A flexible, privacy-preserving authentication framework for ubiquitous computing environments

被引:28
作者
Al-Muhtadi, J [1 ]
Ranganathan, A [1 ]
Campbell, R [1 ]
Mickunas, MD [1 ]
机构
[1] Univ Illinois, Dept Comp Sci, Urbana, IL 61801 USA
来源
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, PROCEEDINGS | 2002年
关键词
ubiquitous computing; security; authentication; context-awareness; privacy; mist;
D O I
10.1109/ICDCSW.2002.1030861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into "Active Information Spaces" augmented with intelligence and enhanced with services. This new exciting computing paradigm promises to revolutionize the way we interact with computers, services, and the surrounding physical spaces, yielding higher productivity and more seamless interaction between users and computing services. However, the deployment of this computing paradigm in real-life is hindered by poor security, particularly, the lack of proper authentication and access Control techniques and privacy presenting protocols. We propose an authentication framework that addresses this problem through the use of different wearable and embedded devices. These devices authenticate entities with varied levels of confidence, in a transparent, convenient, and private manner, allowing the framework to blend nicely into ubiquitous computing environments.
引用
收藏
页码:771 / 776
页数:6
相关论文
共 50 条
[41]   PFLF: Privacy-Preserving Federated Learning Framework for Edge Computing [J].
Zhou, Hao ;
Yang, Geng ;
Dai, Hua ;
Liu, Guoxiu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 :1905-1918
[42]   Efficient privacy-preserving implicit authentication [J].
Blanco-Justicia, Alberto ;
Domingo-Ferrer, Josep .
COMPUTER COMMUNICATIONS, 2018, 125 :13-23
[43]   Privacy-preserving authentication of trees and graphs [J].
Kundu, Ashish ;
Bertino, Elisa .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (06) :467-494
[44]   Privacy-preserving authentication of trees and graphs [J].
Ashish Kundu ;
Elisa Bertino .
International Journal of Information Security, 2013, 12 :467-494
[45]   Practical Privacy-Preserving Authentication for SSH [J].
Roy, Lawrence ;
Lyakhov, Stanislav ;
Jang, Yeongjin ;
Rosulek, Mike .
PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, :3345-3362
[46]   A Privacy-Preserving Social Computing Framework for Health Management Using Federated Learning [J].
Shen, Zhangyi ;
Ding, Feng ;
Yao, Ye ;
Bhardwaj, Arpit ;
Guo, Zhiwei ;
Yu, Keping .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 10 (04) :1666-1678
[47]   Efficient Privacy-Preserving Authentication in Wireless Mobile Networks [J].
Jo, Hyo Jin ;
Paik, Jung Ha ;
Lee, Dong Hoon .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (07) :1469-1481
[48]   Privacy-Preserving Universal Authentication Protocol for Wireless Communications [J].
He, Daojing ;
Bu, Jiajun ;
Chan, Sammy ;
Chen, Chun ;
Yin, Mingjian .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (02) :431-436
[49]   Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs [J].
Xiong, Hu ;
Chen, Jinhao ;
Mei, Qian ;
Zhao, Yanan .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) :2089-2104
[50]   An efficient privacy-preserving authentication scheme with enhanced security for IoMT applications [J].
Xu, Feihong ;
Liu, Shubo ;
Yang, Xu .
COMPUTER COMMUNICATIONS, 2023, 208 :171-178