About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Mobile Information and Communication Systems. Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers

Research Article

Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments

Download(Requires a free EAI acccount)
474 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-17502-2_5,
        author={Emmanouil Magkos and Panayiotis Kotzanikolaou},
        title={Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments},
        proceedings={Security and Privacy in Mobile Information and Communication Systems. Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers},
        proceedings_a={MOBISEC},
        year={2012},
        month={5},
        keywords={Privacy and Security Pervasive Computing Environments Unlinkability Accountability},
        doi={10.1007/978-3-642-17502-2_5}
    }
    
  • Emmanouil Magkos
    Panayiotis Kotzanikolaou
    Year: 2012
    Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments
    MOBISEC
    Springer
    DOI: 10.1007/978-3-642-17502-2_5
Emmanouil Magkos1,*, Panayiotis Kotzanikolaou2,*
  • 1: Ionian University
  • 2: University of Piraeus
*Contact email: emagos@ionio.gr, pkotzani@unipi.gr

Abstract

The exchange of user-related sensitive data within a Pervasive Computing Environment (PCE) raises security and privacy concerns. On one hand, service providers require user authentication and authorization prior to the provision of a service, while at the same time users require anonymity, , untraceability and unlinkability for their transactions. In this paper we discuss privacy and security requirements for access control in PCEs and show why a recently proposed efficient scheme [1] fails to satisfy these requirements. Furthermore, we discuss a generic approach for achieving a desired level of privacy against malicious insiders, while balancing with competing demands for access control and accountability.

Keywords
Privacy and Security Pervasive Computing Environments Unlinkability Accountability
Published
2012-05-28
http://dx.doi.org/10.1007/978-3-642-17502-2_5
Copyright © 2010–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL