UCSMssp: Ubiquitous Computing Service Model Based on SPKI/SDSI and P2P

被引:0
|
作者
Sun, Daoqing [1 ]
Pu, Fang [1 ]
Cao, Qiying [1 ]
机构
[1] Donghua Univ, Coll Informat Sci & Technol, Shanghai 201620, Peoples R China
来源
2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23 | 2008年
关键词
Peer-to-Peer; Security; Service Model; SPKI/SDSI; Ubiquitous Computing;
D O I
10.1109/WCICA.2008.4593373
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ubiquitous computing systems typically have lots of security problems in the area of service supply. The service types and levels, the security delegation of services and the identity hiding of principal etc are all these unsolved problems. In this paper, UCSMssp, a new novel ubiquitous computing service model based on SPKI/SDSI and P2P is presented. SPKI-based authorization is exploited in UCSMssp to solve above problems in small-scale ubiquitous computing environments. The DHT and flooding or random walk technology of Peer-to-Peer overlay network over the Internet is expanded to solve the routing search in large-scale ubiquitous computing environments. The architecture of ubiquitous computing environment, the service authorization processes and the service supply processes etc of UCSMssp are described in the paper. The performance analysis shows that UCSMssp is a suitable security solution used in large-scale ubiquitous computing environments.
引用
收藏
页码:2822 / 2827
页数:6
相关论文
共 50 条
  • [1] UCIMssp:Ubiquitous Computing Identification Mechanism Based on SPKI/SDSI and P2P
    孙道清
    蒲芳
    曹奇英
    JournalofDonghuaUniversity(EnglishEdition), 2008, 25 (04) : 475 - 483
  • [2] UCSMdess: Ubiquitous computing service model based on D-S Evidence Theory and extended SPKI/SDSI
    Sun, Daoqing
    Lu, Yishu
    Cao, Qiying
    WSEAS: ADVANCES ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE, 2008, : 75 - +
  • [3] Secure Event Service using SPKI/SDSI Certificate in Ubiquitous
    Park, HeeMan
    Lee, YoungLok
    Lee, HyungHyo
    Noh, BongNam
    INTERNATIONAL ELECTRONIC CONFERENCE ON COMPUTER SCIENCE, 2008, 1060 : 250 - +
  • [4] Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI
    孙道清
    曹奇英
    Journal of Donghua University(English Edition), 2008, 25 (05) : 564 - 570
  • [5] A service model based on user performances in unstructured P2P
    Fu, JM
    Li, WN
    Xian, Y
    Zhang, HG
    Current Trends in High Performance Computing and Its Applications, Proceedings, 2005, : 295 - 297
  • [6] Incentive Service Model for P2P
    Wongrujirat, Krit
    Hsin-ting, Tim
    Seneviratne, Aruna
    3RD ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, 2005, 2005,
  • [7] eComP: an architecture that supports P2P networking among ubiquitous computing devices
    Kameas, A
    Mavrommati, I
    Ringas, D
    Wason, P
    SECOND INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2002, : 57 - 64
  • [8] A Secure Trust Model for P2P Systems Based on Trusted Computing
    郝黎明
    杨树堂
    陆松年
    陈恭亮
    Journal of Shanghai Jiaotong University, 2008, (01) : 86 - 90
  • [9] Secure trust model for P2P systems based on trusted computing
    Hao L.-M.
    Yang S.-T.
    Lu S.-N.
    Chen G.-L.
    Journal of Shanghai Jiaotong University (Science), 2008, 13 (1) : 86 - 90
  • [10] Reliable P2P computing model based on probabilistic redundant scheduling
    Lin W.-W.
    Qi D.-Y.
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2010, 38 (06): : 84 - 88