Context and location-aware encryption for pervasive computing environments

被引:3
|
作者
Al-Muhtadi, J [1 ]
Hill, R
Campbell, R
Mickunas, MD
机构
[1] King Saud Univ, Riyadh 11451, Saudi Arabia
[2] Indiana Univ, Bloomington, IN 47405 USA
[3] Univ Illinois, Champaign, IL 61801 USA
关键词
D O I
10.1109/PERCOMW.2006.33
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the notion of such environments is the capturing of location and context information. Context awareness and validation enables significant functionality to pervasive computing applications, users, resources and the ways they interact. Much of this functionality depends on validating context information and using it for granting access to data or resources. In this paper we propose an encryption and access control framework that uses both context and identity to determine whether an entity or a group of entities may access protected services, data, devices, and other resources. We assume that the resources are context-sensitive, thus requiring the requesting entity to be under a specific context before it is able to access the resource or decrypt the information. Our approach is unique in the way that we de-couple context from identity, which adds extra security, facilitates value-added services, and enables efficient key management for group communication.
引用
收藏
页码:283 / +
页数:2
相关论文
共 50 条
  • [1] AGAPE: a location-aware group membership middleware for pervasive computing environments
    Bottazzi, D
    Corradi, A
    Montanari, R
    [J]. EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATION, VOLS I AND II, PROCEEDINGS, 2003, : 1185 - 1192
  • [2] Location-Aware Middle Agents in Pervasive Computing
    Sashima, Akio
    Izumi, Noriaki
    Kurumatani, Koichi
    [J]. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2007, 2 (02) : 149 - +
  • [3] Location-aware middle agents in pervasive computing
    Sashima, A
    Izumi, N
    Kurumatani, K
    [J]. ICWN'04 & PCC'04, VOLS, 1 AND 2, PROCEEDINGS, 2004, : 820 - 826
  • [4] Privacy in location-aware computing environments
    Anthony, Denise
    Kotz, David
    Henderson, Tristan
    [J]. IEEE PERVASIVE COMPUTING, 2007, 6 (04) : 64 - 72
  • [5] Enabling location-aware pervasive computing applications for the edlerly
    Helal, S
    Winkler, B
    Lee, C
    Kaddoura, Y
    Ran, L
    Giraldo, C
    Kuchibhotla, S
    Mann, W
    [J]. PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM 2003), 2003, : 531 - 536
  • [6] Pervasive Computing Location-aware Model Based on Ontology
    蒲芳
    蔡海滨
    曹奇英
    孙道清
    李彤
    [J]. Journal of Donghua University(English Edition), 2008, (03) : 277 - 281
  • [7] Location-aware private service discovery in pervasive computing environment
    Yu, Chen
    Yao, Dezhong
    Li, Xi
    Zhang, Yan
    Yang, Laurence T.
    Xiong, Naixue
    Jin, Hai
    [J]. INFORMATION SCIENCES, 2013, 230 : 78 - 93
  • [8] An ontology for context-aware pervasive computing environments
    Chen, H
    Finin, T
    Joshi, A
    [J]. KNOWLEDGE ENGINEERING REVIEW, 2003, 18 (03): : 197 - 207
  • [9] Challenges in location-aware computing
    Patterson, CA
    Muntz, RR
    Pancake, CM
    [J]. IEEE PERVASIVE COMPUTING, 2003, 2 (02) : 80 - 89
  • [10] Challenges in location-aware computing
    Patterson, Cynthia A.
    Muntz, Richard R.
    Pancake, Cherri M.
    [J]. IEEE Distributed Systems Online, 2003, 4 (07):