SCN‐SI‐021 achieving privacy and access control in pervasive computing environments. Issue 2 (8th February 2011)
- Record Type:
- Journal Article
- Title:
- SCN‐SI‐021 achieving privacy and access control in pervasive computing environments. Issue 2 (8th February 2011)
- Main Title:
- SCN‐SI‐021 achieving privacy and access control in pervasive computing environments
- Authors:
- Magkos, Emmanouil
Kotzanikolaou, Panayiotis - Abstract:
- Abstract: This paper focuses on the inherent trade‐off between privacy and access control in pervasive computing environments (PCEs). On one hand, service providers require user authentication and authorization for the provision of a service, while at the same time end users require untraceability and unlinkability for their transactions. There are also cases where the anonymity of a specific credential must be revoked and a real identity be traced, in order to establish accountability. We analyze privacy and security requirements for PCEs and we show that existing privacy‐preserving access control schemes do not fully satisfy these requirements. Then we propose two approaches towards privacy‐preserving access control in PCEs. Our goal is twofold: (a) to enhance privacy by achieving untraceability and unlinkability even against malicious insiders and (b) to enhance security by achieving conditional traceability of user credentials, and if possible, non‐repudiation of evidence concerning the user's participating in a transaction. Finally, we analyze and compare the proposed schemes against existing schemes. Copyright © 2011 John Wiley & Sons, Ltd. Abstract : We analyze privacy and security requirements for PCEs and propose two approaches towards privacy‐preserving access control in PCEs. Our goal is twofold: (a) to enhance privacy by achieving untraceability and unlinkability even against malicious insiders and (b) to enhance security by achieving conditional traceability ofAbstract: This paper focuses on the inherent trade‐off between privacy and access control in pervasive computing environments (PCEs). On one hand, service providers require user authentication and authorization for the provision of a service, while at the same time end users require untraceability and unlinkability for their transactions. There are also cases where the anonymity of a specific credential must be revoked and a real identity be traced, in order to establish accountability. We analyze privacy and security requirements for PCEs and we show that existing privacy‐preserving access control schemes do not fully satisfy these requirements. Then we propose two approaches towards privacy‐preserving access control in PCEs. Our goal is twofold: (a) to enhance privacy by achieving untraceability and unlinkability even against malicious insiders and (b) to enhance security by achieving conditional traceability of user credentials, and if possible, non‐repudiation of evidence concerning the user's participating in a transaction. Finally, we analyze and compare the proposed schemes against existing schemes. Copyright © 2011 John Wiley & Sons, Ltd. Abstract : We analyze privacy and security requirements for PCEs and propose two approaches towards privacy‐preserving access control in PCEs. Our goal is twofold: (a) to enhance privacy by achieving untraceability and unlinkability even against malicious insiders and (b) to enhance security by achieving conditional traceability of user credentials, and if possible, non‐repudiation of evidence concerning the user's participating in a transaction. Finally, we analyze and compare the proposed schemes against existing schemes. … (more)
- Is Part Of:
- Security and communication networks. Volume 9:Issue 2(2016)
- Journal:
- Security and communication networks
- Issue:
- Volume 9:Issue 2(2016)
- Issue Display:
- Volume 9, Issue 2 (2016)
- Year:
- 2016
- Volume:
- 9
- Issue:
- 2
- Issue Sort Value:
- 2016-0009-0002-0000
- Page Start:
- 94
- Page End:
- 105
- Publication Date:
- 2011-02-08
- Subjects:
- pervasive computing environments -- privacy‐preserving access control -- unlinkability -- accountability -- conditional traceability
Computer networks -- Security measures -- Periodicals
Computer security -- Periodicals
Cryptography -- Periodicals
005.805 - Journal URLs:
- http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122 ↗
https://www.hindawi.com/journals/scn/ ↗
http://onlinelibrary.wiley.com/ ↗ - DOI:
- 10.1002/sec.283 ↗
- Languages:
- English
- ISSNs:
- 1939-0114
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD Digital store
- Ingest File:
- 1327.xml