Skip to main content

Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments

  • Conference paper
Security and Privacy in Mobile Information and Communication Systems (MobiSec 2010)

Abstract

The exchange of user-related sensitive data within a Pervasive Computing Environment (PCE) raises security and privacy concerns. On one hand, service providers require user authentication and authorization prior to the provision of a service, while at the same time users require anonymity, i.e., untraceability and unlinkability for their transactions. In this paper we discuss privacy and security requirements for access control in PCEs and show why a recently proposed efficient scheme [1] fails to satisfy these requirements. Furthermore, we discuss a generic approach for achieving a desired level of privacy against malicious insiders, while balancing with competing demands for access control and accountability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ren, K., Lou, W.: Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability. Mobile Networks and Applications 12, 79–92 (2007)

    Article  Google Scholar 

  2. Weiser, M.: The computer for the 21st century. ACM SIGMOBILE Mobile Computing and Communications Review 3, 3–11 (1999)

    Article  Google Scholar 

  3. Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, M., Yi, S.: Routing through the mist: privacy preserving communication in ubiquitous computing environments. In: IEEE 22nd International Conference on Distributed Computing Systems, pp. 74–83 (2002)

    Google Scholar 

  4. Campbell, R.H., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards security and privacy for pervasive computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 1–15. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Beresford, A., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2, 46–55 (2003)

    Article  Google Scholar 

  6. Ackerman, M.S.: Privacy in pervasive environments: next generation labeling protocols. Personal Ubiquitous Comput. 8, 430–439 (2004)

    Article  Google Scholar 

  7. Ranganathan, K.: Trustworthy pervasive computing: The hard security problems. In: PERCOMW 2004: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, Washington, DC, USA, p. 117. IEEE Computer Society, Los Alamitos (2004)

    Chapter  Google Scholar 

  8. Gorlach, A., Heinemann, A., Terpstra, W.W.: Survey on location privacy in pervasive computing. In: Robinson, P., Vogt, H., Wagealla, W. (eds.) Privacy, Security and Trust within the Context of Pervasive Computing. The Kluwer International Series in Engineering and Computer Science (2004)

    Google Scholar 

  9. Ren, K., Lou, W., Kim, K., Deng, R.: A novel privacy preserving authentication and access control scheme for pervasive computing environments. IEEE Transactions on Vehicular Technology 55, 1373–1384 (2006)

    Article  Google Scholar 

  10. Diep, N.N., Lee, S., Lee, Y.K., Lee, H.: A privacy preserving access control scheme using anonymous identification for ubiquitous environments. In: RTCSA 2007: Proceedings of the 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, Washington, DC, USA, pp. 482–487. IEEE Computer Society, Los Alamitos (2007)

    Google Scholar 

  11. Creese, S., Goldsmith, M., Roscoe, B., Zakiuddin, I.: Authentication for pervasive computing. In: SPC, pp. 116–129 (2003)

    Google Scholar 

  12. Langheinrich, M.: Privacy by design - principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  13. Chan, H., Perrig, A.: Security and privacy in sensor networks. Computer 36, 103–105 (2003)

    Article  Google Scholar 

  14. Juels, A.: Rfid security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 24, 381–394 (2006)

    Article  Google Scholar 

  15. Stubblebine, S.G., Syverson, P.F., Goldschlag, D.M.: Unlinkable serial transactions: protocols and applications. ACM Trans. Inf. Syst. Secur. 2, 354–389 (1999)

    Article  Google Scholar 

  16. Jakobsson, B.M.: Privacy vs. authenticity. PhD thesis, La Jolla, CA, USA (1998)

    Google Scholar 

  17. Bangerter, E., Camenisch, J., Lysyanskaya, A.: A cryptographic framework for the controlled release of certified data. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2004. LNCS, vol. 3957, pp. 20–42. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  18. Raya, M., Hubaux, J.P.: The security of vehicular ad hoc networks. In: SASN 2005: Proceedings of the 3rd ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 11–21. ACM, New York (2005)

    Google Scholar 

  19. Rahman, S., Hengartner, U.: Secure crash reporting in vehicular ad hoc networks. In: Third International Conference on Security and Privacy in Communication Networks (SecureComm 2007), New York, NY, USA (2007) (to appear)

    Google Scholar 

  20. Sun, J., Zhang, C., Fang, Y.: An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks. In: Military Communications Conference, MILCOM 2007, October 29-31, pp. 1–7. IEEE, Los Alamitos (2007)

    Google Scholar 

  21. Burmester, M., Magkos, E., Chrissikopoulos, V.: Strengthening privacy protection in vanets. In: WIMOB 2008: Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, Washington, DC, USA, pp. 508–513. IEEE Computer Society, Los Alamitos (2008)

    Chapter  Google Scholar 

  22. Kapadia, A., Henderson, T., Fielding, J.J., Kotz, D.: Virtual walls: Protecting digital privacy in pervasive environments. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 162–179. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  23. Liu, L.: From data privacy to location privacy: models and algorithms. In: VLDB 2007: Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB Endowment, pp. 1429–1430 (2007)

    Google Scholar 

  24. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. ACM Commun. 24, 84–88 (1981)

    Article  Google Scholar 

  25. Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing 2, 56–64 (2003)

    Article  Google Scholar 

  26. Wakeman, I., Chalmers, D., Fry, M.: Reconciling privacy and security in pervasive computing: the case for pseudonymous group membership. In: MPAC 2007: Proceedings of the 5th International Workshop on Middleware for Pervasive and Ad-hoc Computing, pp. 7–12. ACM, New York (2007)

    Google Scholar 

  27. Kim, J., Kim, Z., Kim, K.: A lightweight privacy preserving authentication and access control scheme for ubiquitous computing environment. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 37–48. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  28. Li, C.T., Hwang, M.S., Chu, Y.P.: Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments. Computer Communications 31, 4255–4258 (2008)

    Article  Google Scholar 

  29. Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R., Sherman, A. (eds.) Advances in Cryptology Proceedings of Crypto, vol. 82, pp. 199–203 (1983)

    Google Scholar 

  30. Lamport, L.: Password authentication with insecure communication. ACM Commun. 24, 770–772 (1981)

    Article  Google Scholar 

  31. Parno, B., Perrig, A.: Challenges in securing vehicular networks. In: Workshop on Hot Topics in Networks, HotNets-IV (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Magkos, E., Kotzanikolaou, P. (2010). Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments. In: Schmidt, A.U., Russello, G., Lioy, A., Prasad, N.R., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 47. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17502-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17502-2_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17501-5

  • Online ISBN: 978-3-642-17502-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics