A privacy preserving access control scheme using anonymous identification for ubiquitous environments

Nguyen Ngoc Diep, Sungyoung Lee, Young Koo Lee, Hee Jo Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one hand, service providers want to authenticate legitimate users and make sure they are accessing their authorized services in a legal way. On the other hand, users prefer not to expose any sensitive information to anybody. They want to have complete control on their personal data, without being tracked down for wherever they are, whenever and whatever they do. In this paper, we introduce an anonymous identification authentication and access control scheme to secure interactions between users and services in ubiquitous environments. The scheme uses anonymous user ID, sensitive data sharing method, and account management to provide a lightweight authentication while keeping users anonymously interacting with the services in a secure and flexible way.

Original languageEnglish
Title of host publicationProceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007
Pages482-487
Number of pages6
DOIs
Publication statusPublished - 2007
Event4296821 - Daegu, Korea, Republic of
Duration: 2007 Aug 212007 Aug 24

Publication series

NameProceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007

Other

Other4296821
CountryKorea, Republic of
CityDaegu
Period07/8/2107/8/24

ASJC Scopus subject areas

  • Computer Science Applications
  • Control and Systems Engineering
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'A privacy preserving access control scheme using anonymous identification for ubiquitous environments'. Together they form a unique fingerprint.

Cite this