Privacy Enhanced Access Control in Pervasive Computing Environments

被引:0
|
作者
Ren, Kui [1 ]
Lou, Wenjing [1 ]
机构
[1] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authenticate service users and make sure they are accessing only authorized services in a legitimate way. On the other hand, users want to maintain necessary privacy without being tracked down for wherever they are and whatever they are doing. In this paper we propose a novel privacy enhanced authentication and access control scheme to secure the interactions between mobile users and services in PCEs. The proposed scheme seamlessly integrates two underlying cryptographic primitives, blind signature and hash chain, into a highly flexible and lightweight authentication and key establishment protocol. It provides explicit mutual authentication between a user and a service, while allowing the user to anonymously interact with the service. Differentiated service access control is also enabled in the proposed scheme by classifying mobile users into different service groups.
引用
收藏
页码:384 / +
页数:10
相关论文
共 50 条
  • [21] A Context-Aware Access Control Model for Pervasive Computing in Enterprise Environments
    Zhu, Zhou
    Xu, Renzuo
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4572 - 4577
  • [22] Privacy Aware Access Control for Data Sharing in Cloud Computing Environments
    Takabi, Hassan
    [J]. SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 27 - 34
  • [23] Enforcing Privacy as Access Control in a Pervasive Context
    Faravelon, Aurelien
    Chollet, Stephanie
    Verdier, Christine
    Front, Agnes
    [J]. 2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 380 - 384
  • [24] Pervasive data access in wireless and mobile computing environments
    Lee, Ken C. K.
    Lee, Wang-Chien
    Madria, Sanjay
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (01): : 25 - 44
  • [25] Authentication-based access control approach for enhancing security in pervasive computing environments
    Gnaneshwari, G. R.
    Hema, M. S.
    Lingareddy, S. C.
    [J]. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 211 - 232
  • [26] An authorization and access control scheme for pervasive computing
    Staffans, LA
    Saridakis, T
    [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2004, : 726 - 733
  • [27] Security and privacy information technologies and applications for wireless pervasive computing environments
    Wang, Shiuh-Jeng
    Liu, Jigang
    Shon, Taeshik
    Vaidya, Binod
    Chen, Yeong-Sheng
    [J]. INFORMATION SCIENCES, 2015, 321 : 147 - 149
  • [28] User Access of Public Shared Devices in Pervasive Computing Environments
    Jea, David
    Yap, Ian
    Srivastava, Mani
    [J]. 2007 JOINT WORKSHOP ON HIGH CONFIDENCE MEDICAL DEVICES, SOFTWARE AND SYSTEMS AND MEDICAL DEVICE PLUG-AND PLAY INTEROPERABILITY, 2007, : 57 - 63
  • [29] A Semantic-Aware Role-Based Access Control Model for Pervasive Computing Environments
    Javadi, Seyyed Ahmad
    Amini, Morteza
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 5 (02): : 119 - 140
  • [30] Location privacy in pervasive computing
    Beresford, AR
    Stajano, F
    [J]. IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 46 - 55