Abstract
The exchange of user-related sensitive data within a Pervasive Computing Environment (PCE) raises security and privacy concerns. On one hand, service providers require user authentication and authorization prior to the provision of a service, while at the same time users require anonymity, i.e., untraceability and unlinkability for their transactions. In this paper we discuss privacy and security requirements for access control in PCEs and show why a recently proposed efficient scheme [1] fails to satisfy these requirements. Furthermore, we discuss a generic approach for achieving a desired level of privacy against malicious insiders, while balancing with competing demands for access control and accountability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ren, K., Lou, W.: Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability. Mobile Networks and Applications 12, 79–92 (2007)
Weiser, M.: The computer for the 21st century. ACM SIGMOBILE Mobile Computing and Communications Review 3, 3–11 (1999)
Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, M., Yi, S.: Routing through the mist: privacy preserving communication in ubiquitous computing environments. In: IEEE 22nd International Conference on Distributed Computing Systems, pp. 74–83 (2002)
Campbell, R.H., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards security and privacy for pervasive computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 1–15. Springer, Heidelberg (2002)
Beresford, A., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2, 46–55 (2003)
Ackerman, M.S.: Privacy in pervasive environments: next generation labeling protocols. Personal Ubiquitous Comput. 8, 430–439 (2004)
Ranganathan, K.: Trustworthy pervasive computing: The hard security problems. In: PERCOMW 2004: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, Washington, DC, USA, p. 117. IEEE Computer Society, Los Alamitos (2004)
Gorlach, A., Heinemann, A., Terpstra, W.W.: Survey on location privacy in pervasive computing. In: Robinson, P., Vogt, H., Wagealla, W. (eds.) Privacy, Security and Trust within the Context of Pervasive Computing. The Kluwer International Series in Engineering and Computer Science (2004)
Ren, K., Lou, W., Kim, K., Deng, R.: A novel privacy preserving authentication and access control scheme for pervasive computing environments. IEEE Transactions on Vehicular Technology 55, 1373–1384 (2006)
Diep, N.N., Lee, S., Lee, Y.K., Lee, H.: A privacy preserving access control scheme using anonymous identification for ubiquitous environments. In: RTCSA 2007: Proceedings of the 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, Washington, DC, USA, pp. 482–487. IEEE Computer Society, Los Alamitos (2007)
Creese, S., Goldsmith, M., Roscoe, B., Zakiuddin, I.: Authentication for pervasive computing. In: SPC, pp. 116–129 (2003)
Langheinrich, M.: Privacy by design - principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)
Chan, H., Perrig, A.: Security and privacy in sensor networks. Computer 36, 103–105 (2003)
Juels, A.: Rfid security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 24, 381–394 (2006)
Stubblebine, S.G., Syverson, P.F., Goldschlag, D.M.: Unlinkable serial transactions: protocols and applications. ACM Trans. Inf. Syst. Secur. 2, 354–389 (1999)
Jakobsson, B.M.: Privacy vs. authenticity. PhD thesis, La Jolla, CA, USA (1998)
Bangerter, E., Camenisch, J., Lysyanskaya, A.: A cryptographic framework for the controlled release of certified data. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2004. LNCS, vol. 3957, pp. 20–42. Springer, Heidelberg (2004)
Raya, M., Hubaux, J.P.: The security of vehicular ad hoc networks. In: SASN 2005: Proceedings of the 3rd ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 11–21. ACM, New York (2005)
Rahman, S., Hengartner, U.: Secure crash reporting in vehicular ad hoc networks. In: Third International Conference on Security and Privacy in Communication Networks (SecureComm 2007), New York, NY, USA (2007) (to appear)
Sun, J., Zhang, C., Fang, Y.: An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks. In: Military Communications Conference, MILCOM 2007, October 29-31, pp. 1–7. IEEE, Los Alamitos (2007)
Burmester, M., Magkos, E., Chrissikopoulos, V.: Strengthening privacy protection in vanets. In: WIMOB 2008: Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, Washington, DC, USA, pp. 508–513. IEEE Computer Society, Los Alamitos (2008)
Kapadia, A., Henderson, T., Fielding, J.J., Kotz, D.: Virtual walls: Protecting digital privacy in pervasive environments. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 162–179. Springer, Heidelberg (2007)
Liu, L.: From data privacy to location privacy: models and algorithms. In: VLDB 2007: Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB Endowment, pp. 1429–1430 (2007)
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. ACM Commun. 24, 84–88 (1981)
Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing 2, 56–64 (2003)
Wakeman, I., Chalmers, D., Fry, M.: Reconciling privacy and security in pervasive computing: the case for pseudonymous group membership. In: MPAC 2007: Proceedings of the 5th International Workshop on Middleware for Pervasive and Ad-hoc Computing, pp. 7–12. ACM, New York (2007)
Kim, J., Kim, Z., Kim, K.: A lightweight privacy preserving authentication and access control scheme for ubiquitous computing environment. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 37–48. Springer, Heidelberg (2007)
Li, C.T., Hwang, M.S., Chu, Y.P.: Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments. Computer Communications 31, 4255–4258 (2008)
Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R., Sherman, A. (eds.) Advances in Cryptology Proceedings of Crypto, vol. 82, pp. 199–203 (1983)
Lamport, L.: Password authentication with insecure communication. ACM Commun. 24, 770–772 (1981)
Parno, B., Perrig, A.: Challenges in securing vehicular networks. In: Workshop on Hot Topics in Networks, HotNets-IV (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Magkos, E., Kotzanikolaou, P. (2010). Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments. In: Schmidt, A.U., Russello, G., Lioy, A., Prasad, N.R., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 47. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17502-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-17502-2_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17501-5
Online ISBN: 978-3-642-17502-2
eBook Packages: Computer ScienceComputer Science (R0)