Abstract
Recently, numerous service discovery protocols have been introduced in the open literature. Unfortunately, many of them did not consider security issues, and for those that did, many security and privacy problems still remain. One important issue is to protect the privacy of a service provider while enabling an end-user to search an alternative service using multiple keywords. To deal with this issue, the existing protocols assumed that a directory server should be trusted or owned by each service provider. However, an adversary may compromise the directory server due to its openness property.
In this paper, we suggest an efficient method of membership verification to resolve this issue and analyze its performance. Using this method, we propose a privacy-preserving secure service discovery protocol protecting the privacy of a service provider while providing multiple keywords search to an end-user. Also, we provide performance and security analysis of our protocol.
This work was done while the first author was visiting I2R, supported by I2R’s Postgraduate Attachment Program.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Satyanarayanan, M.: Pervasive computing: Vision and Challenges. IEEE Personal Communications 8(4), 10–17 (2001)
Ellison, C.: Home Network Security. Intel Technology J. 6, 37–48 (2002)
Sun Microsystems, Jini Technology Core Platform Specification Version 2.0 (2003), http://www.sun.com/software/jini/specs/
Lee, C., Helal, S.: Protocols for Service Discovery in Dynamic and Mobile Networks. International Journal of Computer Research 11(1), 1–12 (2002)
Czerwinski, S., Zhao, B.Y., Hodes, T., Joseph, A., Katz, R.: An Architecture for a Secure Service Discovery Service. In: Proc. of Fifth Annual International Conf. on Mobile Computing and Networks (MobiCom 1999), pp. 24–35 (August 1999)
Zhu, F., Mutka, M., Ni, L.: A Private, Secure, and User-Centric Information Exposure Model for Service Discovery Protocols. IEEE Transactions on Mobile Computing 5(4), 418–429 (2006)
Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)
Golle, P., Staddon, J., Waters, B.: Secure Conjunctive Search over Encrypted Data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31–45. Springer, Heidelberg (2004)
Baek, J., Safavi-Naini, R., Susilo, W.: Public Key Encryption with Keyword Search Revisited, Cryptology ePrint Archive, Report 2005/191
Yau, S.S., Yin, Y.: Controlled Privacy Preserving Keyword Search. In: Proc. of ACM Symposium on Information, Computer & Communication Security (ASIACCS 2008), pp. 321–324 (March 2008)
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient Private Matching and Set Intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)
Kissner, L., Song, D.X.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241–257. Springer, Heidelberg (2005)
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005)
Gruteser, M., Grunwald, D.: Enhancing Location Privacy in Wireless LAN through Disposable Interface Identifiers: A Quantitative Analysis. Mobile Networks and Applications 10(3), 315–325 (2003)
Lynn, B.: Pairing Based Cryptography, http://crypto.stanford.edu/pbc/
Xu, S., Yung, M.: K-anonymous Secret Handshakes with Reusable Credentials. In: Proc. of the 11th ACM Conf. on Computer and Communications Security (CCS 2008), pp. 158–167 (October 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, J., Baek, J., Kim, K., Zhou, J. (2011). A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments. In: Camenisch, J., Lambrinoudakis, C. (eds) Public Key Infrastructures, Services and Applications. EuroPKI 2010. Lecture Notes in Computer Science, vol 6711. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22633-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-22633-5_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22632-8
Online ISBN: 978-3-642-22633-5
eBook Packages: Computer ScienceComputer Science (R0)