Context and location-aware encryption for pervasive computing environments

被引:3
|
作者
Al-Muhtadi, J [1 ]
Hill, R
Campbell, R
Mickunas, MD
机构
[1] King Saud Univ, Riyadh 11451, Saudi Arabia
[2] Indiana Univ, Bloomington, IN 47405 USA
[3] Univ Illinois, Champaign, IL 61801 USA
关键词
D O I
10.1109/PERCOMW.2006.33
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the notion of such environments is the capturing of location and context information. Context awareness and validation enables significant functionality to pervasive computing applications, users, resources and the ways they interact. Much of this functionality depends on validating context information and using it for granting access to data or resources. In this paper we propose an encryption and access control framework that uses both context and identity to determine whether an entity or a group of entities may access protected services, data, devices, and other resources. We assume that the resources are context-sensitive, thus requiring the requesting entity to be under a specific context before it is able to access the resource or decrypt the information. Our approach is unique in the way that we de-couple context from identity, which adds extra security, facilitates value-added services, and enables efficient key management for group communication.
引用
收藏
页码:283 / +
页数:2
相关论文
共 50 条
  • [41] Context management in pervasive computing environments
    Anagnostopoulos, C
    Tsounis, A
    Hadjiefthymiades, S
    [J]. International Conference on Pervasive Services 2005, Proceedings, 2005, : 421 - 424
  • [42] LA-GPS :: A location-aware geographical pervasive system
    Al Kukhun, Dana
    Soukkarieh, Bouchra
    Lopez-Ornelas, Erick
    Sedes, Florence
    [J]. 2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOP, VOLS 1 AND 2, 2008, : 160 - +
  • [43] Context-Enriched and Location-Aware Services
    Song, MoonBae
    Marreiros, Goreti
    Ko, Hoon
    Choi, Jae-Ho
    [J]. JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2012, 2012
  • [44] Modeling Context Aware Features for Pervasive Computing
    Mcheick, Hamid
    [J]. 5TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS / THE 4TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE / AFFILIATED WORKSHOPS, 2014, 37 : 135 - 142
  • [45] Integrating context-aware pervasive environments
    Khan, Muhammad Taimoor
    Zia, Kashif
    Daudpota, Nadeem
    Hussain, S. A.
    Taimoor, Najma
    [J]. SECOND INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES 2006, PROCEEDINGS, 2006, : 683 - 688
  • [46] Functionality adaptation: A context-aware service code adaptation for pervasive computing environments
    Kwan, VWM
    Lau, FCM
    Wang, CL
    [J]. IEEE/WIC INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, PROCEEDINGS, 2003, : 358 - 364
  • [47] Context-aware Service Composition of Heterogeneous Services in Pervasive Computing Environments: A Review
    Aljawarneh, Mahmoud
    Das Dhomeja, Lachhman
    Malkani, Yasir Arfat
    [J]. PROCEEDINGS OF THE 2016 19TH INTERNATIONAL MULTI-TOPIC CONFERENCE (INMIC), 2016, : 155 - 160
  • [48] Location-aware Task Offloading in Mobile Edge Computing
    Gao, Yongqiang
    Li, Jixiao
    [J]. 2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 660 - 667
  • [49] LocALE:: a Location-Aware Lifecycle Environment for ubiquitous computing
    López-de-Ipiña, D
    Lo, SL
    [J]. 15TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, PROCEEDINGS, 2001, : 419 - 426
  • [50] Location-Aware Data Replication in Cloud Computing Systems
    Al Ridhawi, Ismaeel
    Mostafa, Nour
    Masri, Wassim
    [J]. 2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 20 - 27