Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Li, F.; Rahulamathavan, Y.; Rajarajan, M. (2014)
Languages: English
Types: Unknown
Subjects: QA75, T1
Technology advancements in smart mobile devices empower mobile users by enhancing mobility, customizability and adaptability of computing environments. Mobile devices are now intelligent enough to capture dynamic attributes such as unlock failures, application usage, location and proximity of devices in and around its surrounding environment. Different users will have different set of values for these dynamic attributes. In traditional attribute based access control, users are authenticated to access restricted data using long term static attributes such as password, roles, and physical location. In this paper, in order to allow secure data access in mobile environment, we securely combine both the dynamic and static attributes and develop novel access control technique. Security and performance analyse show that the proposed scheme substantially reduces the computational complexity while enhances the security compare to the conventional schemes.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Cisco Study: IT Saying Yes to BYOD, Cisco, http://newsroom.cisco.com/release/854754/Cisco-Study-IT-SayingYes-To-BYOD, May 2012.
    • [2] G. Thomson. BYOD: Enabling the Chaos, Network Security, vol. 2012, no. 2, pp. 5-8, Feb. 2012.
    • [3] R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based Access Control Models. Computer, vol. 29, no. 2, pp. 38-47, 1996.
    • [4] K. Church, and B. Smyth. Understanding the Intent Behind Mobile Information Needs. In Proc. 14th Int'l Conf. Intelligent User Interfaces. ACM, 2009: 247-256.
    • [5] M. Green, S. Hohenberger, and B. Waters. Outsourcing the Decryption of ABE Ciphertexts. USENIX Security Symposium. Aug. 2011.
    • [6] A. Sahai, and B. Waters. Fuzzy Identity-Based Encryption. Advances in Cryptology EUROCRYPT, vol. 3494, 2005.
    • [7] V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data. In Proc. 13th ACM Conf. Comp. Commun. Security, New York, USA, pp. 89-98, 2006.
    • [8] J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy AttributeBased Encryption. In IEEE Symp. Security and Privacy, SP 07. pp. 321- 334, May 2007.
    • [9] K. Zaidi, Y. Rahulamathavan, and M. Rajarajan. DIVA - Digital identity in VANETs: A Multi-authority Framework for VANETs. In Proc. 19th IEEE Int'l Conf. Netw. (ICON'13), Singapore, Dec. 2013.
    • [10] R. Lu, X. Liang, X. Li, X. Lin, Xuemin Shen, EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications. In IEEE Trans. Parallel and Distributed Systems, vol.23, no.9, pp.1621-1631, Sep. 2012.
    • [11] F. Li, Y. Rahulamathavan, M. Rajarajan, R. C.-W Phan. Low Complexity Multi-authority Attribute Based Encryption Scheme for Mobile Cloud Computing. In Proc. IEEE 7th Int'l Symp. Service Oriented System Engineering (SOSE), San Francisco, USA, pp. 573-577, Mar. 2013.
    • [12] F. Li, N. Clarke, M. Papadaki, and P. Dowland. Misuse Detection for Mobile Devices Using Behaviour Profiling. In Int'l Journal of Cyber Warfare and Terrorism, vol. 1, no. 1, pp. 41-53, Jan.-Mar. 2011.
    • [13] M. Miettinen, P. Halonen, and K. Hatonen. Host-based Intrusion Detection for Advanced Mobile Devices. In Proc. 20th Int'l Conf. Advanced Information Networking and Applications, pp. 72-76, Washington, DC, USA. 2006.
    • [14] N. Eagle, and A. S Pentland. Reality Mining: Sensing Complex Social Systems. Journal Personal and Ubiquitous Computing, vol. 10, no. 4, pp. 255 - 268, Mar. 2006.
    • [15] Y. Rahulamathavan, V. Moonsamy, L. Batten, S. Shunliang and M. Rajarajan. An Analysis of Tracking Service Settings in Blackberry 10 and Windows Phone 8 Smartphones, 19th Australasian Conference on Information Security and Privacy (ACISP), Wollongong, Australia, Jul., 2014.
    • [16] http://www.samsung.com/global/business/mobile/solution/ security/samsung-knox.
    • [17] http://uk.blackberry.com/business/mobile-device-management.html.
    • [18] M. Chase. Multi-authority Attribute Based Encryption, In Lecture Notes of Theory of Cryptography in Computer Science, Berlin Heidelberg, pp. 515-534, 2007.
    • [19] M. Chase, and S. S. M. Chow. Improving Privacy and Security in Multiauthority Attribute-Based Encryption. In Proc. 16th ACM Conf. Comp. Commun. Security, New York, NY, USA, pp. 121-130, 2009.
    • [20] A. B. Lewko, and B. Waters. Decentralizing Attribute-based Encryption, in EUROCRYPT, ser. LNCS, K. G. Paterson, Ed., vol. 6632. Springer, pp. 568-588, 2011.
    • [21] C. Burnett, P. Edwards, T. J Norman, L. Chen, Y. Rahulamathavan, M. Jaffray, E. Pignotti. TRUMP: A Trusted Mobile Platform for Selfmanagement of Chronic Illness in Rural Areas. In Trust and Trustworthy Computing, pp. 142-150. Springer Berlin Heidelberg, 2013.
    • [22] D. Weerasinghe, Y. Rahulamathavan, M. Rajarajan. Secure Trust Delegation for Sharing Patient Medical Records in a Mobile Environment. Health Policy and Technology, vol. 2, pp. 36-44, 2013.
    • [23] http://gas.dia.unisa.it/projects/jpbc/
    • [24] L. Scott, and D. E. Denning. A Location Based Encryption Technique and Some of Its Applications. In Proc. National Technical Meeting of The Institute of Navigation, Anaheim, CA, pp. 734-740, Jan. 2003.
    • [25] L. Hsien-Chou, and C. Yun-Hsiang, A New Data Encryption Algorithm Based on the Location of Mobile Users, Information Technology Journal, vol. 7, no. 1 pp. 63-69, 2008.
    • [26] Al-Ibrahim, Omar, Ala Al-Fuqaha, D. V. Dyk, and N. Akerman. Mobility Support for Geo-Encryption. In Proc. IEEE Int'l Conf. Commun., pp. 1492-1496, 2007.
    • [27] V. Vijayalakshmi, and T. G.Palanivelu. Secure Localization Using Elliptic Curve Cryptography in Wireless Sensor Networks. Int'l Journal of Comp. Sciences and Netw. Security, vol. 8, no. 6 pp. 255-261, 2008.
    • [28] R. Karimi, M. Kalantari. Enhancing Security and Confidentiality in Location-based Data Encryption Algorithms, Applications of Digital Information and Web Technologies (ICADIWT), 2011 Fourth Int'l Conf., pp. 30-35, Aug. 2011.
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article