Enforcing trust in pervasive computing with trusted computing technology

被引:0
作者
Li, Shiqun [1 ,2 ]
Balfe, Shane [2 ,3 ]
Zhou, Jianying [2 ]
Chen, Kefei [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Inst Infocomm Res, Singapore 119613, Singapore
[3] Univ London, Royal Holloway, Egham TW20 0EX, Surrey, England
来源
CRITICAL INFORMATION INFRASTRUCTURES SECURITY | 2006年 / 4347卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pervasive computing as a concept holds the promise of simplifying daily life by integrating mobile devices and digital infrastructures into our physical world. These devices in a pervasive environment would establish dynamic ad-hoc networks to provide ubiquitous services. The open and dynamic characteristics of pervasive environments necessitate the requirement for some form of trust assumptions to be made. Trust in this context not only includes authentication, confidentiality and privacy but also includes the belief that the devices and smart environment behave as expected. In this paper, we propose a trust enforced pervasive computing environment using the primitives provided by a TPM (Trusted Platform Module). The application scenario shows how critical information infrastructure such as services and data can be protected. In this smart environment, a person carrying a device authenticates to the environment in order to utilize its services. In this context the device and the smart environment can also test and check each other's behaviors to better perform trust negotiation.
引用
收藏
页码:195 / +
页数:4
相关论文
共 50 条
  • [31] Security analysis on trust chain of trusted computing platform
    Xu M.-D.
    Zhang H.-G.
    Zhao H.
    Li J.-L.
    Yan F.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (07): : 1165 - 1176
  • [32] PKI Mesh Trust Model Based on Trusted Computing
    Liu, Changping
    Feng, Yong
    Fan, Mingyu
    Wang, Guangwei
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1401 - 1405
  • [33] A mechanism for trust sustainability among trusted computing platforms
    Yan, Z
    Cofta, P
    TRUST AND PRIVACY IN DIGITAL BUSINESS, PROCEEDINGS, 2004, 3184 : 11 - 19
  • [34] Trust Management for Trusted Computing Platforms in Web Services
    Nagarajan, Aarthi
    Varadharajan, Vijay
    Hitchens, Michael
    STC'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SCALABLE TRUSTED COMPUTING, 2007, : 58 - 62
  • [35] Trusted Grid computing with security binding and trust integration
    Song S.
    Hwang K.
    Kwok Y.-K.
    Journal of Grid Computing, 2005, 3 (1-2) : 53 - 73
  • [37] Research on Trust Model Based on Behavior and Trusted Computing
    Gu Yue-sheng
    Chen Jun
    Wang Yan-rong
    PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 1259 - 1263
  • [38] Digital Trust - Trusted Computing and Beyond A Position Paper
    Akram, Raja Naeem
    Ko, Ryan K. L.
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 884 - 892
  • [39] Anonymous trust - Making trusted computing work with privacy
    Grossman, WM
    SCIENTIFIC AMERICAN, 2004, 291 (02) : 20 - 22
  • [40] VeriEdge: Verifying and Enforcing Service Level Agreements for Pervasive Edge Computing
    Wang, Xiaojian
    Yu, Ruozhou
    Yang, Dejun
    Gu, Huayue
    Li, Zhouyu
    IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2024, : 2149 - 2158