Privacy Enhanced Access Control in Pervasive Computing Environments

被引:0
|
作者
Ren, Kui [1 ]
Lou, Wenjing [1 ]
机构
[1] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authenticate service users and make sure they are accessing only authorized services in a legitimate way. On the other hand, users want to maintain necessary privacy without being tracked down for wherever they are and whatever they are doing. In this paper we propose a novel privacy enhanced authentication and access control scheme to secure the interactions between mobile users and services in PCEs. The proposed scheme seamlessly integrates two underlying cryptographic primitives, blind signature and hash chain, into a highly flexible and lightweight authentication and key establishment protocol. It provides explicit mutual authentication between a user and a service, while allowing the user to anonymously interact with the service. Differentiated service access control is also enabled in the proposed scheme by classifying mobile users into different service groups.
引用
收藏
页码:384 / +
页数:10
相关论文
共 50 条
  • [1] A novel privacy preserving authentication and access control scheme for pervasive computing environments
    Ren, Kui
    Lou, Wenjing
    Kim, Kwangjo
    Deng, Robert
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2006, 55 (04) : 1373 - 1384
  • [2] SCN-SI-021 Achieving privacy and access control in pervasive computing environments
    Magkos, Emmanouil
    Kotzanikolaou, Panayiotis
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (02) : 94 - 105
  • [3] Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability
    Ren, Kui
    Lou, Wenjing
    [J]. MOBILE NETWORKS & APPLICATIONS, 2007, 12 (01): : 79 - 92
  • [4] Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability
    Kui Ren
    Wenjing Lou
    [J]. Mobile Networks and Applications, 2007, 12 : 79 - 92
  • [5] A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments
    Tan, Zuowen
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 1839 - 1846
  • [6] Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments
    Li, Chun-Ta
    Hwang, Min-Shiang
    Chu, Yen-Ping
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4255 - 4258
  • [7] Uncertainty assessment in access control of pervasive computing environments
    Pashazadeh, Saeid
    Dizaji, Mohammad Zendedel
    Amiri, Ali
    [J]. 2012 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2012, : 1174 - 1179
  • [8] Protection of privacy in pervasive computing environments
    Cheng, HS
    Zhang, DQ
    Tan, JG
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 242 - 247
  • [9] Uncertain privacy decision about access personal information in pervasive computing environments
    Zhang, Qingsheng
    Qi, Yong
    Hou, Di
    Zhao, Jizhong
    Han, Huawei
    [J]. FOURTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 3, PROCEEDINGS, 2007, : 156 - 160
  • [10] Access control for security and privacy in ubiquitous computing environments
    Yamada, S
    Kamioka, E
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 846 - 856