A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments
Privacy and security are two important but seemingly contradictory objectives in a pervasive computing environment (PCE). On one hand, service providers want to authenticate legitimate users and make sure they are accessing their authorized services in a legal way. On the other hand, users want to m...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2006
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1197 https://ink.library.smu.edu.sg/context/sis_research/article/2196/viewcontent/Novel_Privacy_Preserving_Authentication_Deng_2006.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2196 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-21962018-07-13T03:02:16Z A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments REN, K. Lou, Wenjing KIM, K. DENG, Robert H. Privacy and security are two important but seemingly contradictory objectives in a pervasive computing environment (PCE). On one hand, service providers want to authenticate legitimate users and make sure they are accessing their authorized services in a legal way. On the other hand, users want to maintain the necessary privacy without being tracked down for wherever they are and whatever they are doing. In this paper, a novel privacy preserving authentication and access control scheme to secure the interactions between mobile users and services in PCEs is proposed. The proposed scheme seamlessly integrates two underlying cryptographic primitives, namely blind signature and hash chain, into a highly flexible and lightweight authentication and key establishment protocol. The scheme provides explicit mutual authentication between a user and a service while allowing the user to anonymously interact with the service. Differentiated service access control is also enabled in the proposed scheme by classifying mobile users into different service groups. The correctness of the proposed authentication and key establishment protocol is formally verified based on Burrows-Abadi-Needham logic 2006-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1197 info:doi/10.1109/TVT.2006.877704 https://ink.library.smu.edu.sg/context/sis_research/article/2196/viewcontent/Novel_Privacy_Preserving_Authentication_Deng_2006.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University access control scheme blind signature cryptographic primitives differentiated service hash chain key establishment protocol lightweight authentication mobile users pervasive computing environment privacy preserving authentication Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
access control scheme blind signature cryptographic primitives differentiated service hash chain key establishment protocol lightweight authentication mobile users pervasive computing environment privacy preserving authentication Information Security |
spellingShingle |
access control scheme blind signature cryptographic primitives differentiated service hash chain key establishment protocol lightweight authentication mobile users pervasive computing environment privacy preserving authentication Information Security REN, K. Lou, Wenjing KIM, K. DENG, Robert H. A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments |
description |
Privacy and security are two important but seemingly contradictory objectives in a pervasive computing environment (PCE). On one hand, service providers want to authenticate legitimate users and make sure they are accessing their authorized services in a legal way. On the other hand, users want to maintain the necessary privacy without being tracked down for wherever they are and whatever they are doing. In this paper, a novel privacy preserving authentication and access control scheme to secure the interactions between mobile users and services in PCEs is proposed. The proposed scheme seamlessly integrates two underlying cryptographic primitives, namely blind signature and hash chain, into a highly flexible and lightweight authentication and key establishment protocol. The scheme provides explicit mutual authentication between a user and a service while allowing the user to anonymously interact with the service. Differentiated service access control is also enabled in the proposed scheme by classifying mobile users into different service groups. The correctness of the proposed authentication and key establishment protocol is formally verified based on Burrows-Abadi-Needham logic |
format |
text |
author |
REN, K. Lou, Wenjing KIM, K. DENG, Robert H. |
author_facet |
REN, K. Lou, Wenjing KIM, K. DENG, Robert H. |
author_sort |
REN, K. |
title |
A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments |
title_short |
A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments |
title_full |
A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments |
title_fullStr |
A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments |
title_full_unstemmed |
A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments |
title_sort |
novel privacy preserving authentication and access control scheme for pervasive computing environments |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2006 |
url |
https://ink.library.smu.edu.sg/sis_research/1197 https://ink.library.smu.edu.sg/context/sis_research/article/2196/viewcontent/Novel_Privacy_Preserving_Authentication_Deng_2006.pdf |
_version_ |
1770570894719057920 |