A Privacy-Aware Service Discovery Middleware for Pervasive Environments

  • Roberto Speicys Cardoso
  • Pierre-Guillaume Raverdy
  • Valérie Issarny
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 238)


Pervasive environments are composed of devices with particular hardware characteristics, running various software and connected to diverse networks. In such environments, heterogeneous devices must cooperate to offer meaningful services to users, regardless of technological choices such as service discovery and access protocols. Interoperability thus is a critical issue for the success of pervasive computing. In this context, we have previously introduced the MUSDAC middleware for interoperable service discovery and access across heterogeneous networks. Still, data exchanged in pervasive environments may be sensitive, and as service information is forwarded to unknown or untrusted networks, privacy issues arise. In this paper we present a privacy-aware solution for service discovery in heterogeneous networks, based on the MUSDAC platform. Specifically, we discuss privacy issues that arise during service discovery and mechanisms to control disclosure of private information contained in service-related data


Service Request Service Discovery Pervasive Computing Service Description Optimize Link State Route 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    J. Allard, V. Chinta, S. Gundala, and G. G. Richard III. Jini Meets UPnP: An Architecture for Jini/UPnP Interoperability. In SAINT’ 03: Proceedings of the 2003 Symposium on Applications and the Internet, January 2003.Google Scholar
  2. 2.
    Y.-D. Bromberg and V. Issarny. INDISS: Interoperable Discovery System for Networked Services. In Proceedings of the 6th International Middleware Conference, November 2005.Google Scholar
  3. 3.
    L. Capra, S. Zachariadis, and C. Mascolo. Q-CAD: QoS and Context Aware Discovery Framework for Mobile Systems. In Proceedings of the International Conference on Pervasive Services (ICPS’05), July 2005.Google Scholar
  4. 4.
    A. Carzaniga and A. L. Wolf. Content-Based Networking: A New Communication Infrastructure. In IMWS’ 01: Revised Papers from the NSF Workshop on Developing an Infrastructure for Mobile and Wireless Systems, October 2001.Google Scholar
  5. 5.
    D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24(2), February 1981.Google Scholar
  6. 6.
    R. Dingledine, N. Mathewson, and P. Syverson. Tor: The Second-Generation Onion Router. In Proceedings of the 13th USENIX, August 2004.Google Scholar
  7. 7.
    A. Friday, N. Davies, N. Wallbank, E. Catterall, and S. Pink. Supporting Service Discovery, Querying and Interaction in Ubiquitous Computing Environments. ACM Baltzer Wireless Networks (WINET) Special Issue on Pervasive Computing and Communications, 10(6), November 2004.Google Scholar
  8. 8.
    P. Jacquet, P. Mühlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot. Optimized Link State Routing Protocol for Ad Hoc Networks. In Proceedings of IEEE INMIC 2001, December 2001.Google Scholar
  9. 9.
    C. Lee and S. Helal. Context Attributes: An Approach to Enable Contextawareness for Service Discovery. In SAINT’ 03: Proceedings of the 2003 Symposium on Applications and the Internet, January 2003.Google Scholar
  10. 10.
    S. Ben Mokhtar, A. Kaul, N. Georgantas, and V. Issarny. Efficient Semantic Service Discovery in Pervasive Computing Environments. In Proceedings of the 7th International Middleware Conference (Middleware’ 06), December 2006.Google Scholar
  11. 11.
    A. Pfitzmann and M. Köhntopp. Anonymity, Unobservability, and Pseudonymity — A Proposal for Terminology. In International Workshop on Designing Privacy Enhancing Technologies, July 2000.Google Scholar
  12. 12.
    P.-G. Raverdy, S. Armand, and V. Issarny. Scalability Study of the MUSDAC Platform for Service Discovery in B3G Networks. In Proceedings of Wireless World Research Forum Meeting (WWRF-17), November 2006.Google Scholar
  13. 13.
    P.-G. Raverdy, V. Issarny, R. Chibout, and A. de La Chapelle. A Multi-Protocol Approach to Service Discovery and Access in Pervasive Environments. In Proceedings of MOBIQUITOUS — The 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networks and Services, July 2006.Google Scholar
  14. 14.
    P.-G. Raverdy, O. Riva, A. de La Chapelle, R. Chibout, and V. Issarny. Efficient Context-Aware Service Discovery in Multi-Protocol Pervasive Environments. In Proceedings of the 1th International Conference on Mobile Data Management (MDM’06), May 2006.Google Scholar
  15. 15.
    M. J. Wiener. Performance Comparison of Public-Key Cryptosystems. RSA Laboratories’ CryptoBytes, 4(1), July 1998.Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Roberto Speicys Cardoso
    • 1
  • Pierre-Guillaume Raverdy
    • 1
  • Valérie Issarny
    • 1
  1. 1.Inria RocquencourtLe ChesnayFrance

Personalised recommendations