Skip to main content

Privacy-Preserving Protocol for Smart Space Services with Negotiable Comfort Preferences

  • Conference paper
  • First Online:
International Joint Conference (CISIS 2015)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 369))

Abstract

In this paper an architecture and a protocol for secure and privacy-preserving service usage in smart spaces are presented. Comfort preferences that are defined and stored on end-users mobile devices are subject to negotiations. The approach relies on a single trusted party operating as a public service in the “security infrastructure as a service” model. It is designed to assure resilience against attacks on users privacy from the side of service providers (SPs), user’s attempts to use the services in an unauthorized manner, user’s attempts to violate payment policies, as well as payment authority’s attacks on privacy of users’ payment patterns. From the SP perspective, the proposed approach minimizes the risk of unauthorized service usage, or denial of service attacks. All players benefit from the fast and secure micropayments allowing for pay-per-use model implementation, which is natural in ubiquitous services usage scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Augusto, J.C.: Ambient intelligence: the confluence of ubiquitous/pervasive computing and artificial intelligence. In: Alfons Dr., Schuster J. (eds.) Intelligent Computing Everywhere, pp. 213–234. Springer, Heidelberg (2007)

    Google Scholar 

  2. Brelsford, C.: Other perspectives on ambient intelligence. In: Password, issue 23, Philips Research, Eindhoven (2005)

    Google Scholar 

  3. Bohn, J., Coroamă, V., Langheinrich, M., Matern, F., Rohs, M.: Living in a World of smart everyday objects—social, economic, and ethical implications. In: Journal of Human and Ecological Risk Assessment, vol. 10, issue 5, pp. 763–786. Taylor & Francis (2004)

    Google Scholar 

  4. Marx, G.T.: Murky conceptual waters: the public and the private. In: Ethics and Information Technology, vol. 3, issue 3, pp. 157–169. Springer, Heidelberg (2001)

    Google Scholar 

  5. Čas, J.: Ubiquitous computing, privacy and data protection: options and limitations to reconcile the unprecedented contradictions. In: Gutwirth, S., Poullet, Y., de Hert, P., Leenes, R. (eds.) Computers, Privacy and Data Protection: an Element of Choice, pp. 139–169. Springer, Heidelberg (2011)

    Google Scholar 

  6. Organization for Economic Co-operation and Development: The OECD Privacy Framework, http://www.oecd.org/sti/ieconomy/oecd_privacy_framework.pdf (2013)

  7. European Commission: Attitudes on Data Protection and Electronic Identity in the European Union http://ec.europa.eu/public_opinion/archives/ebs/ebs_359_en.pdf (2011)

  8. Bettini, C., Riboni, D.: Privacy protection in pervasive systems: state of the art and technical challenges. In: Pervasive and Mobile Computing (in press). Elsevier (2014)

    Google Scholar 

  9. Chau, J.C., Little, T.D.C.: Challenges in retaining privacy in smart spaces. In: Procedia Computer Science, vol. 19, pp. 556–564. Elsevier, New York (2013)

    Google Scholar 

  10. Wishart, R., Henricksen, K., Indulska, J.: Context Privacy and obfuscation supported by dynamic context source discovery and processing in a context management system. In: Ubiquitous Intelligence and Computing. LNCS, vol. 4611, pp. 929–940. Springer, Heidelberg (2007)

    Google Scholar 

  11. Sheikh, K., Wagdam, M., van Sinderen, M: Quality-of-context and its use for protecting privacy in context aware systems. In: Journal of Software, vol. 3, pp. 83–93. Academy Publisher, Finland (2008)

    Google Scholar 

  12. Samarati, P.: k-Anonymity. In: Encyclopedia of Cryptography and Security, pp. 663–666. Springer, Heidelberg (2011)

    Google Scholar 

  13. Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. In: International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10 Issue 5, pp. 571–588. World Scientific Publishing, New Jersey (2011)

    Google Scholar 

  14. Dwork, C.: Differential privacy. In: Encyclopedia of Cryptography and Security, pp. 338–340. Springer, Heidelberg (2011)

    Google Scholar 

  15. Jung, M., Kienesberger, G., Granzer, W., Unger, M., Kastner, W.: Privacy enabled web service access control using SAML and XACML for home automation gateways. In: IEEE Internet Technology and Secured Transactions (ICITST), pp. 584–591 (2011)

    Google Scholar 

  16. Oyomno, W., Jäppinen, P., Kerttula, E.: Privacy preservation for personalised services in smart spaces. In: IEEE Internet Communications (BCFIC Riga), pp. 181–189 (2011)

    Google Scholar 

  17. Wakeman, I., Chalmers, D., Fry, M.: Reconciling privacy and security in pervasive computing. In: Proceedings of the 5th International Workshop on Middleware for Pervasive and Ad-Hoc Computing: Held at the ACM/IFIP/USENIX (MPAC ‘07), 8th International Middleware Conference, pp. 7–12. ACM (2007)

    Google Scholar 

  18. Wilusz, D., Rykowski, J.: The architecture of coupon-based, semi-off-line, anonymous micropayment system for internet of things. In: Camarinha-Matos, L.M., Tomic, S., Graça, P. (Eds.) Technological Innovation for the Internet of Things. AICT, vol. 394, pp. 125–132. Springer, Heidelberg (2013)

    Google Scholar 

  19. Wilusz, D., Rykowski, J.: Requirements and general architecture of a payment system for the future internet. In: Informatyka Ekonomiczna (Business Informatics), vol. 2, pp. 91–103. Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu, Wrocław (2013)

    Google Scholar 

Download references

Acknowledgments

This research work has been supported by the GOLIATH project jointly funded by the Poland NCBR and Luxembourg FNR Lead Agency agreement, under NCBR grant number POLLUX-II/1/2014 and Luxembourg National Research Fund grant number INTER/POLLUX/13/6335765.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adam Wójtowicz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Wójtowicz, A., Wilusz, D. (2015). Privacy-Preserving Protocol for Smart Space Services with Negotiable Comfort Preferences. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19713-5_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19712-8

  • Online ISBN: 978-3-319-19713-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics