A flexible, privacy-preserving authentication framework for ubiquitous computing environments

被引:27
|
作者
Al-Muhtadi, J [1 ]
Ranganathan, A [1 ]
Campbell, R [1 ]
Mickunas, MD [1 ]
机构
[1] Univ Illinois, Dept Comp Sci, Urbana, IL 61801 USA
关键词
ubiquitous computing; security; authentication; context-awareness; privacy; mist;
D O I
10.1109/ICDCSW.2002.1030861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into "Active Information Spaces" augmented with intelligence and enhanced with services. This new exciting computing paradigm promises to revolutionize the way we interact with computers, services, and the surrounding physical spaces, yielding higher productivity and more seamless interaction between users and computing services. However, the deployment of this computing paradigm in real-life is hindered by poor security, particularly, the lack of proper authentication and access Control techniques and privacy presenting protocols. We propose an authentication framework that addresses this problem through the use of different wearable and embedded devices. These devices authenticate entities with varied levels of confidence, in a transparent, convenient, and private manner, allowing the framework to blend nicely into ubiquitous computing environments.
引用
收藏
页码:771 / 776
页数:6
相关论文
共 50 条
  • [1] A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments
    Kim, Jangseong
    Baek, Joonsang
    Kim, Kwangjo
    Zhou, Jianying
    [J]. PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2011, 6711 : 45 - +
  • [2] A PRIVACY-PRESERVING AUTHENTICATION SCHEME USING BIOMETRICS FOR PERVASIVE COMPUTING ENVIRONMENTS
    Yao Lin Kong Xiangwei Wu Guowei Fan Qingna Lin Chi(School of Electronics & Information Engineering
    [J]. Journal of Electronics(China), 2010, 27 (01) : 68 - 78
  • [3] A Privacy-Preserving Roaming Authentication Scheme for Ubiquitous Networks
    Zhou, You-sheng
    Zhou, Jun-feng
    Wang, Feng
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 463 - 471
  • [4] Privacy-preserving ID-based service provision in ubiquitous computing environments
    Lee, KM
    Lee, SH
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2004: OTM 2004 WORKSHOPS, PROCEEDINGS, 2004, 3292 : 21 - 22
  • [5] Flexible and Robust Privacy-Preserving Implicit Authentication
    Domingo-Ferrer, Josep
    Wu, Qianhong
    Blanco-Justicia, Alberto
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 18 - 34
  • [6] A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments
    Tan, Zuowen
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 1839 - 1846
  • [7] A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing
    Yassin, Ali A.
    Jin, Hai
    Ibrahim, Ayad
    Qiang, Weizhong
    Zou, Deqing
    [J]. 2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1210 - 1217
  • [8] A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing
    Kaur, Kuljeet
    Garg, Sahil
    Kaddoum, Georges
    Guizani, Mohsen
    Jayakody, Dushantha Nalin K.
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [9] Ninja: Non identity based, privacy preserving authentication for ubiquitous environments
    Leung, Adrian
    Mitchell, Chris J.
    [J]. UBICOMP 2007: UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4717 : 73 - +
  • [10] Privacy-Preserving Implicit Authentication
    Safa, Nashad Ahmed
    Safavi-Naini, Reihaneh
    Shahandashti, Siamak F.
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 471 - 484