Safeguarding personal data using trusted computing in pervasive computing

被引:0
|
作者
Hohl, A [1 ]
Zugenmaier, A [1 ]
机构
[1] Univ Freiburg, IIG Telemat, D-7800 Freiburg, Germany
关键词
privacy; policy enforcement; trusted computing; attestation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Pervasive computing can be divided into computing on personal wearable devices and computing in a smart infrastructure. When a wearable device communicates personal data for further processing to the infrastructure, privacy concerns arise. This paper presents an approach to dispel concerns relating to improper use of personal data based on digital rights management technology. A prototype implementation of this approach in a smart hospital environment is described.
引用
收藏
页码:147 / 155
页数:9
相关论文
共 50 条
  • [1] Pervasive Trusted Computing
    Balfe, Shane
    Li, Shiqun
    Zhou, Jianying
    [J]. SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 88 - +
  • [2] Enforcing trust in pervasive computing with trusted computing technology
    Li, Shiqun
    Balfe, Shane
    Zhou, Jianying
    Chen, Kefei
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 195 - +
  • [3] Personal Projectors for Pervasive Computing
    Rukzio, Enrico
    Holleis, Paul
    Gellersen, Hans
    [J]. IEEE PERVASIVE COMPUTING, 2012, 11 (02) : 30 - 37
  • [4] Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme
    Rathee, Geetanjali
    Iqbal, Razi
    Khelifi, Adel
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02): : 2755 - 2769
  • [5] A Study of Trust & Privacy Models in Pervasive Computing Approach to Trusted Computing Platforms
    Khiabani, Hamed
    Ab Manan, Jamalul-Lail
    Sidek, Zailani Mohamed
    [J]. 2009 INTERNATIONAL CONFERENCE FOR TECHNICAL POSTGRADUATES (TECHPOS 2009), 2009, : 140 - +
  • [6] Secure pervasive computing without a Trusted Third Party
    Pirzada, AA
    McDonald, C
    [J]. IEEE/ACS INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2004, : 240 - 240
  • [7] Challenges of Using Trusted Computing for Collaborative Data Processing
    Wagner, Paul Georg
    Birnstill, Pascal
    Beyerer, Juergen
    [J]. SECURITY AND TRUST MANAGEMENT, STM 2019, 2019, 11738 : 107 - 123
  • [8] Rapid trust establishment for pervasive personal computing
    Surie, Ajay
    Perrig, Adrian
    Satyanarayanan, Mahadev
    Farber, David J.
    [J]. IEEE PERVASIVE COMPUTING, 2007, 6 (04) : 24 - 30
  • [9] Enabling Personal Privacy for Pervasive Computing Environments
    Baguees, Susana Alcalde
    Zeidler, Andreas
    Klein, Cornel
    Fernandez Valdivielso, Carlos
    Matias, Ignacio R.
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2010, 16 (03) : 341 - 371
  • [10] Secure data management in trusted computing
    Kühn, U
    Kursawe, K
    Lucks, S
    Sadeghi, AR
    Stüble, C
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2005, PROCEEDINGS, 2005, 3659 : 324 - 338