Research Article
Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments
434 downloads
@INPROCEEDINGS{10.1007/978-3-642-17502-2_5, author={Emmanouil Magkos and Panayiotis Kotzanikolaou}, title={Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments}, proceedings={Security and Privacy in Mobile Information and Communication Systems. Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers}, proceedings_a={MOBISEC}, year={2012}, month={5}, keywords={Privacy and Security Pervasive Computing Environments Unlinkability Accountability}, doi={10.1007/978-3-642-17502-2_5} }
- Emmanouil Magkos
Panayiotis Kotzanikolaou
Year: 2012
Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments
MOBISEC
Springer
DOI: 10.1007/978-3-642-17502-2_5
Abstract
The exchange of user-related sensitive data within a Pervasive Computing Environment (PCE) raises security and privacy concerns. On one hand, service providers require user authentication and authorization prior to the provision of a service, while at the same time users require anonymity, , untraceability and unlinkability for their transactions. In this paper we discuss privacy and security requirements for access control in PCEs and show why a recently proposed efficient scheme [1] fails to satisfy these requirements. Furthermore, we discuss a generic approach for achieving a desired level of privacy against malicious insiders, while balancing with competing demands for access control and accountability.
Copyright © 2010–2024 ICST