PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A New Trust Framework for E-Government in Cloud of Things

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The idea of using the Cloud of Things is becoming more critical for e-government, as it is considered to be a useful mechanism of facilitating the government’s work. The most important benefit of using the Cloud of Things concept is the increased productivity that the e-governments would achieve; which eventually would lead to significant cost savings; which in turn would have a highly anticipated future impact on egovernments. E-government’s diversity goals face many challenges; trust is one of the major challenges that it is facing when deploying the Cloud of Things. In this study, a new trust framework is proposed which supports trust with the Internet of Things devices interconnected to the cloud; to support the services that are provided by e-government to be delivered in a trusted manner. The proposed framework has been applied to a use case study to ensure its trustworthiness in a real mission. The results show that the proposed trust framework is useful to ensure achieving a trusted environment for the Cloud of Things for it to continue providing and gathering the data needed for the services that are offered by users through E-government.
Słowa kluczowe
Rocznik
Strony
397--405
Opis fizyczny
Bibliogr. 38 poz., wykr., rys., tab.
Twórcy
  • Faculty of Information Technology, Ajloun, National University, Jordan
  • Faculty of Information Technology, Isra University, Amman-Jordan
  • Faculty of Information Technology, Middle East University, Amman-Jordan
Bibliografia
  • [1] B.Al-Shargabi, “Security Engineering for E-Government Web Services: A Trust Model,” in Proceedings of the Information Systems Engineering (ICISE), 2016,pp.33-45.
  • [2] D.Miorandi and S. Sicari, “Internet of Things: Vision, Applications and Research Challenges,” Ad Hoc Networks, vol.10, no.7, pp.1497-1516, 2012.
  • [3] S. Nirmala, and S. Sachchidanand, “Internet of Things (IoT): Security Challenges, Business Opportunities & Reference Architecture for E-commerce,” in Proceedings International Conference on Green Computing and Internet of Things (ICGCIoT), Noida, India, 2016, pp.223-229.
  • [4] T.Al-Rousan, “Cloud Computing for Global Software Development: Opportunities and Challenges,” in Transportation Systems and Engineering: Concepts, Methodologies, Tools, and Applications IGI Global, 2015, pp. 877-908.
  • [5] R.Khan, S. Zaheer and F.Khan, “Future Internet: The Internet of Things Architecture, Possible Applications and key challenges,” in Proceedings of the 10th International Conference on Frontiers of Information Technology (FIT), 2015, pp.256-259.
  • [6] C. Buzduga and C. Ciufudean, “Internet of Things for Flexible Manufacturing Systems Diagnosis,” in Proceedings of the 5th International Conference on Smart Cities and Green ICT Systems (SMARTGREENS), Rome, Italy, 2017, pp.119-125.
  • [7] A.Serbanati, A. Segura, O. Oliverau, A. Saied and y. Gruschka, “Internet of Things Architecture, Concept and Solutions for Privacy and Security in the Resolution Infrastructure,” EU project IoT-A, Project report D4 ., pp. 2012, 346-391.
  • [8] D.Chen, d. Chang, l. Jin and J.Ren, “A Novel Secure Architecture for the Internet of Things,” in Proceedings of the International Conference on Genetic and Evolutionary Computing (ICGEC), 2016, pp.78-85.
  • [9] K. Chang, C. Chen, J. Chen and H. Chao, “Internet of Things and Cloud Computing for future Internet,” in Proceedings of the Security-Enriched Urban Computing and Smart Grid, Berlin Heidelberg, 2017,pp.189-191.
  • [10] J. Zhou, T. Leppanen, E. Harjula, M. Ylianttila and T. Ojala, “Yang, “Cloud things: A Common Architecture for Integrating the Internet of Things with Cloud Computing,” in Proceedings of the Computer Supported Cooperative Work in Design (CSCWD), 2015, pp.201-208.
  • [11] M. Shahzad and M. Singh, “Continuous Authentication and Authorization for the Internet of Things,” IEEE Internet Computing, vol 21, no.2, pp.86 - 90, 2017.
  • [12] C. Sarkar, R. Prasad, A. Rahim, R. Neisse and G. Baldini, “A Scalable Distributed Architecture for IoT,” IEEE Internet of Things Journal, vol 5, no.3 10, pp. 230-239, 2018.
  • [13] M. Ahlgren, M. Hidell and E. Ngai, ‘Internet of Things for Smart Cities: Interoperability and Open Data,” IEEE Internet Computing, vol 20, no.6, pp.52 - 56, 2016.
  • [14] A. Sheth, “Internet of Things to Smart IoT Through Semantic, Cognitive, and Perceptual Computing,” IEEE Intelligent Systems, vol 31, no.2, pp.108 - 112, 2017.
  • [15] T.AL-Rousan, A. AL-Zobadi and O. AL-Haj Hassan, “The Roles of Decisions Making and Empowerment in Jordanian web-based," Journal of Web Engineering, vol 15, no.(5&6), pp.469-482, 2014.
