A trustworthy access control model for mobile cloud computing based on reputation and mechanism design

Mobile cloud computing (MCC) is an emerging technology that has gained ever-increasing popularity, which makes the generation and large-scale collection of private personal data possible. However, new security issues arise when MCC offers big data analytics and management services. In particular, there is an absence of fine-grained secure access control model to protect privacy information from unauthorized access, especially launched by internal malicious nodes with legalidentity and authority. To fill the gap, this paper proposes a reputation and mechanism design based trustworthy access control model (RMTAC) to provide secure and privacy-aware big data access control in MCC. The RMTAC integrates the access control scheme with VickreyClarkGroves (VCG) based adaptive reputation mechanism (VARM), the distributed multi-level security scheme and the hierarchical key management protocol to provide secure and privacy-aware access control and defend against the internal attacks. Simulation results demonstrate the superior performance of the VARM in terms of utility, effective recommendation rate, and accuracy rate compared to the existing reputation mechanisms. Moreover, the RMTAC shows better performance in terms of success rate of malicious access and successful acceptance rate compared to the role-based encryption access control model (RBE) mechanism, in the presence of collusion attacks, bad mouthing attacks and information disclosure attacks.

[1]  Fatos Xhafa,et al.  An efficient PHR service system supporting fuzzy keyword search and fine-grained access control , 2013, Soft Computing.

[2]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[3]  ParkSang Oh,et al.  Trust management on user behavioral patterns for a mobile cloud computing , 2013 .

[4]  Hu,et al.  SLCRM: Subjective Logic-Based Cross-Layer Reputation Mechanism for Wireless Mesh Networks , 2012 .

[5]  Robert H. Deng,et al.  Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks , 2013, IEEE Transactions on Multimedia.

[6]  Raouf Boutaba,et al.  Routing protocols in wireless mesh networks: challenges and design considerations , 2006, Multimedia Tools and Applications.

[7]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[8]  Hui Lin,et al.  PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks , 2012, EURASIP J. Wirel. Commun. Netw..

[9]  Min Chen,et al.  Security protection between users and the mobile media cloud , 2014, IEEE Communications Magazine.

[10]  Vipin Kumar,et al.  Trends in big data analytics , 2014, J. Parallel Distributed Comput..

[11]  Zhibin Zhou,et al.  Secure data processing framework for mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[12]  Mucheol Kim,et al.  Trust management on user behavioral patterns for a mobile cloud computing , 2013, Cluster Computing.

[13]  Antonio Capone,et al.  EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants , 2011, 2011 Proceedings IEEE INFOCOM.

[14]  Prabir Bhattacharya,et al.  This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING 1 Mechanism Design-Based Secure Leader Elec , 2022 .

[15]  Junho Choi,et al.  Ontology-based access control model for security policy reasoning in cloud computing , 2013, The Journal of Supercomputing.

[16]  Jinjun Chen,et al.  Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates , 2014, IEEE Transactions on Parallel and Distributed Systems.

[17]  Junbeom Hur,et al.  Improving Security and Efficiency in Attribute-Based Data Sharing , 2013, IEEE Transactions on Knowledge and Data Engineering.

[18]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .

[19]  Vijay Varadharajan,et al.  Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.

[20]  Li Xu,et al.  A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks , 2013, Wireless Personal Communications.

[21]  Li Xu,et al.  A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing , 2015, Future Gener. Comput. Syst..

[22]  Ahmed Hammam,et al.  A trust management system for ad-hoc mobile clouds , 2013, 2013 8th International Conference on Computer Engineering & Systems (ICCES).

[23]  Weijia Jia,et al.  A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing , 2013, CSS.

[24]  Mihaela van der Schaar,et al.  Incentive Provision and Job Allocation in Social Cloud Systems , 2013, IEEE Journal on Selected Areas in Communications.

[25]  Vasil Hnatyshin,et al.  The Practical OPNET User Guide for Computer Network Simulation , 2012 .

[26]  Wei Zhou,et al.  A strategy-proof trust mechanism for pervasive computing environments , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[27]  Haiying Shen,et al.  An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[28]  Vijay Varadharajan,et al.  Secure administration of cryptographic role-based access control for large-scale cloud storage systems , 2014, J. Comput. Syst. Sci..

[29]  Zhu Han,et al.  Truthful Mechanisms for Secure Communication in Wireless Cooperative System , 2013, IEEE Transactions on Wireless Communications.

[30]  Yong Zhang,et al.  A novel reputation computation model based on subjective logic for mobile ad hoc networks , 2011, Future Gener. Comput. Syst..

[31]  Raymond K. Wong,et al.  Decentralized Trust Driven Access Control for Mobile Content Sharing , 2013, 2013 IEEE International Congress on Big Data.