Trust Management Approach for Securing the Services Access:Telecom Operators Collaborations in IMS Network
Keywords:
IMS network, trust management, collaboration, trust criteria, privacy, telecom operator, service provider, decision making, AHPAbstract
IP Multimedia Subsystem (IMS) network presents a new generation in the telecommunication infrastructure by providing a variety of services whatever the used technologies. Therefore, to make the customers satisfied, their telecom operator provides them several services according to their attached user profile (subscription type). However, some services are not hosted by the home operator; the service providers are responsible to present these services to the customers. In this case, the operator contacts the concerned provider for requesting the access to the desired services. In fact, this access may arise some security issues which affect the customer privacy and the services security. In this paper,we project our approach, Tr-OrBAC, in the context of collaboration between service providers and telecom operators.We discuss the case when the customer wishes to access to a service hosted by an external service provider. We present the encountered security problems. Then, we depict and we detail the functioning of our approach to resolve these problems.
Downloads
References
R. Ratasuk, A. Prasad, Z. Li, A. Ghosh and M. A. Uusitalo, ‘Recent
advancements in M2M communications in 4G networks and evolution
towards 5G’, in 18th International Conference on Intelligence in Next
Generation Networks, pp. 52–57, 2015.
T. Pfeiffer, ‘Next Generation Mobile Fronthaul Architectures’, in Optical
Fiber Communication Conference and Exhibition, Los Angeles, CA,
USA, 2015.
N. Czernich, O. Falck, T. Kretschmer and L. Woessmann, ‘Broadband
Infrastructure and Economic Growth*: Broadband Infrastructure
and Economic Growth’, The Economic Journal, vol. 121, no 552, pp.
–532, 2011.
D. He, C. Chen, J. Bu, S. Chan and Y. Zhang, ‘Security and efficiency
in roaming services for wireless networks: challenges, approaches, and
prospects’, IEEE Communication Magazine, vol. 51, no 2, pp. 142–150,
Camarillo, Gonzalo and Miguel-Angel Garcia-Martin, ‘The 3G IP
multimedia subsystem (IMS): merging the Internet and the cellular
worlds’ JohnWiley & Sons, 2007.
Scott,W. Richard, Gerald F. Davis et al., “Organizations and organizing:
Rational natural and open systems perspectives”, Routledge, 2015.
N. Ait Aali, A. Baina and L. Echabbi, ‘Tr-OrBAC: A trust model for
collaborative systems within critical infrastructures’, 5thWorld Congress
on Information and Communication Technologies (WICT), pp. 123–128,
C. Alcaraz and S. Zeadally, ‘Critical infrastructure protection:
Requirements and challenges for the 21st century’, International Journal
of Critical Infrastructure Protection, vol. 8, pp. 53–66, 2015.
E. Belmekki, M. Bellafkih and N. Bouaouda, ‘Efficient light model for
securing IMS network’, in 8th International Conference on Intelligent
Systems: Theories and Applications (SITA), pp. 1–7, 2013.
N. Ait Aali, A. Baina and L. Echabbi, ‘Trust Management in Collaborative
Systems for Critical Infrastructure Protection’, Security and
Communication Network, vol. 2018, p. 1–15, juillet. 2018.
R. S. Sandhu, E. J. Coyne, H. L. Feinstein and C. E.Youman, ‘Role-based
access control models’, Computer, vol. 29, no 2, pp. 38–47, 1996.
N. Ait Aali, Y. E. B. E. Idrissi, A. Baina and L. Echabbi, ‘Collaboration
decision making based on AHP method in Tr-OrBAC model: Case
study’, in 4th IEEE International Colloquium on Information Science
and Technology (CiSt), pp. 779–784, 2016.
V. Herrera-Semenets, O. A. P´erez-Garc´ıa, A. Gago-Alonso and
R. Hern´andez-Le´on, ‘Classification rule-based models for malicious
activity detection’, Intelligent Data Analysis, vol. 21, no 5, pp. 1141–
, 2017.
F. Ishmanov,A. S. Malik, S.W. Kim and B. Begalov, ‘Trust management
system in wireless sensor networks: design considerations and research
challenges’, Transactions on Emerging Telecommunications Technologies,
vol. 26, no 2, pp. 107–130, 2015.
A. Chen, N. Feamster and E. Calandro, ‘Exploring the walled garden
theory: An empirical framework to assess pricing effects on mobile data
usage’, Telecommunications Policy, vol. 41, no 7, pp. 587–599, 2017.
N.-V. Ciobanu, D.-G. Comaneci, C. Dobre, C. X. Mavromoustakis and
G. Mastorakis, ‘OpenMobs: Mobile Broadband Internet Connection
Sharing’, in Mobile Networks and Management, pp. 244–258, 2014.
D. Kang Y. Park, ‘Review-based measurement of customer satisfaction
in mobile service: Sentiment analysis and VIKOR approach’, Expert
Systems with Applications, vol. 41, no 4, pp. 1041–1050, 2014.
T. L. Saaty, ‘Decision making with the analytic hierarchy process’,
International Journal of Services Sciences., vol. 1, no 1, pp. 83–98, 2008.
A. A. E. Kalam et al., ‘Organization based access control’, in
th International Workshop on Policies for Distributed Systems and
Networks, pp. 120–131, 2003.
A. S. Y. Cheung, ‘Location privacy: The challenges of mobile service
devices’, Computer Law & Security Review, vol. 30, no 1, pp. 41–54,
K. Toumi, C. Andr´es and A. Cavalli, ‘Trust-orBAC: A Trust Access
Control Model in Multi-Organization Environments’, in Information
Systems Security, V. Venkatakrishnan and D. Goswami, ´ Ed. Springer
Berlin Heidelberg, 2012, pp. 89–103.
S. Ruohomaa and L. Kutvonen, ‘Trust management survey’, in Trust
Management, Springer, 2005, pp. 77–92.
Y. E. B. El Idrissi, R. Ajhoun and M. J. Idrissi, ‘Multicriteria-Based
Decision for Services Discovery and Selection’, in Intelligent Interactive
Multimedia Systems and Services, Springer, pp. 41–51, 2010.
G. Is¸iklar and G. B¨uy¨uk¨ozkan, ‘Using a multi-criteria decision making
approach to evaluate mobile phone alternatives’, Computer Standards &
Interfaces, vol. 29, no 2, pp. 265–274, 2007.
M. Maachaoui, ‘S´ecurit´e et performances des r´eseaux de nouvelle
g´en´eration’, 12-juin-2015. [En ligne]. Disponible sur: http://ethesis.inptoulouse.
fr/archive/00002996/.