Soft Computing

, Volume 22, Issue 7, pp 2245–2255 | Cite as

Evolutionary trust scheme of certificate game in mobile cloud computing

  • Dazhi Li
  • Minglu Li
  • Jianhua Liu
Methodologies and Application


With the prosperity of cloud computing, many mobile nodes choose to deliver their certificate by service AP nodes, where each service AP node as a broker is responsible for authenticating virtual resource access with mobile users who are likely to be malicious in the underlying service requests. However, this access control system requires mobile users’ certificate information and may fail due to their privacy. In light of the growing privacy concerns, this paper proposes a certificate-aware framework for online access control system in mobile computing, where users are compensated for their privacy certificate and operation disclosure and are motivated to present more certificate information. In this framework, a broker pays a trust degree to users and virtual authentication coordinators for disclosing more certificate information. This paper models the interactions among virtual authentication coordinators, the authentication broker and mobile users as a three-stage game, where every player aims at maximizing its own utility, and the trust allocation is achieved by G value learning. Numerical results have shown that the proposed certificate-aware framework is effective, as it enables all players to maximize their utilities and improve the degree of the trust of mobile computing systems.


Mobile cloud computing Trust Certificate game Access control 



This article does not contain any studies with human participants or animals performed by any of the authors. Informed consent was obtained from all individual participants included in the study. This work was partly supported by the National Natural Science Foundation of China under Grant No. 61572014, Zhejiang Provincial Natural Science Foundation of China under Grants No. LY16F020028 and Scientific Research Foundation of Zhejiang Provincial Education Department of China under Grant No. Y201431192.

Compliance with ethical standards

Conflict of interests

The authors declare that they have no conflict of interest.


