A novel privacy preserving authentication and access control scheme for pervasive computing environments

被引:74
|
作者
Ren, Kui [1 ]
Lou, Wenjing
Kim, Kwangjo
Deng, Robert
机构
[1] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
[2] Informat & Commun Univ, Taejon 305732, South Korea
[3] Singapore Management Univ, Sch Informat Syst, Singapore 188065, Singapore
关键词
access control; authentication; pervasive computing environments (PCEs); security;
D O I
10.1109/TVT.2006.877704
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Privacy and security are two important but seemingly contradictory objectives in a pervasive computing environment (PCE). On one hand, service providers want to authenticate legitimate users and make sure they are accessing their authorized services in a legal way. On the other hand, users want to maintain the necessary privacy without being tracked down for wherever they are and whatever they are doing. In this paper, a novel privacy preserving authentication and access control scheme to secure the interactions between mobile users and services in PCEs is proposed. The proposed scheme seamlessly integrates two underlying cryptographic primitives, namely blind signature and hash chain, into a highly flexible and lightweight authentication and key establishment protocol. The scheme provides explicit mutual authentication between a user and a service while allowing the user to anonymously interact with the service. Differentiated service access control is also enabled in the proposed scheme by classifying mobile users into different service groups. The correctness of the proposed authentication and key establishment protocol is formally verified based on Burrows-Abadi-Needham logic.
引用
收藏
页码:1373 / 1384
页数:12
相关论文
共 50 条
  • [21] Privacy preserving protocol for pervasive computing
    Guo, Yajun
    He, Yanxiang
    Qi, Mei
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2007, 35 (11): : 103 - 105
  • [22] A flexible, privacy-preserving authentication framework for ubiquitous computing environments
    Al-Muhtadi, J
    Ranganathan, A
    Campbell, R
    Mickunas, MD
    22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, PROCEEDINGS, 2002, : 771 - 776
  • [23] Active Authentication for pervasive computing environments
    Matsumiya, K
    Aoki, S
    Murase, M
    Tokuda, H
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 28 - 41
  • [24] Uncertainty assessment in access control of pervasive computing environments
    Pashazadeh, Saeid
    Dizaji, Mohammad Zendedel
    Amiri, Ali
    2012 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2012, : 1174 - 1179
  • [25] A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing
    Yassin, Ali A.
    Jin, Hai
    Ibrahim, Ayad
    Qiang, Weizhong
    Zou, Deqing
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1210 - 1217
  • [26] Protection of privacy in pervasive computing environments
    Cheng, HS
    Zhang, DQ
    Tan, JG
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 242 - 247
  • [27] Uncertain privacy decision about access personal information in pervasive computing environments
    Zhang, Qingsheng
    Qi, Yong
    Hou, Di
    Zhao, Jizhong
    Han, Huawei
    FOURTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 3, PROCEEDINGS, 2007, : 156 - 160
  • [28] A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing
    Huang, Chanying
    Wei, Songjie
    Yan, Kedong
    Zhang, Gongxuan
    Fu, Anmin
    2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 260 - 265
  • [29] Practical deniable authentication for pervasive computing environments
    Li, Fagen
    Hong, Jiaojiao
    Omala, Anyembe Andrew
    WIRELESS NETWORKS, 2018, 24 (01) : 139 - 149
  • [30] Practical deniable authentication for pervasive computing environments
    Fagen Li
    Jiaojiao Hong
    Anyembe Andrew Omala
    Wireless Networks, 2018, 24 : 139 - 149