scholarly journals Distributed Secure Service Composition with Declassification in Mobile Clouds

2017 ◽  
Vol 2017 ◽  
pp. 1-13 ◽  
Author(s):  
Ning Xi ◽  
Di Lu ◽  
Cong Sun ◽  
Jianfeng Ma ◽  
Yulong Shen

The regional and dynamic characteristics of mobile clouds pose a great challenge on information flow security during service composition. Although secure verification approaches based on standard noninterference provide a solid assurance on information flow security of composite service, too strict constraints on service components may cause the failure of composition procedure. In order to ensure the availability of composite service, we specify the declassification policies based on cryptographic operations to allow data to be legally declassified. And we propose the improved distributed secure service composition framework and approach, which can realize different cloud platforms in multiple domains, cooperate with each other to complete the declassification, and secure composition procedure. Through the experiment and evaluation, it is indicated that our approach provides a more reliable and efficient way for secure service composition in mobile clouds.

Entropy ◽  
2019 ◽  
Vol 21 (8) ◽  
pp. 753
Author(s):  
Xi ◽  
Lv ◽  
Sun ◽  
Ma

The advances in mobile technologies enable mobile devices to cooperate with each other to perform complex tasks to satisfy users’ composite service requirements. However, data with different sensitivities and heterogeneous systems with diverse security policies pose a great challenge on information flow security during the service composition across multiple mobile devices. The qualitative information flow control mechanism based on non-interference provides a solid security assurance on the propagation of customer’s private data across multiple service participants. However, strict discipline limits the service availability and may cause a high failure rate on service composition. Therefore, we propose a distributed quantitative information flow evaluation approach for service composition across multiple devices in mobile environments. The quantitative approach provides us a more precise way to evaluate the leakage and supports the customized disciplines on information flow security for the diverse requirements of different customers. Considering the limited energy feature on mobile devices, we use a distributed evaluation approach to provide a better balance on consumption on each service participant. Through the experiments and evaluations, the results indicate that our approach can improve the availability of composite service effectively while the security can be ensured.


2018 ◽  
Vol 19 (5) ◽  
pp. 626-638 ◽  
Author(s):  
Huan-feng Peng ◽  
Zhi-qiu Huang ◽  
Lin-yuan Liu ◽  
Yong Li ◽  
Da-juan Fan ◽  
...  

2011 ◽  
Vol 39 (3) ◽  
pp. 189-200 ◽  
Author(s):  
Mohit Tiwari ◽  
Jason K. Oberg ◽  
Xun Li ◽  
Jonathan Valamehr ◽  
Timothy Levin ◽  
...  

2016 ◽  
Vol 24 (2) ◽  
pp. 181-234 ◽  
Author(s):  
Daniel Hedin ◽  
Luciano Bello ◽  
Andrei Sabelfeld

Author(s):  
Tobias Hamann ◽  
Mihai Herda ◽  
Heiko Mantel ◽  
Martin Mohr ◽  
David Schneider ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document