  1. Alizadeh M, Abolfazli S, Zamani M et al (2016) Authentication in mobile cloud computing: a survey. J Netw Comput Appl 61:59–80CrossRefGoogle Scholar
  2. Blundo C, Cimato S, De Capitani di Vimercati S et al (2010) Managing key hierarchies for access control enforcement: Heuristic approaches. Comput Secur 29(5):533–547CrossRefGoogle Scholar
  3. Chen Z, Qui Y, Liu J et al (2011) Incentive mechanism for selfish nodes in wireless sensor networks based on evolutionary game. Comput Math 62(9):3378–3388MathSciNetzbMATHGoogle Scholar
  4. dos Santos DR, Marinho R, Schmitt GR et al (2016) A framework and risk assessment approaches for risk-based access control in the cloud. J Netw Comput Appl 74:86–97CrossRefGoogle Scholar
  5. Furuncu E, Sogukpinar I (2015) Scalable risk assessment method for cloud computing using game theory. Comp Stand Inter 38:44–50CrossRefGoogle Scholar
  6. Hu L, Ku W, Bakiras S et al (2013) Spatial query integrity with voronoi neighbors. IEEE Trans Knowl Data Eng 25(4):863–876CrossRefGoogle Scholar
  7. Khalila I, Khreishahb A, Azeemc M (2014) Consolidated identity management system for secure mobile cloud computing. Comput Net 65(2):99–110CrossRefGoogle Scholar
  8. Khider H, Osman T, Sherkat N (2010) Attribute-based authorization for grid computing. International conference on intelligent systems, modelling and simulation (ISMS), pp 71–74Google Scholar
  9. Li X, Jia Z, Zhang P et al (2010) Trust-based on-demand multi-path routing in mobile ad hoc networks. IET Inf Secur 4(4):212–223CrossRefGoogle Scholar
  10. Li Q, Ma J, Li R, Liu X et al (2016) Secure, efficient and revocable multi-authority access control system in cloud storage. Comput Secur 59:45–59CrossRefGoogle Scholar
  11. Lia X, Xiong Y, Ma J et al (2012) An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J Netw Comput Appl 35(2):763–769CrossRefGoogle Scholar
  12. Lin H, Xu L, Huang X et al (2015) A trustworthy access control model for mobile cloud computing based on reputation and mechanism design. Ad Hoc Netw 35:51–64CrossRefGoogle Scholar
  13. Liu C (2014) Cloud service access control system based on ontologies. Adv Eng Softw 69(3):26–36CrossRefGoogle Scholar
  14. Liu Z, Joy AW, Thompson RA (2004) A dynamic trust model for mobile ad hoc networks. In: Proceedings of 10th IEEE international workshop on future trends of distributed computing systems, pp 80–85Google Scholar
  15. Li M, Yu S, Ren K et al.(2010) Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Proceeding on 6th international ICST conference on security privacy Common Network, pp. 89–106Google Scholar
  16. Luo J, Liu X, Fan M (2009) A trust model based on fuzzy recommendation for mobile ad hoc networks. Comput Netw 53(14):2396–2407CrossRefzbMATHGoogle Scholar
  17. Ma CYT, Rao NSV, Yau DKY (2011) A game theoretic study of attack and defense in cyber-physical systems. IEEE conference on computer communications workshops, pp 10–15Google Scholar
  18. Ma X, Zhang J, Tao J et al (2014) DNSRadar: outsourcing malicious domain detection based on distributed Cache–Footprints. IEEE Trans Inf Forensic Secur 9(11):1906–1921CrossRefGoogle Scholar
  19. Pirzada AA, McDonald C (2006) Trust establishment in pure ad hoc Networks. Wirel Pers Commun 37(1):39–168Google Scholar
  20. Qin ZG, Xiong H, Zhu GB et al (2014) Certificate-free ad hoc anonymous authentication. Inform Sci 268:447–457MathSciNetCrossRefzbMATHGoogle Scholar
  21. Rong C, Nguyen ST, Jaatun MG (2013) Beyond lightning: a survey on security challenges in cloud computing. Comput Elect Eng 39(1):47–54CrossRefGoogle Scholar
  22. Ruj S, Stojmenovic M, Nayak A (2014) Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans Parall Distr 25(2):384–394CrossRefGoogle Scholar
  23. Shi RH, Zhong H, Huang LS (2014) A novel anonymous authentication scheme without cryptography. Trans Emerg Telecomun Technol 25(9):875–880CrossRefGoogle Scholar
  24. Van den Berg E, Zhang T, Pietrowicz S (2009) Blend-In: a privacy enhancing certificate selection method for vehicular communication. IEEE Trans Veh Technol 58(9):5190–5199CrossRefGoogle Scholar
  25. Wang Q, Wang C, Ren K et al (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parall Distrib Syst 22(5):847–859CrossRefGoogle Scholar
  26. Wang H, Wu S, Chen M et al (2014) Security protection between users and the mobile media cloud. IEEE Comm Mag 52(3):73–79CrossRefGoogle Scholar
  27. Wang W, Chen L, Zhang Q (2015) Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation. Comput Commun 88(9):136–148Google Scholar
  28. Wang D, Wang N, Wang P et al (2015) Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inform Sci 321:162–178CrossRefGoogle Scholar
  29. Wang W, Li Z, Owens R et al (2009) Secure and efficient access to outsourced data. In: Proceedings of the 2009 ACM workshop on cloud computing security, pp 55–66Google Scholar
  30. Wang C, Wang Q, Ren K et al. (2010) Privacy-preserving public auditing for data storage security in cloud computing. In: Proceeding on international conference on computer communications, pp 1–9Google Scholar
  31. Wasef A, Jiang Y, Shen X (2010) An efficient distributed certificate service scheme for vehicular networks. IEEE Trans Veh Technol 59(2):533–549CrossRefGoogle Scholar
  32. Yang X, Huang X, Liu JK (2016) Efficient handover authentication with user anonymity and untraceability for mobile cloud computing. Future Gener Comp Syst 62:190–195CrossRefGoogle Scholar
  33. Yang L, Wang W, Chen Y et al. (2013) A privacy-aware framework for online advertisement targeting. In Proceedings on IEEE global communications conference, pp 3145–3150Google Scholar
  34. Yeh LY, Huang JL (2014) PBS: a portable billing scheme with fine-grained access control for service-oriented vehicular networks. IEEE Trans Mob Comput 13(11):2606–2619CrossRefGoogle Scholar
  35. Younis YA, Kifayat K, Merabti M (2014) An access control model for cloud computing. J Inf Secur Appl 19(1):45–60Google Scholar
  36. Zhang ZH, Li JJ, Jiang W et al. (2012) A new anonymous authentication scheme for cloud computing. In: Proceedings of 7th international conference on computer science and education, pp 896–898Google Scholar
  37. Zhang B, Huang A, Xiang Y (2014) A novel multiple-level trust management framework for wireless sensor networks. Comput Netw 72(29):45–61CrossRefGoogle Scholar
  38. Zhao R, Yue C (2014) Toward a secure and usable cloud-based password manager for web browsers. Comput Secur 46(3):32–47MathSciNetCrossRefGoogle Scholar
  39. Zhou J, Lin X, Dong X et al (2015) PSMPA: patient self-controllable and multi-level privacy-preserving cooperative authentication in distributed m-healthcare cloud computing system. IEEE Trans Parall Distr 26(6):1693–1703CrossRefGoogle Scholar
  40. Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):230–234Google Scholar
  41. Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gener Comp Syst 28(3):583–592CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2017

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiChina
  2. 2.College of Information, Mechamical and Electrical EngineeringShanghai Normal UniversityShanghaiChina
  3. 3.College of Mathematics, Physics and Information EngineeringJiaxing UniversityJiaxingChina

Personalised recommendations