A privacy preserving access control scheme using anonymous identification for ubiquitous environments

Nguyen Ngoc Diep, Sungyoung Lee, Young Koo Lee, Heejo Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one hand, service providers want to authenticate legitimate users and make sure they are accessing their authorized services in a legal way. On the other hand, users prefer not to expose any sensitive information to anybody. They want to have complete control on their personal data, without being tracked down for wherever they are, whenever and whatever they do. In this paper, we introduce an anonymous identification authentication and access control scheme to secure interactions between users and services in ubiquitous environments. The scheme uses anonymous user ID, sensitive data sharing method, and account management to provide a lightweight authentication while keeping users anonymously interacting with the services in a secure and flexible way.

Original languageEnglish
Title of host publicationProceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007
Pages482-487
Number of pages6
DOIs
Publication statusPublished - 2007 Dec 1
Event4296821 - Daegu, Korea, Republic of
Duration: 2007 Aug 212007 Aug 24

Other

Other4296821
CountryKorea, Republic of
CityDaegu
Period07/8/2107/8/24

Fingerprint

Access control
Authentication
Data privacy
Ubiquitous computing

ASJC Scopus subject areas

  • Computer Science Applications
  • Control and Systems Engineering
  • Electrical and Electronic Engineering

Cite this

Diep, N. N., Lee, S., Lee, Y. K., & Lee, H. (2007). A privacy preserving access control scheme using anonymous identification for ubiquitous environments. In Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007 (pp. 482-487). [4296887] https://doi.org/10.1109/RTCSA.2007.11

A privacy preserving access control scheme using anonymous identification for ubiquitous environments. / Diep, Nguyen Ngoc; Lee, Sungyoung; Lee, Young Koo; Lee, Heejo.

Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. 2007. p. 482-487 4296887.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Diep, NN, Lee, S, Lee, YK & Lee, H 2007, A privacy preserving access control scheme using anonymous identification for ubiquitous environments. in Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007., 4296887, pp. 482-487, 4296821, Daegu, Korea, Republic of, 07/8/21. https://doi.org/10.1109/RTCSA.2007.11
Diep NN, Lee S, Lee YK, Lee H. A privacy preserving access control scheme using anonymous identification for ubiquitous environments. In Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. 2007. p. 482-487. 4296887 https://doi.org/10.1109/RTCSA.2007.11
Diep, Nguyen Ngoc ; Lee, Sungyoung ; Lee, Young Koo ; Lee, Heejo. / A privacy preserving access control scheme using anonymous identification for ubiquitous environments. Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. 2007. pp. 482-487
@inproceedings{59520ea65390446e9fe68b7766e97244,
title = "A privacy preserving access control scheme using anonymous identification for ubiquitous environments",
abstract = "Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one hand, service providers want to authenticate legitimate users and make sure they are accessing their authorized services in a legal way. On the other hand, users prefer not to expose any sensitive information to anybody. They want to have complete control on their personal data, without being tracked down for wherever they are, whenever and whatever they do. In this paper, we introduce an anonymous identification authentication and access control scheme to secure interactions between users and services in ubiquitous environments. The scheme uses anonymous user ID, sensitive data sharing method, and account management to provide a lightweight authentication while keeping users anonymously interacting with the services in a secure and flexible way.",
author = "Diep, {Nguyen Ngoc} and Sungyoung Lee and Lee, {Young Koo} and Heejo Lee",
year = "2007",
month = "12",
day = "1",
doi = "10.1109/RTCSA.2007.11",
language = "English",
isbn = "0769529755",
pages = "482--487",
booktitle = "Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007",

}

TY - GEN

T1 - A privacy preserving access control scheme using anonymous identification for ubiquitous environments

AU - Diep, Nguyen Ngoc

AU - Lee, Sungyoung

AU - Lee, Young Koo

AU - Lee, Heejo

PY - 2007/12/1

Y1 - 2007/12/1

N2 - Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one hand, service providers want to authenticate legitimate users and make sure they are accessing their authorized services in a legal way. On the other hand, users prefer not to expose any sensitive information to anybody. They want to have complete control on their personal data, without being tracked down for wherever they are, whenever and whatever they do. In this paper, we introduce an anonymous identification authentication and access control scheme to secure interactions between users and services in ubiquitous environments. The scheme uses anonymous user ID, sensitive data sharing method, and account management to provide a lightweight authentication while keeping users anonymously interacting with the services in a secure and flexible way.

AB - Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one hand, service providers want to authenticate legitimate users and make sure they are accessing their authorized services in a legal way. On the other hand, users prefer not to expose any sensitive information to anybody. They want to have complete control on their personal data, without being tracked down for wherever they are, whenever and whatever they do. In this paper, we introduce an anonymous identification authentication and access control scheme to secure interactions between users and services in ubiquitous environments. The scheme uses anonymous user ID, sensitive data sharing method, and account management to provide a lightweight authentication while keeping users anonymously interacting with the services in a secure and flexible way.

UR - http://www.scopus.com/inward/record.url?scp=46449110324&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=46449110324&partnerID=8YFLogxK

U2 - 10.1109/RTCSA.2007.11

DO - 10.1109/RTCSA.2007.11

M3 - Conference contribution

AN - SCOPUS:46449110324

SN - 0769529755

SN - 9780769529752

SP - 482

EP - 487

BT - Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007

ER -