  • [16] R. Roman, J. Zhou and L. Lopez, “The Features and Challenges of Security and Privacy in Distributed Internet of Things,” Computer Networks, vol 60, no. 10, pp. 2266-2279, 2016.
  • [17] R. Girau and L. Atzori, “Trustworthiness Management in the Social Internet of things,” IEEE Transactions on knowledge and Data Engineering, vol 28, no. 5, pp. 1253-1266, 2016.
  • [18] Kohlas, J. Jonczy and R. Haenni, “A trust Evaluation Method Based on Logic and Probability Theory," in Proceedings of the International Conference on Trust Management, 2017, pp. 17-32.
  • [19] J. Mai, X. Shuai and Z. Wang, “Access Control Mechanism Based on Trust Quantification,” in Proceedings of the Second International Conference on Social Computing, 2016, pp.411-419.
  • [20] R. Roman, P. Najera and J, Lopez, “Securing the internet of things,” Computer, vol 49, no. 9, pp. 51-58, 2016.
  • [21] J. Guo and R. Chen, “A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems,” in Proceedings of the IEEE International Conference on Services Cloud Computing (SCC),2016, Kiev, Ukraine, pp. 324-331.
  • [22] D. Rotondi, and S. Piccione, “Managing access control for things: A capability based approach.,” in Proceedings of the 7th International Conference on Body Area Network , 2018, pp.192-201.
  • [23] Y. Sun, Z. Han and K. Ray, “Information Theoretic Framework of Trust Modeling and Evaluation for Ad-hoc Networks,” IEEE Journal of Selected Areas in Communications, vol 24, no. 2, pp.305-319, 2013.
  • [24] R. Zhang, Y. Zhang and K. Ren, “Distributed Privacy-Preserving Access Control in Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, vol 27, no. 1, pp.1427-1438, 2016.
  • [25] J. Mai, X. Shuai and Z, Wang, “Access control mechanism based on trust quantification,” in Proceedings of the Second International Conference on Social Computing, 2017, Dallas, USA, pp.411-419.
  • [26] M. Weyrich and E.Ebert, “Reference Architectures for the Internet of Things,” IEEE Software, vol 33, no. 1, pp.112 - 116, 2016.
  • [27] D. Kauchak and G. Leroy, “Moving Beyond Readability Metrics for Health-Related Text Simplification,” IEEE Journals & Magazines, vol 31, no. 4, pp. 41-51, 2016.
  • [28] N. Sriram, A. Premnat and J. Zygmunt, “Security and Privacy in the Internet of Things under Time-and-Budget-Limited Adversary Model,” IEEE Wireless Communications Letters, vol 14, no.3, pp. 571-583, 2018.
  • [29] Q. Hassan, “An Overview of Enabling Technologies for the Internet of Things,” in Proceedings of the Internet of Things A to Z:Technologies and Applications,Wiley-IEEE Press, 2018, pp148-173.
  • [30] M. Thiyagarajan and C. Raveendra, “Role of Web Service in Internet of Things,” in Proceedings of the 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Tumkur, India, 2017, pp.35-42.
  • [31] T. Al-Rousan, H. Abualese, B. Al-Shargabi, “A New Security Model for Web Browser Local Storage,” International Journal of Advanced Computer Science and Applications (IJACSA), vol.10, no.8, 2019.
  • [32] H. Virdi and B. Singh, “Analysis of the Software Code based upon Coupling in the Software,” in Proceedings of the 7th International Conference on Computing Communication & Networking Technologies (ICCCNT'18),Houston, USA 2018, pp.518-527.
  • [33] D.Singh, G. Tripathi and A, Jara, “A survey of Internet-of-Things: Future Vision, Architecture, Challenges and Services,” in Proceedings of the World forum on nternet of things (WF-IoT), 2017, pp.57-62.
  • [34] B. Al-Shargabi and O. Sabri, “Internet of Things an Exploration Study of Opportunities and Challenges,” in Proceedings of the International Conference of Engineering and MIS , Monastir-Tunisa, 2017, pp.263-269.
  • [35] E.Chowdary and D. Yakobu, “Cloud of Things (CoT) Integration Challenges," in Proceedings of the Computational Intelligence and Computing Research (ICCIC), Roma. Italy, 2016, pp. 457-464.
  • [36] W. Karunianto and A. Saputro, “Design and implementation remote laboratory based on Internet of Things: Study case in diffraction grating experiment," in Proceedings of the International Conference on Computer, Keiv, Ukraine,2017, pp.398-408.
  • [37] T. Al-Rousan, “An Investigation of User Privacy and Data Protection on User-Side Storage,” International Journal of Online and Biomedical Engineering (iJOE), vol.15, no.9,2019
  • [38] H. Takabi, J. Joshi and G. Ahn, “Security and privacy challenges in Cloud Computing environments,” IEEE Security & Privacy, vol 15, no. 6, pp.24-31, 2017.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-39f9d897-a3d7-4853-9874-fb4ebc9d08dc
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.