• DocumentCode
    653258
  • Title

    Trust and Risk-Based Access Control Model for Zero-Knowledge Oriented Mobile Peer-to-Peer Environments

  • Author

    Zhi-yan Li ; Jun-lei Bi ; Lu Liu

  • Author_Institution
    Dept. of Internet of Things, Jiangsu Univ., Zhenjiang, China
  • fYear
    2013
  • fDate
    20-23 Aug. 2013
  • Firstpage
    860
  • Lastpage
    865
  • Abstract
    In this paper, we propose a Trust and Risk-based Access Control Model (TRACM) for achieving trustworthy resource sharing over mobile P2P networks. With TRACM, many malicious peers are automatically separated from the trusted mobile P2P resource sharing network which consists of benign peers. The main contribution of this model is that the request peers give first priority to connecting the secure resource peers and the resource peers also give first priority to authorizing the trusted request peers. A major difference between TRACM and many existing access control models for P2P networks is that TRACM uses Bayesian Game theory to design an available and survivable access control model for zero-trust knowledge mobile P2P scenarios, and therefore is able to adapt to dynamic mobile P2P environments. Our work appears to be the first attempt to research the access control model under the zero-trust knowledge mobile environment. The simulation results show that our model can greatly improve the download success rate. Furthermore, the experimental results demonstrate that TRACM has lower control overhead than other access control models.
  • Keywords
    authorisation; cryptography; mobile computing; peer-to-peer computing; trusted computing; Bayesian game theory; TRACM; benign peers; dynamic mobile P2P environments; malicious peers; mobile P2P networks; trust and risk-based access control model; trusted mobile P2P resource sharing network; zero-knowledge oriented mobile peer-to-peer environments; zero-trust knowledge mobile P2P scenarios; Authorization; Bayes methods; Games; Mobile communication; Mobile computing; Peer-to-peer computing; Bayesian Game; access control; mobile peer to peer networks; survivability; zero-trust knowledge;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing
  • Conference_Location
    Beijing
  • Type

    conf

  • DOI
    10.1109/GreenCom-iThings-CPSCom.2013.151
  • Filename
    6682165