Skip to main content

A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments

  • Conference paper
Public Key Infrastructures, Services and Applications (EuroPKI 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6711))

Included in the following conference series:

Abstract

Recently, numerous service discovery protocols have been introduced in the open literature. Unfortunately, many of them did not consider security issues, and for those that did, many security and privacy problems still remain. One important issue is to protect the privacy of a service provider while enabling an end-user to search an alternative service using multiple keywords. To deal with this issue, the existing protocols assumed that a directory server should be trusted or owned by each service provider. However, an adversary may compromise the directory server due to its openness property.

In this paper, we suggest an efficient method of membership verification to resolve this issue and analyze its performance. Using this method, we propose a privacy-preserving secure service discovery protocol protecting the privacy of a service provider while providing multiple keywords search to an end-user. Also, we provide performance and security analysis of our protocol.

This work was done while the first author was visiting I2R, supported by I2R’s Postgraduate Attachment Program.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Satyanarayanan, M.: Pervasive computing: Vision and Challenges. IEEE Personal Communications 8(4), 10–17 (2001)

    Article  Google Scholar 

  2. Ellison, C.: Home Network Security. Intel Technology J. 6, 37–48 (2002)

    Google Scholar 

  3. Sun Microsystems, Jini Technology Core Platform Specification Version 2.0 (2003), http://www.sun.com/software/jini/specs/

  4. Lee, C., Helal, S.: Protocols for Service Discovery in Dynamic and Mobile Networks. International Journal of Computer Research 11(1), 1–12 (2002)

    Google Scholar 

  5. Czerwinski, S., Zhao, B.Y., Hodes, T., Joseph, A., Katz, R.: An Architecture for a Secure Service Discovery Service. In: Proc. of Fifth Annual International Conf. on Mobile Computing and Networks (MobiCom 1999), pp. 24–35 (August 1999)

    Google Scholar 

  6. Zhu, F., Mutka, M., Ni, L.: A Private, Secure, and User-Centric Information Exposure Model for Service Discovery Protocols. IEEE Transactions on Mobile Computing 5(4), 418–429 (2006)

    Article  Google Scholar 

  7. Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Golle, P., Staddon, J., Waters, B.: Secure Conjunctive Search over Encrypted Data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31–45. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Baek, J., Safavi-Naini, R., Susilo, W.: Public Key Encryption with Keyword Search Revisited, Cryptology ePrint Archive, Report 2005/191

    Google Scholar 

  10. Yau, S.S., Yin, Y.: Controlled Privacy Preserving Keyword Search. In: Proc. of ACM Symposium on Information, Computer & Communication Security (ASIACCS 2008), pp. 321–324 (March 2008)

    Google Scholar 

  11. Freedman, M.J., Nissim, K., Pinkas, B.: Efficient Private Matching and Set Intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  12. Kissner, L., Song, D.X.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241–257. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Gruteser, M., Grunwald, D.: Enhancing Location Privacy in Wireless LAN through Disposable Interface Identifiers: A Quantitative Analysis. Mobile Networks and Applications 10(3), 315–325 (2003)

    Article  Google Scholar 

  15. Lynn, B.: Pairing Based Cryptography, http://crypto.stanford.edu/pbc/

  16. Xu, S., Yung, M.: K-anonymous Secret Handshakes with Reusable Credentials. In: Proc. of the 11th ACM Conf. on Computer and Communications Security (CCS 2008), pp. 158–167 (October 2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, J., Baek, J., Kim, K., Zhou, J. (2011). A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments. In: Camenisch, J., Lambrinoudakis, C. (eds) Public Key Infrastructures, Services and Applications. EuroPKI 2010. Lecture Notes in Computer Science, vol 6711. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22633-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22633-5_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22632-8

  • Online ISBN: 978-3-642-22633-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics