Secured Policy based Resource Access and User Authentication in Ubiquitous Computing Environment
S.Pandikumar1, S.Malathi2, K.Sathiesh Kumar3, M.Arun4, R.Kalpana5
1Dr.S.Pandikumar., Assistant Professor in Department of Computer Science, The American College, Madurai, India.
2S. Malathi, Assistant Professor in Sri Krishna Adithya College of Arts and Science, Coimbatore, India.
3M.Arun., MCA, Assistant Professor in Sri Krishna Adithya College of Arts and Science, Coimbatore, India.
4K.Sathiesh Kumar, Assistant Professor in Sri Krishna Adithya College of Arts and Science, Coimbatore, India.
5R. Kalpana, Assistant Professor in Sri Krishna Adithya College of Arts and Science, Coimbatore, India.
Manuscript received on October 12, 2019. | Revised Manuscript received on 22 October, 2019. | Manuscript published on November 10, 2019. | PP: 1836-1841 | Volume-9 Issue-1, November 2019. | Retrieval Number: A4731119119/2019©BEIESP | DOI: 10.35940/ijitee.A4731.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Policy-based resource access and data sharing are the most specific in context-aware computing. Granting authentication to the wireless and ad hoc users is usually difficult because the system has got to take into account several context factors whereas authoring access. During this epoch, the mobile phone plays a significant role in info access in a ubiquitous environment. Wireless technologies, significantly the GSM-SMS is efficient and efficient to access shared data around the world with fewer security issues. The shared resources like printers, scanners, databases, books, email, etc. are liable to the users once they try and access with proper authentication. The proposed system provides systematic access policy schemes and creates the access mechanism to remote users. These policies and mechanisms are entirely supported context info. The user should satisfy the defined context and defined the user level. This mechanism provides the facilities to users to request and access control through SMS.
Keywords: SBAC, Ubiquitous Computing, Policy based, Resource Access.
Scope of the Article: Cloud Computing and Networking