Flexible data access control in D2D communications

Research output: Contribution to journalArticleScientificpeer-review

Standard

Flexible data access control in D2D communications. / Yan, Zheng; Xie, Haomeng; Zhang, Peng; Gupta, Brij B.

In: Future Generation Computer Systems, Vol. 82, 2018, p. 738-751.

Research output: Contribution to journalArticleScientificpeer-review

Harvard

APA

Vancouver

Author

Yan, Zheng ; Xie, Haomeng ; Zhang, Peng ; Gupta, Brij B. / Flexible data access control in D2D communications. In: Future Generation Computer Systems. 2018 ; Vol. 82. pp. 738-751.

Bibtex - Download

@article{c50cce47295f4c94a16a83e396621083,
title = "Flexible data access control in D2D communications",
abstract = "Device-to-Device (D2D) communications have been regarded as an advanced technology for the next generation mobile communication networks and wireless systems (5G). It is essential to secure D2D communication data for resisting malicious attacks. However, secure D2D communications among mobile devices have not been well solved. By paying attention to the important role of trust in securing D2D communications, in this paper, we propose a scheme using either a General Trust (GT) level issued by a core network or a Local Trust (LT) level evaluated by a device or both to control D2D communication data access by applying Attribute-Based Encryption (ABE). This scheme realizes secure data communications among mobile devices under the legacy system model of Long-Term Evolution (LTE). Performance analysis and evaluation demonstrate that the proposed scheme is effective with regard to security, computation complexity, communication cost, flexibility and scalability.",
keywords = "Access control, Attribute-Base Encryption (ABE), Device to Device (D2D) communications, Privacy, Security, Trust",
author = "Zheng Yan and Haomeng Xie and Peng Zhang and Gupta, {Brij B.}",
year = "2018",
doi = "10.1016/j.future.2017.08.052",
language = "English",
volume = "82",
pages = "738--751",
journal = "Future Generation Computer Systems: the international journal of grid computing and escience",
issn = "0167-739X",

}

RIS - Download

TY - JOUR

T1 - Flexible data access control in D2D communications

AU - Yan, Zheng

AU - Xie, Haomeng

AU - Zhang, Peng

AU - Gupta, Brij B.

PY - 2018

Y1 - 2018

N2 - Device-to-Device (D2D) communications have been regarded as an advanced technology for the next generation mobile communication networks and wireless systems (5G). It is essential to secure D2D communication data for resisting malicious attacks. However, secure D2D communications among mobile devices have not been well solved. By paying attention to the important role of trust in securing D2D communications, in this paper, we propose a scheme using either a General Trust (GT) level issued by a core network or a Local Trust (LT) level evaluated by a device or both to control D2D communication data access by applying Attribute-Based Encryption (ABE). This scheme realizes secure data communications among mobile devices under the legacy system model of Long-Term Evolution (LTE). Performance analysis and evaluation demonstrate that the proposed scheme is effective with regard to security, computation complexity, communication cost, flexibility and scalability.

AB - Device-to-Device (D2D) communications have been regarded as an advanced technology for the next generation mobile communication networks and wireless systems (5G). It is essential to secure D2D communication data for resisting malicious attacks. However, secure D2D communications among mobile devices have not been well solved. By paying attention to the important role of trust in securing D2D communications, in this paper, we propose a scheme using either a General Trust (GT) level issued by a core network or a Local Trust (LT) level evaluated by a device or both to control D2D communication data access by applying Attribute-Based Encryption (ABE). This scheme realizes secure data communications among mobile devices under the legacy system model of Long-Term Evolution (LTE). Performance analysis and evaluation demonstrate that the proposed scheme is effective with regard to security, computation complexity, communication cost, flexibility and scalability.

KW - Access control

KW - Attribute-Base Encryption (ABE)

KW - Device to Device (D2D) communications

KW - Privacy

KW - Security

KW - Trust

UR - http://www.scopus.com/inward/record.url?scp=85029704660&partnerID=8YFLogxK

U2 - 10.1016/j.future.2017.08.052

DO - 10.1016/j.future.2017.08.052

M3 - Article

VL - 82

SP - 738

EP - 751

JO - Future Generation Computer Systems: the international journal of grid computing and escience

JF - Future Generation Computer Systems: the international journal of grid computing and escience

SN - 0167-739X

ER -

ID: 16193714