Abstract
In this paper an architecture and a protocol for secure and privacy-preserving service usage in smart spaces are presented. Comfort preferences that are defined and stored on end-users mobile devices are subject to negotiations. The approach relies on a single trusted party operating as a public service in the “security infrastructure as a service” model. It is designed to assure resilience against attacks on users privacy from the side of service providers (SPs), user’s attempts to use the services in an unauthorized manner, user’s attempts to violate payment policies, as well as payment authority’s attacks on privacy of users’ payment patterns. From the SP perspective, the proposed approach minimizes the risk of unauthorized service usage, or denial of service attacks. All players benefit from the fast and secure micropayments allowing for pay-per-use model implementation, which is natural in ubiquitous services usage scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Augusto, J.C.: Ambient intelligence: the confluence of ubiquitous/pervasive computing and artificial intelligence. In: Alfons Dr., Schuster J. (eds.) Intelligent Computing Everywhere, pp. 213–234. Springer, Heidelberg (2007)
Brelsford, C.: Other perspectives on ambient intelligence. In: Password, issue 23, Philips Research, Eindhoven (2005)
Bohn, J., Coroamă, V., Langheinrich, M., Matern, F., Rohs, M.: Living in a World of smart everyday objects—social, economic, and ethical implications. In: Journal of Human and Ecological Risk Assessment, vol. 10, issue 5, pp. 763–786. Taylor & Francis (2004)
Marx, G.T.: Murky conceptual waters: the public and the private. In: Ethics and Information Technology, vol. 3, issue 3, pp. 157–169. Springer, Heidelberg (2001)
Čas, J.: Ubiquitous computing, privacy and data protection: options and limitations to reconcile the unprecedented contradictions. In: Gutwirth, S., Poullet, Y., de Hert, P., Leenes, R. (eds.) Computers, Privacy and Data Protection: an Element of Choice, pp. 139–169. Springer, Heidelberg (2011)
Organization for Economic Co-operation and Development: The OECD Privacy Framework, http://www.oecd.org/sti/ieconomy/oecd_privacy_framework.pdf (2013)
European Commission: Attitudes on Data Protection and Electronic Identity in the European Union http://ec.europa.eu/public_opinion/archives/ebs/ebs_359_en.pdf (2011)
Bettini, C., Riboni, D.: Privacy protection in pervasive systems: state of the art and technical challenges. In: Pervasive and Mobile Computing (in press). Elsevier (2014)
Chau, J.C., Little, T.D.C.: Challenges in retaining privacy in smart spaces. In: Procedia Computer Science, vol. 19, pp. 556–564. Elsevier, New York (2013)
Wishart, R., Henricksen, K., Indulska, J.: Context Privacy and obfuscation supported by dynamic context source discovery and processing in a context management system. In: Ubiquitous Intelligence and Computing. LNCS, vol. 4611, pp. 929–940. Springer, Heidelberg (2007)
Sheikh, K., Wagdam, M., van Sinderen, M: Quality-of-context and its use for protecting privacy in context aware systems. In: Journal of Software, vol. 3, pp. 83–93. Academy Publisher, Finland (2008)
Samarati, P.: k-Anonymity. In: Encyclopedia of Cryptography and Security, pp. 663–666. Springer, Heidelberg (2011)
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. In: International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10 Issue 5, pp. 571–588. World Scientific Publishing, New Jersey (2011)
Dwork, C.: Differential privacy. In: Encyclopedia of Cryptography and Security, pp. 338–340. Springer, Heidelberg (2011)
Jung, M., Kienesberger, G., Granzer, W., Unger, M., Kastner, W.: Privacy enabled web service access control using SAML and XACML for home automation gateways. In: IEEE Internet Technology and Secured Transactions (ICITST), pp. 584–591 (2011)
Oyomno, W., Jäppinen, P., Kerttula, E.: Privacy preservation for personalised services in smart spaces. In: IEEE Internet Communications (BCFIC Riga), pp. 181–189 (2011)
Wakeman, I., Chalmers, D., Fry, M.: Reconciling privacy and security in pervasive computing. In: Proceedings of the 5th International Workshop on Middleware for Pervasive and Ad-Hoc Computing: Held at the ACM/IFIP/USENIX (MPAC ‘07), 8th International Middleware Conference, pp. 7–12. ACM (2007)
Wilusz, D., Rykowski, J.: The architecture of coupon-based, semi-off-line, anonymous micropayment system for internet of things. In: Camarinha-Matos, L.M., Tomic, S., Graça, P. (Eds.) Technological Innovation for the Internet of Things. AICT, vol. 394, pp. 125–132. Springer, Heidelberg (2013)
Wilusz, D., Rykowski, J.: Requirements and general architecture of a payment system for the future internet. In: Informatyka Ekonomiczna (Business Informatics), vol. 2, pp. 91–103. Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu, Wrocław (2013)
Acknowledgments
This research work has been supported by the GOLIATH project jointly funded by the Poland NCBR and Luxembourg FNR Lead Agency agreement, under NCBR grant number POLLUX-II/1/2014 and Luxembourg National Research Fund grant number INTER/POLLUX/13/6335765.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Wójtowicz, A., Wilusz, D. (2015). Privacy-Preserving Protocol for Smart Space Services with Negotiable Comfort Preferences. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_25
Download citation
DOI: https://doi.org/10.1007/978-3-319-19713-5_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19712-8
Online ISBN: 978-3-319-19713-5
eBook Packages: EngineeringEngineering (R0)