Enforcing trust in pervasive computing with trusted computing technology

被引:0
|
作者
Li, Shiqun [1 ,2 ]
Balfe, Shane [2 ,3 ]
Zhou, Jianying [2 ]
Chen, Kefei [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Inst Infocomm Res, Singapore 119613, Singapore
[3] Univ London, Royal Holloway, Egham TW20 0EX, Surrey, England
来源
CRITICAL INFORMATION INFRASTRUCTURES SECURITY | 2006年 / 4347卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pervasive computing as a concept holds the promise of simplifying daily life by integrating mobile devices and digital infrastructures into our physical world. These devices in a pervasive environment would establish dynamic ad-hoc networks to provide ubiquitous services. The open and dynamic characteristics of pervasive environments necessitate the requirement for some form of trust assumptions to be made. Trust in this context not only includes authentication, confidentiality and privacy but also includes the belief that the devices and smart environment behave as expected. In this paper, we propose a trust enforced pervasive computing environment using the primitives provided by a TPM (Trusted Platform Module). The application scenario shows how critical information infrastructure such as services and data can be protected. In this smart environment, a person carrying a device authenticates to the environment in order to utilize its services. In this context the device and the smart environment can also test and check each other's behaviors to better perform trust negotiation.
引用
收藏
页码:195 / +
页数:4
相关论文
共 50 条
  • [21] Rapid trust establishment for pervasive personal computing
    Surie, Ajay
    Perrig, Adrian
    Satyanarayanan, Mahadev
    Farber, David J.
    IEEE PERVASIVE COMPUTING, 2007, 6 (04) : 24 - 30
  • [22] A trust analysis methodology for pervasive computing systems
    Lo Presti, S
    Butler, M
    Leuschel, M
    Booth, C
    TRUSTING AGENTS FOR TRUSTING ELECTRONIC SOCIETIES: THEORY AND APPLICATIONS IN HCI AND E-COMMERCE, 2005, 3577 : 129 - 143
  • [23] Research on trust management model in pervasive computing
    Zhu, Jian-Yong
    2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 436 - 440
  • [24] Multilevel Trust Management Framework for Pervasive Computing
    Zhong Dong
    Zhu Yian
    Lei Wanbao
    Gu Jianhua
    Wang Yunlan
    THIRD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING: WKDD 2010, PROCEEDINGS, 2010, : 159 - 162
  • [25] B-trust: Bayesian trust framework for pervasive computing
    Quercia, Daniele
    Hailes, Stephen
    Capra, Licia
    TRUST MANAGEMENT, PROCEEDINGS, 2006, 3986 : 298 - 312
  • [26] An Evolving Trust Paradigm for Enforcing Computing System Security
    Creado, Orhio Mark
    Le, Phu Dung
    Newmarch, Jan
    Tan, Jeff
    2015 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2015, : 2595 - 2602
  • [27] Multimedia technology for pervasive computing environment
    Park, Jong Hyuk
    Yu, Zhiwen
    Zhou, Liang
    JOURNAL OF SUPERCOMPUTING, 2013, 65 (01): : 258 - 261
  • [28] Multimedia technology for pervasive computing environment
    Jong Hyuk Park
    Zhiwen Yu
    Liang Zhou
    The Journal of Supercomputing, 2013, 65 : 258 - 261
  • [29] The adaptive technology of pervasive computing terminals
    Li, Y
    Luo, L
    Xiong, GZ
    PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 116 - 121
  • [30] Technology of network management for pervasive computing
    Qu, Ming
    Liu, Shufen
    Bao, Tie
    Han, Lu
    2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 122 - +