Monday 15 October 2012

Security in mobile computing

I present here a report on security in mobile computing after in depth analysis of several research papers.
A summary is presented as pdf for free download  here

In the given pdf consider the Trust based security , A detailed explanation is presented


"Jhon wants to access services such as printer but is not authorised so he request susan by sending request and credentials,susan sends a certificate and may impose constrains (say impose time restrictions on access to printer)on the request, this data will then be sent to security agent which will service request.
This can be used to secure smart spaces

Role is assigned to each user(software/individual),role is associated with security policies and authority
A hierarchical layer of security agents
Authorised user can delegate authority to other user by signed assertion,these signed assertions are validated by agents and the request is serviced
Delegation chain :If a entity delegate authority to a malicious module it can lose its delegation capability
"

Now for the concentric centric security

"The user application will have a corresponding mobile agent (MA)proxy ,The MA is software with data which can move from environment to other,thus it can save the session state and move between network,allowing the user to roam and seamlessly connect with different networks
Ubiquitous context based security middleware(Ubicosm) allows the user/service provider to specify the security capabilities and requirements as a metadata


Ubicosm will also appraise the resource availability and state in the new environment
And along with the metadata will provide a visible window comprising of only those resources which the MA can access,and which are validated. Also the metadata allows the MA to identify other MA’s of required security and other features and interact.
Changing security requirements are reflected as change in metadta with no change in codes

"

No comments:

Post a Comment