Skip to main content

Secure Identity Management for Pseudo-Anonymous Service Access

  • Conference paper
Security in Pervasive Computing (SPC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3450))

Included in the following conference series:

Abstract

In this paper, we propose an architecture to enable service providers personalise services in a pervasive environment, while minimising risks to users’ privacy. We describe the design of two critical parts of such systems: a mechanism forr defining authenticated personas that can be pseudonymous; and mechanisms for users to share such personas with service providers. A trust-based approach supports decisions about accepting personas. We describe a prototype implementation and performance evaluations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jiang, X., Landay, J.A.: Modeling Privacy Control in Context-Aware Systems. IEEE Pervasive Computing 1(3), 59–63 (2002)

    Article  Google Scholar 

  2. Myles, G., Friday, A., Davies, N.: Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computing 2(1), 56–64 (2003)

    Article  Google Scholar 

  3. Beresford, A., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1), 46–55 (2003)

    Article  Google Scholar 

  4. Hengartner, U., Steenkiste, P.: Access Control to Information in Pervasive Computing Environments. In: Ninth Workshop on Hot Topics in Operating Systems (HotOS IX). ACM, New York (2003)

    Google Scholar 

  5. Ishitani, I., Almedia, V., Meira, W.: Masks: Bringing Anonymity and Personalisation Together. IEEE Pervasive Computing 2(2), 18–23 (2003)

    Google Scholar 

  6. Goldberg, A.: A Pseudonymous Communications Infrastructure for the Internet, PhD Thesis, University of California at Berkely (2000)

    Google Scholar 

  7. Vinge, V.: True Names, Dell Books (1981)

    Google Scholar 

  8. Campbell, R.H., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards security and privacy for pervasive computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 1–15. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Rao, J., Rohatgi, P.: Can Pseudonymity Really Guarantee Privacy? In: 9th USENIX Security Symposium, Denver, USA (August 2000), pp. 85–96.

    Google Scholar 

  10. Kay, J., Kummerfeld, R.J., Lauder, P.: Personis: a server for user models. In: De Bra, P., Brusilovsky, P., Conejo, R. (eds.) Proceedings of AH 2002, Adaptive Hypertext 2002, pp. 203–212. Springer, Heidelberg (2002)

    Google Scholar 

  11. Kobsa, A., Schreck, J.: Privacy through Pseudonymity in User-Adaptive Systems. ACM Transactions on Internet Technology 3(2), 149–183 (2003)

    Article  Google Scholar 

  12. Kobsa, A.: A Taxonomy of Beliefs and Goals for User Models in Dialog Systems. In: Kobsa, A., Wahlster, W. (eds.) User Models in Dialog Systems. Springer Symbolic Computation, New York (1989)

    Google Scholar 

  13. Kobsa, A.: Generic User Modeling Systems. User Modeling and User-Adapted Interaction 11(1-2), 49–63 (2001)

    Article  MATH  Google Scholar 

  14. Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  15. Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing 2(1), 56–64 (2003)

    Article  Google Scholar 

  16. Pfitzmann, A., Hansen, M.: Anonymity, Unobservability, Pseudonymity and Identity Management – A Proposal for Terminology, http://www.freehaven.net/anonbib/cache/terminology.pdf

  17. Hitchens, M., Kay, J., Kummerfeld, R.J.: School of Information Technologies, Secure identity management for pseudo-anonymous service access. TR 546 School of Information Technologies, University of Sydney (June 2004)

    Google Scholar 

  18. Brar, A., Kay, J.: Privacy and Security in Ubiquitous Personalized Applications. TR 561. School of Information Technologies, University of Sydney (November 2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hitchens, M., Kay, J., Kummerfeld, B., Brar, A. (2005). Secure Identity Management for Pseudo-Anonymous Service Access. In: Hutter, D., Ullmann, M. (eds) Security in Pervasive Computing. SPC 2005. Lecture Notes in Computer Science, vol 3450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-32004-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-32004-3_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25521-5

  • Online ISBN: 978-3-540-32004-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics