To read this content please select one of the options below:

Authentication-based access control approach for enhancing security in pervasive computing environments

Gnaneshwari G.R. (Department of Computer Science and Engineering, Sri Venkateshwara College of Engineering, Bangalore, India)
M.S. Hema (Department of Information Technology, Anurag University, Hyderabad, India)
S.C. Lingareddy (Department of Computer Science and Engineering, Sri Venkateshwara College of Engineering, Bangalore, India)

International Journal of Pervasive Computing and Communications

ISSN: 1742-7371

Article publication date: 9 August 2021

Issue publication date: 28 February 2023

68

Abstract

Purpose

Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a major challenging task in the Pervasive computing environment. To solve the security issues and to increase the communication reliability, an authentication-based access control approach is developed in this research to ensure the level of security in the Pervasive computing environment.

Design/methodology/approach

This paper aims to propose authentication-based access control approach performs the authentication mechanism using the hashing, encryption, and decryption function. The proposed approach effectively achieves the conditional traceability of user credentials to enhance security. Moreover, the performance of the proposed authentication-based access control approach is estimated using the experimental analysis, and performance improvement is proved using the evaluation metrics. It inherent the tradeoff between authentication and access control in the Pervasive computing environment. Here, the service provider requires authorization and authentication for the provision of service, whereas the end-users require unlinkability and untraceability for data transactions.

Findings

The proposed authentication-based access control obtained 0.76, 22.836 GB, and 3.35 sec for detection rate, memory, and time by considering password attack, and 22.772GB and 4.51 sec for memory and time by considering without attack scenario.

Originality/value

The communication between the user and the service provider is progressed using the user public key in such a way that the private key of the user can be generated through the encryption function.

Keywords

Citation

G.R., G., Hema, M.S. and Lingareddy, S.C. (2023), "Authentication-based access control approach for enhancing security in pervasive computing environments", International Journal of Pervasive Computing and Communications, Vol. 19 No. 2, pp. 211-232. https://doi.org/10.1108/IJPCC-02-2021-0044

Publisher

:

Emerald Publishing Limited

Copyright © 2021, Emerald Publishing Limited

Related articles