CFP last date
20 May 2024
Reseach Article

Cloud based Secure Trust based Middleware for Smartphones for Accessing Enterprise Applications

by Harsukhpal Singh, Mandeep Singh, Raman Puneet Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 84 - Number 7
Year of Publication: 2013
Authors: Harsukhpal Singh, Mandeep Singh, Raman Puneet Singh
10.5120/14585-2819

Harsukhpal Singh, Mandeep Singh, Raman Puneet Singh . Cloud based Secure Trust based Middleware for Smartphones for Accessing Enterprise Applications. International Journal of Computer Applications. 84, 7 ( December 2013), 1-7. DOI=10.5120/14585-2819

@article{ 10.5120/14585-2819,
author = { Harsukhpal Singh, Mandeep Singh, Raman Puneet Singh },
title = { Cloud based Secure Trust based Middleware for Smartphones for Accessing Enterprise Applications },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 84 },
number = { 7 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume84/number7/14585-2819/ },
doi = { 10.5120/14585-2819 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:00:16.575963+05:30
%A Harsukhpal Singh
%A Mandeep Singh
%A Raman Puneet Singh
%T Cloud based Secure Trust based Middleware for Smartphones for Accessing Enterprise Applications
%J International Journal of Computer Applications
%@ 0975-8887
%V 84
%N 7
%P 1-7
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

There are about 6,098 million wireless devices in the world and there were 117. 7 million smartphone users in 2012. The number is increasing day by day. With the attractiveness of web services for mobile devices, the concern of security for mobile devices has been brought up. There is a need for organizations to allow employees to use smartphones for their work. More and more wireless Devices are being used, moreover, with more and more collaboration of organizations, web services are now in general involved with more than one organization and they use enterprise applications deployed mainly on the Cloud. The Enterprise applications are being accessed by the wireless devices and fixed connections. Trusting the wireless devices mainly smartphones is an issue with the devices. With the increase of Mobile users Mobile computing required more enhanced security than traditional computing systems. This paper focuses on building a secure middleware based trust on the cloud. Smartphones accessing the Enterprise Applications on the cloud will have to get access as per the trust polices used by the trust models in the middleware. It resolves the issues caused by the smartphones being stolen, insecure communication between the smartphones and cloud, users misusing the privileges. The Secure middleware will be hosted on cloud platform for enhancing the security. The trust value is calculated for all http requests from the smartphones to cloud and then to decide whether the request should be served or not by the middleware. The thought of the Secure Middleware is to make the trust models more adaptable scalable and optimized for the smartphones accessing the enterprise applications.

References
  1. A Distributed Trust Evaluation Model for Mobile, P2P Systems. Xu Wu, Department of Computer Science, Xi'an University of Posts and Telecommunications, Xi'an, China 2012.
  2. S. E. Abdrahman, "Web Access Control Using User Access Behavior (WACUAB)", Proceedings of the 2008, International Conference on Semantic Web & Web Services (SWWS 2008), pages 242-5, 2008.
  3. Singh, M. and Dhindsa, K. S. , 2013. "Enhancing Interaction between Smartphones and Web services on Cloud for improved Bandwidth and latency," International Journal of Computer Science and Mobile Computing (IJCSMC), Vol. 2, No. 4, pp. 177-185.
  4. Y. Sun, W. Yu, Z. Han, and K. Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE Journal on Selected Areas in Communication, vol. 24, pp. 305–317, Feb. 2006.
  5. K. Takeshita, M. Sasabe, H. Nakano, "Mobile P2PVNetworks for Highly Dynamic Environments", in Proc. Of the 6th IEEE International Conference on Pervasive VComputing and Communications, Hong Kong, 2008, pp. 453-457.
  6. Singh, M. and Dhindsa, K. S. , 2013. "Securing RJSON data between Middleware and SMARTPHONES through JavaScript based Cryptographic Algorithms. "International Journal of Soft Computing and Engineering (IJSCE), Vol. 3, No. 2 , pp. 189-194. .
  7. M. Singh and V. K. Prasanna, "A hierarchical model for distributed collaborative computation in wireless sensor networks," in Proc. of the17th International Symposium on Parallel and Distributed Processing. Washington, DC, USA: IEEE Computer Society, 2003, p. 166. 2.
  8. R. Zhou and K. Hwang, "PowerTrust: A Robust and Scalable Reputation System for Trusted P2P Computing," IEEE Transactions on Parallel and Distributed Systems, Vol. 18, No. 5, May 2007.
  9. F. Alshahwan and K. Moessner, "Providing SOAP web services and RESTful web services from Mobile hosts", IEEE fifth international conference on internet and web applications and services, 2010.
  10. M. Coetzee and J. H. P. Eloff, "A Trust and Context Aware Access Control Model for web service conversation", Trust, Privacy and Security in Digital Business. Proceedings 4th International Conference, TrustBus 2007. (Lecture Notes in Computer Science vol. 4657), pages 115-24, 2007.
  11. L. Bauer, M. A. Schneider, and E. W. Felten, "A Proof-Carrying Authorization System", Proceedings DARPA Information Survivability Conference and Exposition, 117-19 vol. 2, 2003; ISBN-10: 0 7695 1897 4; DOI: 10. 1109/DISCEX. 2003. 1194942; Conference: Proceedings DARPA Information Survivability Conference and Exposition, 22-24 April 2003.
  12. A. Corradi, R. Montanari, D. Tibaldi, A. Toninelli, and U. Bologna, "A Context-centric Security Middleware for Service Provisioning in Pervasive Computing," Symposium A Quarterly Journal In Modern Foreign Literatures, 2005.
  13. R. A. Shaikh, H. Jameel, B. J. d'Auriol, H. Lee, and S. L. and Young Jae Song, "Group-based trust anagement scheme for clustered wireless sensor networks," IEEE Trans. Parallel and Distrib. Sys, vol. 20, pp. 1698–1712, 2009.
  14. Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  15. Brown, L. D. , Hua, H. , and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  16. Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender.
  17. M. Coetzee and J. H. P. Eloff, "A Trust and Context Aware Access Control Model for web service conversation", Trust, Privacy and Security in Digital Business. Proceedings 4th International Conference, TrustBus 2007. (Lecture Notes in Computer Science vol. 4657), pages 115-24, 2007.
  18. L. Eschenauer, V. D. Gligor, and J. Baras, "On trust establishment in mobile ad-hoc networks", In B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors, 10th International Security Protocols Workshop, Cambridge, UK, April 2002, volume 2845 of Lecture Notes in Computer Science, pages 47-66. Springer-Verlag, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Middleware Trust Models Android Trust policies CloudSim Trust Policy