Architecture for adaptable smart spaces oriented on user privacy

被引:1
作者
Wojtowicz, Adam [1 ]
Wilusz, Daniel [1 ]
机构
[1] Poznan Univ Econ & Business, Dept Informat Technol, Al Niepodleglosci 10, PL-61875 Poznan, Poland
关键词
user privacy; privacy-preserving systems; security protocol; smart spaces; smart environments; ubiquitous computing; unlinkability; CHALLENGES; SYSTEM;
D O I
10.1093/jigpal/jzw039
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Smart spaces are populated by users having evolving preferences that, directly or indirectly, reflect their spatial, temporal, financial and interaction patterns of service usage. These data, if disclosed, could draw a detailed picture of users' life in public spaces. Protection of privacy-sensitive data is especially significant in scenarios employing negotiations where many non-trusted service providers, service consumers and payment processes are involved. For such scenarios an architecture and a protocol for secure and privacy-preserving smart space usage have been developed. The presented approach relies on a trusted party operating as a public service in the 'security infrastructure as a service' model. The solution is designed to minimize the risk of users privacy violation from the side of service providers and attackers impersonating regular users, as well as the risk of violating privacy of users' payment patterns from the side of payment authorities. All parties benefit from fast and secure micropayments allowing for pay-per-use model implementation, which fulfils the non-invasiveness requirement of ubiquitous services. The presented use case scenario illustrates the possible application of this approach, and adversary model explains its privacy attributes.
引用
收藏
页码:3 / 17
页数:15
相关论文
共 27 条
[1]  
[Anonymous], 1997, 201057 EG EUR TEL ST
[2]  
[Anonymous], 2002, 145162002 ISOIEC TR
[3]  
Augusto J.C., 2007, INTELLIGENT COMPUTIN, P213, DOI DOI 10.1007/978-1-84628-943-911
[4]   Privacy protection in pervasive systems: State of the art and technical challenges [J].
Bettini, Claudio ;
Riboni, Daniele .
PERVASIVE AND MOBILE COMPUTING, 2015, 17 :159-174
[5]   Living in a world of smart everyday objects - Social, economic, and ethical implications [J].
Bohn, J ;
Coroama, V ;
Langheinrich, M ;
Mattern, F ;
Rohs, M .
HUMAN AND ECOLOGICAL RISK ASSESSMENT, 2004, 10 (05) :763-785
[6]  
Brelsford C., 2005, PASSWORD
[7]  
Cas J, 2011, COMPUTERS, PRIVACY AND DATA PROTECTION: AN ELEMENT OF CHOICE, P139, DOI 10.1007/978-94-007-0641-5_7
[8]   Challenges of Smart Industries - Privacy and payment in Visible versus Unseen Internet [J].
Cellary, Wojciech ;
Rykowski, Jarogniew .
GOVERNMENT INFORMATION QUARTERLY, 2018, 35 (04) :S17-S23
[9]   Challenges in retaining privacy in smart spaces [J].
Chau, Jimmy C. ;
Little, Thomas D. C. .
4TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2013), THE 3RD INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2013), 2013, 19 :556-564
[10]  
Dwork C., 2011, Differential Privacy, P338, DOI 10.1007/978-1-4419-5906-5_752