A privacy preserving access control scheme using anonymous identification for ubiquitous environments

Nguyen Ngoc Diep, Sungyoung Lee, Young Koo Lee, Hee Jo Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)

    Abstract

    Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one hand, service providers want to authenticate legitimate users and make sure they are accessing their authorized services in a legal way. On the other hand, users prefer not to expose any sensitive information to anybody. They want to have complete control on their personal data, without being tracked down for wherever they are, whenever and whatever they do. In this paper, we introduce an anonymous identification authentication and access control scheme to secure interactions between users and services in ubiquitous environments. The scheme uses anonymous user ID, sensitive data sharing method, and account management to provide a lightweight authentication while keeping users anonymously interacting with the services in a secure and flexible way.

    Original languageEnglish
    Title of host publicationProceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007
    Pages482-487
    Number of pages6
    DOIs
    Publication statusPublished - 2007
    Event4296821 - Daegu, Korea, Republic of
    Duration: 2007 Aug 212007 Aug 24

    Publication series

    NameProceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007

    Other

    Other4296821
    Country/TerritoryKorea, Republic of
    CityDaegu
    Period07/8/2107/8/24

    ASJC Scopus subject areas

    • Computer Science Applications
    • Control and Systems Engineering
    • Electrical and Electronic Engineering

    Fingerprint

    Dive into the research topics of 'A privacy preserving access control scheme using anonymous identification for ubiquitous environments'. Together they form a unique fingerprint.

    Cite this