Secure service publishing with untrusted registries

被引:0
|
作者
Trabelsi, Slim [1 ]
Roudier, Yves [1 ]
机构
[1] Inst Eurecom, F-06904 Sophia Antipolis, France
关键词
security; service discovery; attribute based encryption; trust; privacy; untrusted registry;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Service Discovery becomes an essential phase during the service deployment in Ubiquitous system. Applications and services tend to be more dynamic and flexible. Users need to adapt in order to locate these pervasive applications. Service mobility introduces new security challenges relating to trust and privacy. Existing solutions to secure the service discovery cannot provide any solution without relying on a trusted third party. In this paper we purport,to use Attribute Based Encryption so as to protect the publishing and binding messages with untrusted registries.
引用
收藏
页码:175 / 179
页数:5
相关论文
共 50 条
  • [1] Secure Web Service Composition with Untrusted Broker
    Carminati, Barbara
    Ferrari, Elena
    Ngoc Hong Tran
    2014 IEEE 21ST INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2014), 2014, : 137 - 144
  • [2] Secure Proximity-Based Identity Pairing using an Untrusted Signalling Service
    Panton, Tim
    Llewellyn-Jones, David
    Shone, Nathan
    Eiza, Mahmoud Hashem
    2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
  • [3] Secure Outsourced Skyline Query Processing via Untrusted Cloud Service Providers
    Chen, Wenxin
    Liu, Mengjun
    Zhang, Rui
    Zhang, Yanchao
    Liu, Shubo
    IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,
  • [4] A Secure Duplicate Data Sharing Method against Untrusted Cloud Service Provider
    Wang, Jiawei
    He, Junjiang
    Li, Wenshan
    Lan, Xiaolong
    Liu, Qian
    Li, Tao
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 352 - 359
  • [5] Secure untrusted binaries - Provably!
    Winwood, S
    Chakravarty, MMT
    FORMAL ASPECTS IN SECURITY AND TRUST, 2006, 3866 : 171 - 186
  • [6] Secure untrusted data repository (SUNDR)
    Li, JY
    Krohn, M
    Mazières, D
    Shasha, D
    USENIX ASSOCIATION PROCEEDINGS OF THE SIXTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDE '04), 2004, : 121 - 136
  • [7] Secure isolation of untrusted legacy applications
    Potter, Shaya
    Nieh, Jason
    Selsky, Matt
    USENIX ASSOCIATION PROCEEDING OF THE 21ST LARGE INSTALLATION SYSTEMS ADMINISTRATION CONFERENCE, 2007, : 117 - 130
  • [8] Secure execution of computations in untrusted hosts
    Narayanan, S. H. K.
    Kandemir, M. T.
    Brooks, R. R.
    Kolcu, I.
    RELIABLE SOFTWARE TECHNOLOGIES - ADA - EUROPE 2006, PROCEEDINGS, 2006, 4006 : 106 - 118
  • [9] Secure Online Banking on Untrusted Computers
    Peng, Yanlin
    Chen, Wenji
    Chang, J. Morris
    Guan, Youg
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 720 - 722
  • [10] Secure and sustainable benchmarking in clouds: A multi-party cloud application with an untrusted service provider
    Kerschbaum F.
    Business & Information Systems Engineering, 2011, 3 (3) : 135 - 143