A novel privacy preserving authentication and access control scheme for pervasive computing environments

被引:74
|
作者
Ren, Kui [1 ]
Lou, Wenjing
Kim, Kwangjo
Deng, Robert
机构
[1] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
[2] Informat & Commun Univ, Taejon 305732, South Korea
[3] Singapore Management Univ, Sch Informat Syst, Singapore 188065, Singapore
关键词
access control; authentication; pervasive computing environments (PCEs); security;
D O I
10.1109/TVT.2006.877704
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Privacy and security are two important but seemingly contradictory objectives in a pervasive computing environment (PCE). On one hand, service providers want to authenticate legitimate users and make sure they are accessing their authorized services in a legal way. On the other hand, users want to maintain the necessary privacy without being tracked down for wherever they are and whatever they are doing. In this paper, a novel privacy preserving authentication and access control scheme to secure the interactions between mobile users and services in PCEs is proposed. The proposed scheme seamlessly integrates two underlying cryptographic primitives, namely blind signature and hash chain, into a highly flexible and lightweight authentication and key establishment protocol. The scheme provides explicit mutual authentication between a user and a service while allowing the user to anonymously interact with the service. Differentiated service access control is also enabled in the proposed scheme by classifying mobile users into different service groups. The correctness of the proposed authentication and key establishment protocol is formally verified based on Burrows-Abadi-Needham logic.
引用
下载
收藏
页码:1373 / 1384
页数:12
相关论文
共 50 条
  • [31] Private entity authentication for pervasive computing environments
    Zhu, Feng
    Mutka, Matt W.
    Ni, Lionel M.
    International Journal of Network Security, 2012, 14 (02) : 86 - 100
  • [32] Authentication and access control using trust collaboration in pervasive grid environments
    Saadi, Rachid
    Pierson, Jean Marc
    Brunie, Lionel
    ADVANCES IN GRID AND PERVASIVE COMPUTING, PROCEEDINGS, 2007, 4459 : 348 - +
  • [33] Access control for security and privacy in ubiquitous computing environments
    Yamada, S
    Kamioka, E
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 846 - 856
  • [34] Privacy in pervasive computing environments - A contradiction in terms?
    Cas, J
    IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2005, 24 (01) : 24 - 33
  • [35] Enabling Personal Privacy for Pervasive Computing Environments
    Baguees, Susana Alcalde
    Zeidler, Andreas
    Klein, Cornel
    Fernandez Valdivielso, Carlos
    Matias, Ignacio R.
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2010, 16 (03) : 341 - 371
  • [36] Identity-Based Inter-domain Authentication Scheme in Pervasive Computing Environments
    Huo, Shi-Wei
    Luo, Chang-Yuan
    Xin, Hong-Zhi
    INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT II, 2011, 135 : 314 - 320
  • [37] Cloud Computing: Preserving Data Privacy and Managing Access Control
    Giweli, Nabil
    Shahrestani, Seyed
    Cheung, Hon
    INNOVATION VISION 2020: SUSTAINABLE GROWTH, ENTREPRENEURSHIP, AND ECONOMIC DEVELOPMENT, VOLS 1-4, 2012, : 1742 - 1748
  • [38] A survey of privacy-preserving access control in cloud computing
    Li, Hongjiao, 1600, Binary Information Press (10):
  • [39] An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services
    Xiong, Ling
    Li, Fagen
    He, Mingxing
    Liu, Zhicai
    Peng, Tu
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2309 - 2323
  • [40] Preserving Location Privacy in the Modern Era of Pervasive Environments
    Nicewaner, Tyler
    Yu, Alian
    Jiang, Wei
    Lin, Dan
    2023 5TH IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS, TPS-ISA, 2023, : 44 - 51