Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9i48/89396
Year: 2016, Volume: 9, Issue: 48, Pages: 1-13
Original Article
G. Jagadamba1 * and B. Sathish Babu2
1 Department of ISE, Siddaganga Institute of Technology, Tumakuru - 532103, Karnataka, India; [email protected]
2 Department of CSE, Siddaganga Institute of Technology, Tumakuru - 532103, Karnataka, India; [email protected]
Objectives: To present the principle of working of some of the widely used adaptive security schemes in the domain of ubiquitous computing. Methods/Statistical Analysis: The main focus of the study includes analysis of the security schemes with respect to the use of security parameters such as context and trust. Many security schemes applied for various applications are considered and evaluated by considering the security credentials such as access control, privacy, and context-awareness. The study finds context and trust as essential to develop adaptive and accurate security framework. Findings: The paper identified different taxonomies built for trust, context, policy and adaptive security. It pointed many solutions to couple with the security issues like access control, and authentication that are more appropriate to the today’s world. It also discussed many security and implementation credentials with a review summary and suggested the findings could be used to propose adaptive security frameworks which can offer the required level of security. Application/ Improvements: The proposed framework can be used to applications built in the Ubiquitous Computing Environment (UCE) such as Ubiquitous-healthcare, U-learning, U-smart campus, and so on.
Keywords: Access Control, Adaptive Security, Context, Privacy, Trust, Ubiquitous Computing Environment
Subscribe now for latest articles and news.