Next Article in Journal
On the Role of Local Many-Body Interactions on the Thermoelectric Properties of Fullerene Junctions
Next Article in Special Issue
Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
Previous Article in Journal
Beyond the State of the Art: Novel Approaches for Thermal and Electrical Transport in Nanoscale Devices
Previous Article in Special Issue
Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning
Article Menu
Issue 8 (August) cover image

Export Article

Open AccessArticle

Secure Service Composition with Quantitative Information Flow Evaluation in Mobile Computing Environments

School of Cyber Engineering, Xidian University, Xi’an 710071, China
*
Author to whom correspondence should be addressed.
Entropy 2019, 21(8), 753; https://doi.org/10.3390/e21080753
Received: 31 May 2019 / Revised: 25 July 2019 / Accepted: 30 July 2019 / Published: 1 August 2019
(This article belongs to the Special Issue Information-Theoretic Security II)
  |  
PDF [572 KB, uploaded 15 August 2019]
  |     |  

Abstract

The advances in mobile technologies enable mobile devices to cooperate with each other to perform complex tasks to satisfy users’ composite service requirements. However, data with different sensitivities and heterogeneous systems with diverse security policies pose a great challenge on information flow security during the service composition across multiple mobile devices. The qualitative information flow control mechanism based on non-interference provides a solid security assurance on the propagation of customer’s private data across multiple service participants. However, strict discipline limits the service availability and may cause a high failure rate on service composition. Therefore, we propose a distributed quantitative information flow evaluation approach for service composition across multiple devices in mobile environments. The quantitative approach provides us a more precise way to evaluate the leakage and supports the customized disciplines on information flow security for the diverse requirements of different customers. Considering the limited energy feature on mobile devices, we use a distributed evaluation approach to provide a better balance on consumption on each service participant. Through the experiments and evaluations, the results indicate that our approach can improve the availability of composite service effectively while the security can be ensured. View Full-Text
Keywords: quantitative information flow; secure information flow model; service composition; mobile computing quantitative information flow; secure information flow model; service composition; mobile computing
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Xi, N.; Lv, J.; Sun, C.; Ma, J. Secure Service Composition with Quantitative Information Flow Evaluation in Mobile Computing Environments. Entropy 2019, 21, 753.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Entropy EISSN 1099-4300 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top