An inter-domain authentication scheme for pervasive computing environment
Computers & Mathematics with Applications
Data security mechanism based on hierarchy analysis for internet of things
Proceedings of the 2011 International Conference on Innovative Computing and Cloud Computing
Hi-index | 0.00 |
Comparedtoallemergingissues,privacyisprobably the most prominent concern when it comes tojudgingtheeffectsofawidespreaddeploymentofubiquitous computing. On one hand, service providerswanttoauthenticatelegitimateusersandmakesurethey are accessingtheir authorized servicesin alegalway. On the other hand, users prefer not to expose anysensitiveinformationtoanybody.Theywanttohavecomplete control on their personal data, without beingtrackeddownforwherevertheyare,wheneverandwhatevertheydo.Inthispaper,weintroduceananonymousidentificationauthenticationandaccesscontrolschemetosecureinteractionsbetweenusersandservicesinubiquitousenvironments.TheschemeusesanonymoususerID,sensitivedatasharingmethod,andaccountmanagementtoprovidealightweightauthenticationwhilekeepingusersanonymouslyinteracting withtheservicesin asecureand flexible way.