liu, Jianhua [3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Shanghai Normal Univ, Coll Informat Mech & Elect Engn, Shanghai 200234, Peoples R China
[3] Jiaxing Univ, Coll Math Phys & Informat Engn, Jiaxing 314001, Peoples R China
基金
中国国家自然科学基金;
关键词
Mobile cloud computing; Trust; Certificate game; Access control; ACCESS-CONTROL MODEL; ANONYMOUS AUTHENTICATION; FRAMEWORK; MECHANISM; SYSTEM; SECURE;
D O I
10.1007/s00500-017-2486-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the prosperity of cloud computing, many mobile nodes choose to deliver their certificate by service AP nodes, where each service AP node as a broker is responsible for authenticating virtual resource access with mobile users who are likely to be malicious in the underlying service requests. However, this access control system requires mobile users' certificate information and may fail due to their privacy. In light of the growing privacy concerns, this paper proposes a certificate-aware framework for online access control system in mobile computing, where users are compensated for their privacy certificate and operation disclosure and are motivated to present more certificate information. In this framework, a broker pays a trust degree to users and virtual authentication coordinators for disclosing more certificate information. This paper models the interactions among virtual authentication coordinators, the authentication broker and mobile users as a three-stage game, where every player aims at maximizing its own utility, and the trust allocation is achieved by G value learning. Numerical results have shown that the proposed certificate-aware framework is effective, as it enables all players to maximize their utilities and improve the degree of the trust of mobile computing systems.
引用
收藏
页码:2245 / 2255
页数:11
相关论文
共 50 条
  • [31] A Context Sensitive Offloading Scheme for Mobile Cloud Computing Service
    Zhou, Bowen
    Dastjerdi, Amir Vahid
    Calheiros, Rodrigo N.
    Srirama, Satish Narayana
    Buyya, Rajkumar
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 869 - 876
  • [32] Effective DDoS security scheme for mobile cloud computing systems
    Ishak, Chaima
    Ben Saied, Yosra
    2024 13TH IFIP/IEEE INTERNATIONAL CONFERENCE ON PERFORMANCE EVALUATION AND MODELING IN WIRED AND WIRELESS NETWORKS, PEMWN 2024, 2024,
  • [33] A SECURE AUTHENTICATION SCHEME FOR MOBILE CLOUD COMPUTING AGAINST CCA
    Hossain, Md Jakir
    Xu, Chunxiang
    Li, Chuang
    2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 266 - 270
  • [34] Towards an Optimized Scheme for Mobile Subscribers Based on Cloud Computing
    Abdennadher, Fatma
    Ben Jemaa, Maher
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS, 2017, 112 : 751 - 760
  • [35] A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing
    Baharon, Mohd Rizuan
    Shi, Qi
    Llewellyn-Jones, David
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 618 - 625
  • [36] Offloading Decision Algorithm Using Evolutionary Game for Mobile Edge Computing
    Dong, Yifan
    Peng, Yunfeng
    Guo, Xiuping
    Chu, Feifan
    Zhang, Liang
    2019 2ND IEEE INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SIGNAL PROCESSING (ICICSP), 2019, : 210 - 214
  • [37] A Game Theory Based Resource Sharing Scheme in Cloud Computing Environment
    Lu, Zhenping
    Wen, Xiangming
    Sun, Yong
    PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 1097 - 1102
  • [38] Decentralized Data Offloading for Mobile Cloud Computing Based on Game Theory
    Liu, Dongqing
    Khoukhi, Lyes
    Hafid, Abdelhakim
    2017 SECOND INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2017, : 20 - 24
  • [39] A game-theoretic approach to computation offloading in mobile cloud computing
    Cardellini, Valeria
    Persone, Vittoria De Nitto
    Di Valerio, Valerio
    Facchinei, Francisco
    Grassi, Vincenzo
    Lo Presti, Francesco
    Piccialli, Veronica
    MATHEMATICAL PROGRAMMING, 2016, 157 (02) : 421 - 449
  • [40] Hierarchical Edge-Cloud Computing for Mobile Blockchain Mining Game
    Jiang, Suhan
    Li, Xinyi
    Wu, Jie
    2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, : 1327 - 1336