Enforcing trust in pervasive computing with trusted computing technology

被引:0
|
作者
Li, Shiqun [1 ,2 ]
Balfe, Shane [2 ,3 ]
Zhou, Jianying [2 ]
Chen, Kefei [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Inst Infocomm Res, Singapore 119613, Singapore
[3] Univ London, Royal Holloway, Egham TW20 0EX, Surrey, England
来源
CRITICAL INFORMATION INFRASTRUCTURES SECURITY | 2006年 / 4347卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pervasive computing as a concept holds the promise of simplifying daily life by integrating mobile devices and digital infrastructures into our physical world. These devices in a pervasive environment would establish dynamic ad-hoc networks to provide ubiquitous services. The open and dynamic characteristics of pervasive environments necessitate the requirement for some form of trust assumptions to be made. Trust in this context not only includes authentication, confidentiality and privacy but also includes the belief that the devices and smart environment behave as expected. In this paper, we propose a trust enforced pervasive computing environment using the primitives provided by a TPM (Trusted Platform Module). The application scenario shows how critical information infrastructure such as services and data can be protected. In this smart environment, a person carrying a device authenticates to the environment in order to utilize its services. In this context the device and the smart environment can also test and check each other's behaviors to better perform trust negotiation.
引用
收藏
页码:195 / +
页数:4
相关论文
共 50 条
  • [1] A Study of Trust & Privacy Models in Pervasive Computing Approach to Trusted Computing Platforms
    Khiabani, Hamed
    Ab Manan, Jamalul-Lail
    Sidek, Zailani Mohamed
    2009 INTERNATIONAL CONFERENCE FOR TECHNICAL POSTGRADUATES (TECHPOS 2009), 2009, : 140 - +
  • [2] Pervasive Trusted Computing
    Balfe, Shane
    Li, Shiqun
    Zhou, Jianying
    SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 88 - +
  • [3] Safeguarding personal data using trusted computing in pervasive computing
    Hohl, A
    Zugenmaier, A
    PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING, 2005, 780 : 147 - 155
  • [4] Trust Based Pervasive Computing
    Shane Balfe
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1477 - 1480
  • [5] A Trust Model in Pervasive Computing
    Wang, Jing
    Yang, Zhimin
    Chen, Yunlei
    Kou, Weili
    Zhang, Zengguang
    2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 370 - 374
  • [6] An enhanced scheme of enforcing DTE security policy based on trusted computing technology
    Liu, Wei-Peng
    Zuo, Xiao-Dong
    Huang, Qiang
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3657 - +
  • [7] The trust measurement scheme in trusted computing
    Zhang, Li-Qiang
    Zhang, Huan-Guo
    Zhang, Fan
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 586 - 591
  • [8] Trust Service Selection in Pervasive Computing
    Wang, Xiaoying
    Chen, Yingge
    Xu, Benlian
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 173 - 176
  • [9] Trust Management in the Pervasive Computing Era
    Trcek, Denis
    IEEE SECURITY & PRIVACY, 2011, 9 (04) : 52 - 55
  • [10] A trust model for pervasive computing environments
    Yin, Shuxin
    Ray, Indrakshi
    Ray, Indrajit
    2006 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2006, : 340 - +