A flexible, privacy-preserving authentication framework for ubiquitous computing environments

被引:28
作者
Al-Muhtadi, J [1 ]
Ranganathan, A [1 ]
Campbell, R [1 ]
Mickunas, MD [1 ]
机构
[1] Univ Illinois, Dept Comp Sci, Urbana, IL 61801 USA
来源
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, PROCEEDINGS | 2002年
关键词
ubiquitous computing; security; authentication; context-awareness; privacy; mist;
D O I
10.1109/ICDCSW.2002.1030861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into "Active Information Spaces" augmented with intelligence and enhanced with services. This new exciting computing paradigm promises to revolutionize the way we interact with computers, services, and the surrounding physical spaces, yielding higher productivity and more seamless interaction between users and computing services. However, the deployment of this computing paradigm in real-life is hindered by poor security, particularly, the lack of proper authentication and access Control techniques and privacy presenting protocols. We propose an authentication framework that addresses this problem through the use of different wearable and embedded devices. These devices authenticate entities with varied levels of confidence, in a transparent, convenient, and private manner, allowing the framework to blend nicely into ubiquitous computing environments.
引用
收藏
页码:771 / 776
页数:6
相关论文
共 50 条
[31]   Privacy-preserving and tokenless chaotic revocable face authentication scheme [J].
Muhammad Khurram Khan ;
Khaled Alghathbar ;
Jiashu Zhang .
Telecommunication Systems, 2011, 47 :227-234
[32]   A privacy preserving authentication scheme for roaming in ubiquitous networks [J].
Chaudhry, Shehzad Ashraf ;
Albeshri, Aiiad ;
Xiong, Naixue ;
Lee, Changhoon ;
Shon, Taeshik .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (02) :1223-1236
[33]   Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services [J].
Xiong L. ;
Peng D. ;
Peng T. ;
Liang H. .
Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2019, 54 (01) :202-210
[34]   Privacy-preserving and tokenless chaotic revocable face authentication scheme [J].
Khan, Muhammad Khurram ;
Alghathbar, Khaled ;
Zhang, Jiashu .
TELECOMMUNICATION SYSTEMS, 2011, 47 (3-4) :227-234
[35]   SPCAuth: Scalable and Privacy-Preserving Continuous Authentication for Web Applications [J].
Monschein, David ;
Waldhorst, Oliver P. .
PROCEEDINGS OF THE IEEE 46TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2021), 2021, :281-286
[36]   A privacy-preserving mutual authentication scheme for group communication in VANET [J].
Nath, Himun Jyoti ;
Choudhury, Hiten .
COMPUTER COMMUNICATIONS, 2022, 192 :357-372
[37]   Deniable-Based Privacy-Preserving Authentication Against Location Leakage in Edge Computing [J].
Zeng, Shengke ;
Zhang, Hongjie ;
Hao, Fei ;
Li, Hongwei .
IEEE SYSTEMS JOURNAL, 2022, 16 (02) :1729-1738
[38]   A Fog Computing-based Framework for Privacy Preserving IoT Environments [J].
Abou-Tair, Dhiah el Diehn, I ;
Buechsenstein, Simon ;
Khalifeh, Ala .
INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (03) :306-315
[39]   Physically Secure and Privacy-Preserving Charging Authentication Framework With Data Aggregation in Vehicle-to-Grid Networks [J].
Liang, Yangfan ;
Liu, Yining ;
Zhang, Xianchao ;
Liu, Gao .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (11) :18831-18846
[40]   A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks [J].
Wei, Jiannan ;
Wang, Xiaojie ;
Li, Nan ;
Yang, Guomin ;
Mu, Yi .
IEEE ACCESS, 2018, 6 :43776-43784