UCSMssp: Ubiquitous Computing Service Model Based on SPKI/SDSI and P2P

被引:0
|
作者
Sun, Daoqing [1 ]
Pu, Fang [1 ]
Cao, Qiying [1 ]
机构
[1] Donghua Univ, Coll Informat Sci & Technol, Shanghai 201620, Peoples R China
来源
2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23 | 2008年
关键词
Peer-to-Peer; Security; Service Model; SPKI/SDSI; Ubiquitous Computing;
D O I
10.1109/WCICA.2008.4593373
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ubiquitous computing systems typically have lots of security problems in the area of service supply. The service types and levels, the security delegation of services and the identity hiding of principal etc are all these unsolved problems. In this paper, UCSMssp, a new novel ubiquitous computing service model based on SPKI/SDSI and P2P is presented. SPKI-based authorization is exploited in UCSMssp to solve above problems in small-scale ubiquitous computing environments. The DHT and flooding or random walk technology of Peer-to-Peer overlay network over the Internet is expanded to solve the routing search in large-scale ubiquitous computing environments. The architecture of ubiquitous computing environment, the service authorization processes and the service supply processes etc of UCSMssp are described in the paper. The performance analysis shows that UCSMssp is a suitable security solution used in large-scale ubiquitous computing environments.
引用
收藏
页码:2822 / 2827
页数:6
相关论文
共 50 条
  • [31] Byzantine generals problem in the light of P2P computing
    Fedotova, Natalya
    Veltri, Luca
    2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, 2006, : 323 - +
  • [32] Byzantine generals problem in the light of P2P computing
    Fedotova, Natalya
    Veltri, Luca
    2006 THIRD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2006, : 312 - +
  • [33] P2P Computing in Design of VANET Routing Protocol
    Song Haibin
    Meng Qi
    Men Aidong
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 1502 - 1507
  • [34] Model research of p2p VoD system based on measurement
    Zheng Y.
    Chen C.-J.
    Li C.-X.
    Tiedao Xuebao/Journal of the China Railway Society, 2011, 33 (02): : 60 - 66
  • [35] A Time-decay based P2P Trust Model
    Zhang, Yong
    Wang, Kewen
    Li, Keqiu
    Qu, Wenyu
    Xiang, Yang
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 235 - +
  • [36] A Trust Model Based on Evidence Theory for P2P Systems
    Huang, Lidong
    Xue, Gang
    He, Xianglin
    Zhuang, Honglin
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS, PTS 1 AND 2, 2010, : 99 - +
  • [37] A proposal of a sensor-handling mechanism using a P2P agent platform for ubiquitous environment
    Ishi, Yoshimasa
    Teranishi, Yuuichi
    Harumoto, Kaname
    Shimojo, Shinji
    EUROMEDIA '2007, 2007, : 95 - +
  • [38] TRUST MODEL BASED ON PERSONAL PREFERENCE IN P2P NETWORK
    Ma Shuqin
    2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 2: FUTURE COMMUNICATION AND NETWORKING, 2011, : 163 - 166
  • [39] A Novel Data Exchange Model Based on P2P and Ontology
    Peng, Li
    Man, Yuan
    PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 1693 - 1696
  • [40] A secure model for controlling the hubs in P2P wireless network based on trust value
    Liu, Yuhua
    Xiong, Naixue
    Li, Yuling
    Xu, Kaihua
    Park, Jong Hyuk
    Lin, Chuan
    COMPUTER COMMUNICATIONS, 2010, 33 (08) : 997 - 1004