Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2017, Article ID 7469342, 13 pages
https://doi.org/10.1155/2017/7469342
Research Article

Distributed Secure Service Composition with Declassification in Mobile Clouds

School of Computer Science and Technology and School of Cyber Engineering, Xidian University, Xian, China

Correspondence should be addressed to Di Lu; moc.361@2002onijin

Received 7 October 2016; Accepted 21 December 2016; Published 14 February 2017

Academic Editor: Changqiao Xu

Copyright © 2017 Ning Xi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P.-J. Maenhaut, H. Moens, B. Volckaert, V. Ongenae, and F. De Turck, “Design of a hierarchical software-defined storage system for data-intensive multi-tenant cloud applications,” in Proceedings of the 11th International Conference on Network and Service Management (CNSM '15), pp. 22–28, IEEE, Barcelona, Spain, November 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. S. Sezer, S. Scott-Hayward, P. Chouhan et al., “Are we ready for SDN? Implementation challenges for software-defined networks,” IEEE Communications Magazine, vol. 51, no. 7, pp. 36–43, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. N. Chalaemwongwan and W. Kurutach, “Mobile cloud computing: a survey and propose solution framework,” in Proceedings of the 13th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON '16), pp. 1–4, Chiang Mai, Thailand, June 2016. View at Publisher · View at Google Scholar
  4. N. Chen, N. Cardozo, and S. Clarke, “Goal-driven service composition in mobile and pervasive computing,” IEEE Transactions on Services Computing, 2016. View at Publisher · View at Google Scholar
  5. F. Paganelli, M. Ulema, and B. Martini, “Context-aware service composition and delivery in NGSONs over SDN,” IEEE Communications Magazine, vol. 52, no. 8, pp. 97–105, 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. C. Groba and S. Clarke, “Opportunistic composition of sequentially-connected services in mobile computing environments,” in Proceedings of the IEEE 9th International Conference on Web Services (ICWS '11), pp. 17–24, IEEE, Washington, DC, USA, July 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. C. Danwei, H. Xiuli, and R. Xunyi, “Access control of cloud service based on UCON,” in Proceedings of the IEEE International Conference on Cloud Computing, pp. 559–564, Springer, Beijing, China, December 2009.
  8. D. Volpano, C. Irvine, and G. Smith, “Sound type system for secure flow analysis,” Journal of Computer Security, vol. 4, no. 2-3, pp. 167–187, 1996. View at Publisher · View at Google Scholar · View at Scopus
  9. D. Hutter and M. Volkamer, “Information flow control to secure dynamic web service composition,” in Security in Pervasive Computing, pp. 196–210, Springer, Berlin, Germany, 2006. View at Google Scholar
  10. R. Accorsi and C. Wonnemann, “Static information flow analysis of workflow models,” in Proceedings of the 2nd International Symposium on Services Science, ISSS 2010 and 3rd International Conference on Business Process and Services Computing (BPSC '10— INFORMATIK '10), pp. 194–205, October 2010. View at Scopus
  11. R. Dimitrova, B. Finkbeiner, M. Kovács, M. N. Rabe, and H. Seidl, “Model checking information flow in reactive systems,” in Verification, Model Checking, and Abstract Interpretation, pp. 169–185, Springer, Berlin, Germany, 2012. View at Google Scholar
  12. S. Nakajima, “Model-checking of safety and security aspects in web service flows,” in Web Engineering, pp. 488–501, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar
  13. W. She, I.-L. Yen, B. Thuraisingham, and E. Bertino, “The SCIFC model for information flow control in web service composition,” in Proceedings of the IEEE International Conference on Web Services (ICWS '09), pp. 1–8, IEEE, Los Angeles, Calif, USA, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. W. She, I.-L. Yen, B. Thuraisingham, and E. Bertino, “Policy-driven service composition with information flow control,” in Proceedings of the IEEE 8th International Conference on Web Services (ICWS '10), pp. 50–57, Miami, Fla, USA, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. W. She, I.-L. Yen, B. Thuraisingham, and E. Bertino, “Security-aware service composition with fine-grained information flow control,” IEEE Transactions on Services Computing, vol. 6, no. 3, pp. 330–343, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. N. Xi, J. Ma, C. Sun, and T. Zhang, “Decentralized information flow verification framework for the service chain composition in mobile computing environments,” in Proceedings of the IEEE 20th International Conference on Web Services (ICWS '13), pp. 563–570, Santa Clara, Calif, USA, July 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. E. J. Schwartz, T. Avgerinos, and D. Brumley, “All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask),” in Proceedings of the 31st IEEE Symposium on Security and Privacy (SP '10), pp. 317–331, IEEE, Oakland, Calif, USA, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  18. J. Bacon, D. Eyers, T. F. J.-M. Pasquier, J. Singh, I. Papagiannis, and P. Pietzuch, “Information flow control for secure cloud computing,” IEEE Transactions on Network and Service Management, vol. 11, no. 1, pp. 76–89, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. S.-C. Chou, “Controlling information flows in SaaS cloud services,” in Proceedings of the 7th International Conference on Computing and Convergence Technology (ICCIT, ICEI and ICACT) (ICCCT '12), pp. 651–656, Seoul, Korea, December 2012. View at Scopus
  20. N. Solanki, T. Hoffman, I. L. Yen, F. Bastani, and S. S. Yau, “An access and information flow control paradigm for secure information sharing in service-based systems,” in Proceedings of the IEEE 39th Annual Computer Software and Applications Conference (COMPSAC '15), vol. 1, pp. 60–67, July 2015.
  21. N. Xi, C. Sun, J. Ma, and Y. Shen, “Secure service composition with information flow control in service clouds,” Future Generation Computer Systems, vol. 49, pp. 142–148, 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. N. Xi, C. Sun, J. Ma, Y. Shen, and D. Lu, “Distributed secure service composition with declassification in mobile network,” in Proceedings of the International Conference on Networking and Network Applications (NaNA '16), pp. 254–259, IEEE, Hakodate, Japan, July 2016. View at Publisher · View at Google Scholar
  23. D. E. Denning, “A lattice model of secure information flow,” Communications of the Association for Computing Machinery, vol. 19, no. 5, pp. 236–243, 1976. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  24. C. Gentry and S. Halevi, “Implementing Gentry's fully—homomorphic encryption scheme,” in Advances in cryptology—EUROCRYPT 2011, vol. 6632 of Lecture Notes in Computer Science, pp. 129–148, Springer, Heidelberg, Germany, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  25. S. Luo, J. Hu, and Z. Chen, “Implementing attribute-based encryption in web services,” in Proceedings of the IEEE 8th International Conference on Web Services (ICWS '10), pp. 658–659, IEEE, Miami, Fla, USA, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  26. T. R. Henderson, M. Lacage, G. F. Riley, C. Dowell, and J. Kopena, “Network simulations with the ns-3 simulator,” in Proceedings of the SIGCOMM Demonstration, vol. 14, 2008.
  27. P. Chandra, M. Messier, and J. Viega, Network Security with Openssl, O'Reily, 2002.