Privacy-Preserving Protocol for Smart Space Services with Negotiable Comfort Preferences

被引:1
|
作者
Wojtowicz, Adam [1 ]
Wilusz, Daniel [1 ]
机构
[1] Poznan Univ Econ, Dept Informat Technol, Poznan, Poland
关键词
User privacy; Smart spaces; Communication protocol;
D O I
10.1007/978-3-319-19713-5_25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper an architecture and a protocol for secure and privacy-preserving service usage in smart spaces are presented. Comfort preferences that are defined and stored on end-users mobile devices are subject to negotiations. The approach relies on a single trusted party operating as a public service in the "security infrastructure as a service" model. It is designed to assure resilience against attacks on users privacy from the side of service providers (SPs), user's attempts to use the services in an unauthorized manner, user's attempts to violate payment policies, as well as payment authority's attacks on privacy of users' payment patterns. From the SP perspective, the proposed approach minimizes the risk of unauthorized service usage, or denial of service attacks. All players benefit from the fast and secure micropayments allowing for pay-per-use model implementation, which is natural in ubiquitous services usage scenarios.
引用
收藏
页码:285 / 295
页数:11
相关论文
共 50 条
  • [41] Privacy-Preserving Data Mining for Smart Manufacturing
    Hu, Qianyu
    Chen, Ruimin
    Yang, Hui
    Kumara, Soundar
    SMART AND SUSTAINABLE MANUFACTURING SYSTEMS, 2020, 4 (02): : 99 - 120
  • [42] Computation of privacy-preserving prices in smart grids
    Koufogiannis, Fragkiskos
    Han, Shuo
    Pappas, George J.
    2014 IEEE 53RD ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2014, : 2142 - 2147
  • [43] Privacy-Preserving Protocol for Epidemiology in Effect of Radiation
    Kikuchi, Hiroaki
    Sato, Tomoki
    Sakuma, Jun
    2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 831 - 836
  • [44] Privacy-Preserving Protocol for Data Stored in the Cloud
    Hongyi Su Geng Yang Dawei Li (College of Computer Science
    ZTE Communications, 2011, 9 (02) : 36 - 38
  • [45] Efficient Privacy-Preserving Face Identification Protocol
    Huang, Hai
    Wang, Luyao
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 2632 - 2641
  • [46] Privacy-preserving Practical Convex Hulls Protocol
    Zhu, Youwen
    Huang, Liusheng
    Yang, Wei
    Chen, Zhili
    Li, Lingjun
    Yu, Zhenshan
    Luo, Yonglong
    FCST: 2008 JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2008, : 10 - 16
  • [47] An Efficient Privacy-preserving Authentication Protocol in VANETs
    Zhang, Jianhong
    Zhen, Weina
    Xu, Min
    2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 272 - 277
  • [48] A protocol for privacy-preserving closest pair of points
    Liu, Jie
    Yang, Bo
    Pang, Xiaoqiong
    Liu, J. (jessica.lyh66@gmail.com), 2013, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09): : 6945 - 6953
  • [49] Strongly Privacy-Preserving Communication Protocol for VANETs
    Fan, Chun-I
    Sun, Wei-Zhe
    Huang, Shih-Wei
    Juang, Wen-Shenq
    Huang, Jheng-Jia
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 119 - 126
  • [50] A Lightweight Privacy-Preserving Authentication Protocol for VANETs
    Li, Xiong
    Liu, Tian
    Obaidat, Mohammad S.
    Wu, Fan
    Vijayakumar, Pandi
    Kumar, Neeraj
    IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3547 - 3557