Multilaterally Secure Pervasive Cooperation :Privacy Protection, Accountability and Secure Communication for the Age of Pervasive Computing ( Cryptology and Information Security Series )

Publication subTitle :Privacy Protection, Accountability and Secure Communication for the Age of Pervasive Computing

Publication series : Cryptology and Information Security Series

Author: Weber S.G.  

Publisher: Ios Press‎

Publication year: 2012

E-ISBN: 9781614991571

P-ISBN(Paperback): 9781614991564

Subject: TP18 artificial intelligence theory

Keyword: 计算技术、计算机技术

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

The mechanisms which support secure communication, privacy protection and accountability are crucial parts of most computing systems. Pervasive computing is characterized by the large-scale collection, distribution and aggregation of information related to individuals and their activities. From the outset, the inherent privacy and IT security issues of pervasive computing have been an area of critical focus, and associated unforeseeable consequences for the individual have been mentioned. This book addresses these issues, and seeks to demonstrate that carefully devised protection mechanisms can become enablers for multilaterally acceptable and trustworthy digital interactions and ICT-based cooperations. It explores new facets of privacy protection and accountability for digitally recorded real-world actions as well as novel forms of communication in a descriptive manner.A thorough investigation of main pervasive computing concepts is presented, together with a motivation and elicitation of security requirements within the emergency response application domain; also the state-of-the-art of existing security mechanisms is discussed. The areas covered include: digital pseudonyms and auditing mechanisms, efficient encryption techniques and concepts for end-to-end secure messaging, as well as pervasive computing approaches to first response.The book will be of interest to anybody involved in the design, realization and use of secure and privacy-preserving pervasive computing sys

Chapter

Towards Pervasive Cooperation

Some Security Issues in Pervasive Computing

IT Security, Multilateral Security and Pervasive Systems

The Challenge of Securing a Pervasive System

Privacy and the Need for Privacy Protection

Privacy Protection versus Accountability

Reference Scenario: ICT-Supported Emergency Response

Introduction to Application Domain

Disaster Management Information Systems

Towards Location-Aware First Response

Protection Goals Motivated within Reference Scenario

One-to-Many Communication in Emergency Situations

Emergency Communication Patterns

Security Requirements for Emergency Communication

Privacy and Accountability Issues of Real-World Auditing

Application Examples within Reference Scenario

Security Requirements for Multilaterally Secure Auditing

Summary

State of the Art

The Broader Context

Towards Multilaterally Secure Pervasive Auditing

Relevant Properties of Digital Pseudonyms

Location Privacy Protection based on Pseudonyms

Pseudonymous Auditing

Efficient Constructions of Transaction Pseudonyms

Conclusion

Towards End-to-End Secure Pervasive Communication

Approaches to Secure One-to-Many Messaging

Techniques for End-to-End Encryption

Conclusion

Summary

Novel Security Techniques

Pseudonyms with Implicit Attributes

Construction Principle

Main Primitives

Setting and Main Protocols

Parties

Registration and Generation of Transaction Pseudonyms

Authentication of Transaction Pseudonyms

Linking and Partial Re-Identification

Complete Disclosure of Pseudonyms

Hybrid Encryption Technique for Expressive Policies

Construction Principle

Main Primitives

Setting and Main Mechanisms for Hybrid Encryption

Parties

Encryption and Decryption Schemes

Management and Generation of Private Keys

Summary

Integrated Approach within Reference Scenario

Overview

Parties

Core Interactions

Design of Security Mechanisms

Basic Principles

Make Users Implicitly Addressable via Attributes

Provide Pseudonymous yet Linkable Location Updates

Communication Network Model

Adversary Model

Properties of Outside Adversary

Properties of Inside Adversary

Further Types of Adversaries

System Overview

Parties and Modules

Phases

Interactions

Summary

Mechanisms

Setup

Registration

Representation of Digital Identities

Registration Process

Activation and Group Communication

Overview

Logical Messaging Policy Layer

Access Control Layer

Protocol for End-to-End Secure Messaging

Examples

Location Tracking

Multilaterally Secure Auditing

Overview

Log Analysis Mechanisms

Disclosure Policy and Provision of Authorization Sets

Mechanism for Individual Log Access

Transparency Mechanisms

Scenario and Application Example

Summary

Evaluation and Discussion

Technical Feasibility

Prototype of Auditing Mechanisms

Storage Overhead induced by Transaction Pseudonyms

Prototype Implementation of ABM

Resource Consumptions of ABM

Security

Security Analysis of Auditing

Trust Requirements relevant to Auditing

Independent Security Review of Pseudonymization Technique

Discussion of Hybrid Encryption Technique

Security Analysis of Communication Mechanisms

Appropriateness

Using Pseudonymized Location Traces in Legal Disputes

Supporting Appropriateness of ABM to End Users

Applicability

Pseudonyms with Implicit Attributes

Multilaterally Secure Auditing

Hybrid Encryption Technique

End-To-End Secure ABM

Summary

Summary

Contributions

Conclusion

Outlook

Bibliography

The users who browse this book also browse


No browse record.