Privacy Enhanced Access Control in Pervasive Computing Environments

被引:0
|
作者
Ren, Kui [1 ]
Lou, Wenjing [1 ]
机构
[1] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authenticate service users and make sure they are accessing only authorized services in a legitimate way. On the other hand, users want to maintain necessary privacy without being tracked down for wherever they are and whatever they are doing. In this paper we propose a novel privacy enhanced authentication and access control scheme to secure the interactions between mobile users and services in PCEs. The proposed scheme seamlessly integrates two underlying cryptographic primitives, blind signature and hash chain, into a highly flexible and lightweight authentication and key establishment protocol. It provides explicit mutual authentication between a user and a service, while allowing the user to anonymously interact with the service. Differentiated service access control is also enabled in the proposed scheme by classifying mobile users into different service groups.
引用
收藏
页码:384 / +
页数:10
相关论文
共 50 条
  • [41] Privacy enhanced access control by SPKI
    Saito, T
    Umesawa, K
    Okuno, HG
    [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS: WORKSHOPS, PROCEEDINGS, 2000, : 301 - 306
  • [42] Coordination in pervasive computing environments
    Ferscha, A
    [J]. TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 3 - 9
  • [43] On Modeling for Pervasive Computing Environments
    Campiolo, Rodrigo
    Cremer, Vivian
    Sobral, Joao Bosco M.
    [J]. MSWIM'07: PROCEEDINGS OF THE TENTH ACM SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, 2007, : 240 - 243
  • [44] Privacy in pervasive computing and open issues
    Bhaskar, Pankaj
    Ahamed, Sheikh I.
    [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 147 - +
  • [45] Privacy: The Achilles heel of pervasive computing?
    Satyanarayanan, M
    [J]. IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 2 - 3
  • [46] Survey on location privacy in pervasive computing
    Görlach, A
    Heinemann, A
    Terpstra, WW
    [J]. PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING, 2005, 780 : 23 - 34
  • [47] Spatial Connector: Mapping Access Control Models for Pervasive Computing and Cloud Computing
    Satoh, Ichiro
    [J]. 14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS, 2017, 110 : 174 - 181
  • [48] Towards security and privacy for pervasive computing
    Campbell, R
    Al-Muhtadi, J
    Naldurg, P
    Sampemane, G
    Mickunas, MD
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 1 - 15
  • [49] Pervasive Computing, Privacy and Distribution of the Self
    Hongladarom, Soraj
    [J]. INFORMATION, 2011, 2 (02): : 360 - 371
  • [50] Distributed Trust Based Access Control Architecture for Pervasive Computing
    Javeed, M. Younas
    Nawaz, Sidra
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), 2009, : 464 - 469