Enforcing trust in pervasive computing with trusted computing technology

被引:0
作者
Li, Shiqun [1 ,2 ]
Balfe, Shane [2 ,3 ]
Zhou, Jianying [2 ]
Chen, Kefei [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Inst Infocomm Res, Singapore 119613, Singapore
[3] Univ London, Royal Holloway, Egham TW20 0EX, Surrey, England
来源
CRITICAL INFORMATION INFRASTRUCTURES SECURITY | 2006年 / 4347卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pervasive computing as a concept holds the promise of simplifying daily life by integrating mobile devices and digital infrastructures into our physical world. These devices in a pervasive environment would establish dynamic ad-hoc networks to provide ubiquitous services. The open and dynamic characteristics of pervasive environments necessitate the requirement for some form of trust assumptions to be made. Trust in this context not only includes authentication, confidentiality and privacy but also includes the belief that the devices and smart environment behave as expected. In this paper, we propose a trust enforced pervasive computing environment using the primitives provided by a TPM (Trusted Platform Module). The application scenario shows how critical information infrastructure such as services and data can be protected. In this smart environment, a person carrying a device authenticates to the environment in order to utilize its services. In this context the device and the smart environment can also test and check each other's behaviors to better perform trust negotiation.
引用
收藏
页码:195 / +
页数:4
相关论文
共 50 条
  • [41] VeriEdge: Verifying and Enforcing Service Level Agreements for Pervasive Edge Computing
    Wang, Xiaojian
    Yu, Ruozhou
    Yang, Dejun
    Gu, Huayue
    Li, Zhouyu
    IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2024, : 2149 - 2158
  • [42] Virtualization Airborne Trusted General Computing Technology
    Zhang, Shuang
    Wang, Yuanxun
    Wan, Xinyu
    Li, Zhihui
    Guo, Yangming
    APPLIED SCIENCES-BASEL, 2023, 13 (03):
  • [43] Trust-based security in pervasive computing environments
    Kagal, L
    Finin, T
    Joshi, A
    COMPUTER, 2001, 34 (12) : 154 - 157
  • [44] Towards Secure Trust Bootstrapping in Pervasive Computing Environment
    Ahamed, Sheikh I.
    Hoque, Endadul
    Rahman, Farzana
    Zulkernine, Mohammad
    11TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2008, : 89 - +
  • [45] A distributed trust management scheme in the pervasive computing environment
    Sun, Tao
    Denko, Mieso K.
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1219 - 1222
  • [46] Trust management and service selection in pervasive computing environments
    Guan, Shangyuan
    Dong, Xiaoshe
    Wu, Weiguo
    Mei, Yiduo
    Liao, Shihua
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 620 - 623
  • [47] Composition trust bindings in pervasive computing service composition
    Buford, J
    Kumar, R
    Perkins, G
    FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 261 - +
  • [48] Trust based privacy protection method in pervasive computing
    Gao, Feng
    He, Jingsha
    Ma, Shunan
    Journal of Networks, 2012, 7 (02) : 322 - 328
  • [49] Qualitative Trust Dynamics Algebra for Trust Management in Pervasive Computing Environments
    Trcek, Denis
    AIC '09: PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS: RECENT ADVANCES IN APPLIED INFORMAT AND COMMUNICATIONS, 2009, : 34 - +
  • [50] Research on Pervasive Simulation Based on Grid and Pervasive Computing Technology
    Li, Ni
    Xiao, Zhen
    Xu, Lijuan
    Peng, Xiaoyuan
    7TH INTERNATIONAL CONFERENCE ON SYSTEM SIMULATION AND SCIENTIFIC COMPUTING ASIA SIMULATION CONFERENCE 2008, VOLS 1-3, 2008, : 211 - 217