Abstract
Recent widespread deployment of different types of sensors and detectors has opened the door to a new way of understanding collaborative applications. The use of such devices allows information to be collected, used and disclosed on a massive scale and under very different conditions from which we are currently familiar with. Despite the huge potential of these collaborative environments, privacy is one of their most criticized aspects and probably the greatest barrier to their long-term success. To address this problem, we present a privacy-enhancing security model specifically tailored to the characteristics of ubiquitous and heterogeneous environments consisting of low capacity devices. This security model is based on the Kerberos symmetric key protocol which has been modified and extended to avoid using timestamps and to accomplish the authorization process. Finally, we present a validation of our proposal using an automated tool and we show a real world deployment use case.
Chapter PDF
Similar content being viewed by others
References
Westin, A.F.: Privacy and Feedom. Atheneum, New York (1967)
Neuman, C., Hartman, S., Raeburn, K.: The Kerberos network authentication service, v5 (2005), http://www.ietf.org/rfc/rfc4120.txt
Ruangchaijatupon, N., Krishnamurthy, P.: Encryption and power consumption in wireless LANs. In: 3rd IEEE Workshop on Wireless LANs, Newton, Massachusetts (2001)
Astorga, J., Matias, J., Saiz, P., Jacob, E.: Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using Kerberos. LNICST, vol. 42, pp. 65–76. Springer, Heidelberg (2010)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. ACM Wireless Networks 8(5), 521–534 (2002)
Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: 2nd International Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, USA (2004)
Kaijser, P., Parker, T., Pinkas, D.: SESAME: the solution to security for open distributed systems. Computer Communications 17(7), 501–518 (1994)
Wettstein, G.H., Grosen, J.: IDfusion, an open-architecture for Kerberos based authorization. In: AFS and Kerberos Best Practices Workshop, Michigan (2006)
Neuman, C.: Proxy-based authorization and accounting for distributed systems. In: 13th International Conference on Distributed Computing Systems, Pittsburgh, pp. 283–291 (1993)
Walla, M.: Kerberos explained, issue of Windows 2000 Advantage magazine (2000), http://technet.microsoft.com/en-us/library/bb742516.aspx
AVISPA: Automated Validation of Internet Security Protocols and Applications. FET Open Project IST-2001-39252 (2003), http://www.avispa-project.org
Schumacher, J., Feurstein, K.: Living labs – a new multi-stakeholder approach to user integration. In: 3rd International Conference on Interoperability of Enterprise Systems and Applications (I-ESA 2007), Funchal, Portugal (2007)
Valenzuela, M., Sierra de Miguel, A., Navarro, M.M.: A Living Lab for Stimulating Innovation in the Fishery Sector in Spain. In: Schaffers, H., GarcÃa, J., Navarro, M., Merz, C. (eds.) Living Labs for Rural Development. Results from the C@R Integrated Project, pp. 83–104. TRAGSA, Madrid (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP
About this paper
Cite this paper
Astorga, J., Saiz, P., Jacob, E., Matias, J. (2010). A Privacy Enhancing Architecture for Collaborative Working Environments. In: Camarinha-Matos, L.M., Boucher, X., Afsarmanesh, H. (eds) Collaborative Networks for a Sustainable World. PRO-VE 2010. IFIP Advances in Information and Communication Technology, vol 336. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15961-9_68
Download citation
DOI: https://doi.org/10.1007/978-3-642-15961-9_68
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15960-2
Online ISBN: 978-3-642-15961-9
eBook Packages: Computer ScienceComputer Science (R0)