Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments

被引:22
|
作者
Li, Chun-Ta [2 ,4 ]
Hwang, Min-Shiang [1 ]
Chu, Yen-Ping [3 ]
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 402, Taiwan
[2] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung 402, Taiwan
[3] Tunghai Univ, Dept Comp Sci & Informat Engn, Taichung 407, Taiwan
[4] Tainan Univ Technol, Dept Informat Management, Tainan 710, Taiwan
关键词
Access control; Authentication; Privacy; Pervasive Computing Environment; Security;
D O I
10.1016/j.comcom.2008.06.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy and authentication ire very important concepts and service levels to anonymous communications and data confidentiality. Recently, Ren et at. proposed an authentication and access control scheme for preserving privacy in pervasive computing environments (PCEs). However, in this paper, it is demonstrated that the so-called secure, privacy preserving authentication and access control scheme proposed by Ren et al. is vulnerable to service abuse attacks and, as a result. illegitimate users can freely access the service through the service provider without any worries and this flaw would lead to a serious accounting problem with their scheme. Therefore, we proposed a security improvement to their scheme to neutralize this weakness and an efficiency improvement to enhance the performance of their scheme in the user operational phase. More importantly, a new improved proposal for a scheme can still allow the mobile user to anonymously interact with the service provider in a PCE is demonstrated. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:4255 / 4258
页数:4
相关论文
共 50 条
  • [31] Practical deniable authentication for pervasive computing environments
    Li, Fagen
    Hong, Jiaojiao
    Omala, Anyembe Andrew
    WIRELESS NETWORKS, 2018, 24 (01) : 139 - 149
  • [32] Practical deniable authentication for pervasive computing environments
    Fagen Li
    Jiaojiao Hong
    Anyembe Andrew Omala
    Wireless Networks, 2018, 24 : 139 - 149
  • [33] Private entity authentication for pervasive computing environments
    Zhu, Feng
    Mutka, Matt W.
    Ni, Lionel M.
    International Journal of Network Security, 2012, 14 (02) : 86 - 100
  • [34] Authentication and access control using trust collaboration in pervasive grid environments
    Saadi, Rachid
    Pierson, Jean Marc
    Brunie, Lionel
    ADVANCES IN GRID AND PERVASIVE COMPUTING, PROCEEDINGS, 2007, 4459 : 348 - +
  • [35] Access control for security and privacy in ubiquitous computing environments
    Yamada, S
    Kamioka, E
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 846 - 856
  • [36] Privacy in pervasive computing environments - A contradiction in terms?
    Cas, J
    IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2005, 24 (01) : 24 - 33
  • [37] Enabling Personal Privacy for Pervasive Computing Environments
    Baguees, Susana Alcalde
    Zeidler, Andreas
    Klein, Cornel
    Fernandez Valdivielso, Carlos
    Matias, Ignacio R.
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2010, 16 (03) : 341 - 371
  • [38] Identity-Based Inter-domain Authentication Scheme in Pervasive Computing Environments
    Huo, Shi-Wei
    Luo, Chang-Yuan
    Xin, Hong-Zhi
    INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT II, 2011, 135 : 314 - 320
  • [39] Cloud Computing: Preserving Data Privacy and Managing Access Control
    Giweli, Nabil
    Shahrestani, Seyed
    Cheung, Hon
    INNOVATION VISION 2020: SUSTAINABLE GROWTH, ENTREPRENEURSHIP, AND ECONOMIC DEVELOPMENT, VOLS 1-4, 2012, : 1742 - 1748
  • [40] A survey of privacy-preserving access control in cloud computing
    Li, Hongjiao, 1600, Binary Information Press (10):