Establishing Trust Through Anonymous and Private Information Exchange Over Personal Networks

被引:4
作者
Patrikakis, Charalampos Z. [1 ]
Kyriazanos, Dimitris M. [1 ]
Prasad, Neeli R. [2 ]
机构
[1] Natl Tech Univ Athens, Telecommun Lab, Sch Elect & Comp Engn, GR-15773 Athens, Greece
[2] Univ Aalborg, Ctr TeleInFrastruktur, Aalborg, Denmark
关键词
Anonymity; Personal network; Privacy; Information exchange;
D O I
10.1007/s11277-008-9606-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Security and privacy in Personal Networks constitute a major challenge for designers and implementers. The deployment of novel services over a collaborative environment where users share their resources and profiles create higher demands on security and privacy requirements. In this paper, the authors address the issue of privacy-enabled, secure personal information exchange among participants of a Personal Networks federation, in order to establish trust. The paper proposes a novel model based on the separation of user ID information from personal preferences and user status information. The proposed model is able to ensure privacy through anonymity over personal data exchange, while it incorporates mechanisms for the detection and confronting of malicious behavior, and resilience against attacks. A proof of concept based on an actual implementation is provided. Further, discussion is presented on the issues that need to be tackled in order to incorporate the proposed model in a standard PN architecture.
引用
收藏
页码:121 / 135
页数:15
相关论文
共 27 条
[1]  
[Anonymous], 2510 RFC
[2]  
[Anonymous], 2001, DESIGNING PRIVACY EN
[3]  
CHEN Z, 2007, CNSR 07 5 ANN C COMM
[4]  
COOK DJ, 2003, PERCOM 2003 PERV COM
[5]   Deploying low-latency anonymity - Design challenges and social factors [J].
Dingledine, Roger ;
Mathewson, Nick ;
Syverson, Paul .
IEEE SECURITY & PRIVACY, 2007, 5 (05) :83-87
[6]  
Hook D., 2005, Beginning Cryptography with Java
[7]  
Intille S. S., 2002, IEEE Pervasive Computing, V1, P76, DOI 10.1109/MPRV.2002.1012340
[8]  
JACOBSSON M, 2005, IEEE PERCOM 2005 3 I
[9]  
JAVAID U, 2007, VTC2007 VEH TECHN C
[10]   A secure distributed framework for achieving k-anonymity [J].
Jiang, Wei ;
Clifton, Chris .
VLDB JOURNAL, 2006, 15 (04) :316-333