Privacy Preserving in Ubiquitous Computing: Architecture Information Technology Journal 8 (6): 910-916, 2009 Tinghuai Ma, Sen Yang, Wei Tian, Wenjie Liu.

Slides:



Advertisements
Similar presentations
Towards Usage Control Models: Beyond Traditional Access Control 7 th SACMAT, June 3, 2002 Jaehong Park and Ravi Sandhu Laboratory for Information Security.
Advertisements

1 Term 2, 2004, Lecture 9, Distributed DatabasesMarian Ursu, Department of Computing, Goldsmiths College Distributed databases 3.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 :JongHyup LEE 出處.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Gefördert durch das Kompetenzzentrenprogramm DI Alfred Wertner 19. September 2014 Ubiquitous Personal Computing © Know-Center Security.
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
Protection of Identity Information in Cloud Computing without Trusted Third Party 作者 :Rohit Ranchal, Bharat Bhargave, Lotfi Ben Othmane, Leszek Lilien,
A PASS Scheme in Clouding Computing - Protecting Data Privacy by Authentication and Secret Sharing Jyh-haw Yeh Dept. of Computer Science Boise State University.
A Secure Remote User Authentication Scheme with Smart Cards Manoj Kumar 報告者 : 許睿中 日期 :
CENTRE Cellular Network’s Positioning Data Generator Fosca GiannottiKDD-Lab Andrea MazzoniKKD-Lab Puntoni SimoneKDD-Lab Chiara RensoKDD-Lab.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
Preventing Spam For SIP-based Sessions and Instant Messages Kumar Srivastava Henning Schulzrinne June 10, 2004.
YA-TRAP: Yet Another Trivial RFID Authentication Protocol Gene Tsudik International Conference on Pervasive Computing and Communications, PerCom 2006.
ICPCA 2008 Research of architecture for digital campus LBS in Pervasive Computing Environment 1.
TEMPLATE DESIGN © Privacy Issues of Vehicular Ad-hoc Networks (VANETs) Hang Dok and Ruben Echevarria Advisor: Dr. Huirong.
PRIAM: PRivate Information Access Management on Outsourced Storage Service Providers Mark Shaneck Karthikeyan Mahadevan Jeff Yongdae Kim.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Sensor Networks Storage Sanket Totala Sudarshan Jagannathan.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto.
Gurpreet Dhillon Virginia Commonwealth University
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Adaptive Trust Negotiation and Access Control Tatyana Ryutov, et.al. Presented by: Carlos Caicedo.
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
1 A Secure System Based on Fingerprint Authentication Scheme Author : Zhe Wu,Jie Tian,Liang Li, Cai-ping Jiang,Xin Yang Prestented by Chia Jui Hsu.
1 Dept of Information and Communication Technology Creating Objects in Flexible Authorization Framework ¹ Dep. of Information and Communication Technology,
A Security Architecture Concept for Vehicular Network Nodes 蔡嘉翔 許閔傑.
Preserving Privacy in Participatory Sensing Systems Authors: Kuan Lun Huang, Salil S. Kanhere (School of CS & Engg., The University of New South Wales,
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
多媒體網路安全實驗室 Protecting the Privacy of Users in e-Commerce Environment Date: Reporter:Chien-Wen Huang Author: Chun-Hua Chen and Gwoboa Horng 出處:
Chapter No 4 Query optimization and Data Integrity & Security.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
Data Access and Security in Multiple Heterogeneous Databases Afroz Deepti.
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
Abstract With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial.
A Security Architecture for Computational Grids Ian Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke Reporter : Po - Jen Lo.
CORBA1 Distributed Software Systems Any software system can be physically distributed By distributed coupling we get the following:  Improved performance.
A Mobile Terminal Based Trajectory Preserving Strategy for Continuous Querying LBS Users Yunxia Feng, Peng Liu, Jianhui Zhang May , 2012 Hangzhou,
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
Vehicular Cloud Networking: Architecture and Design Principles
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
多媒體網路安全實驗室 Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments Date:2011/05/05 報告人:向峻霈 出處 : Jalal Al-Muhtadi,
Time-Space Trust in Networks Shunan Ma, Jingsha He and Yuqiang Zhang 1 College of Computer Science and Technology 2 School of Software Engineering.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp , 作者: Yoh Shiraishi, Ryo Miki 指導教授:許子衡 教授.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 : Xiong Li, Yongping.
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Security of the Internet of Things: perspectives and challenges
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Presented by Edith Ngai MPhil Term 3 Presentation
Professor Tzong-Chen Wu
Location Cloaking for Location Safety Protection of Ad Hoc Networks
ONLINE SECURE DATA SERVICE
Presentation transcript:

Privacy Preserving in Ubiquitous Computing: Architecture Information Technology Journal 8 (6): , 2009 Tinghuai Ma, Sen Yang, Wei Tian, Wenjie Liu 報告者 : 許睿中 日期 :10.18

Outline Introductions The Structure of PAS Spatiotemporally-based anonymous Service matching Random coordinates Fixed coordinates Discussion Conclusion

Introduces Ubiquitous computing represents the concept of seamless everywhere computing and aims at making computing and communication essentially transparent to the users. Personal informational con be divided into two part: ◦ identification ◦ Profile

The Structure of PAS Focus on three main principle in our Privacy-Aware System(PSA): ◦ Anonymity( 匿名性 ) ◦ Untraceability( 不留痕跡 ) ◦ Confidentiality( 機密性 )

The Structure of PAS Access base ◦ Is a software and responsible to deal with the query. ◦ The access base is separated from privacy system, because it can deal with all entities with no authentication. ◦ It will respond entity’s query quickly, as avoiding complexity authentication in privacy system. ◦ At the same time, the malicious entities will be filtrated outside the privacy system.

The Structure of PAS Entity Privacy system Authentication center Service provider Access base trustful domain distrustful domain 1.RSN and query service service list 4.the list 5.e-RSN and PPL 6.identification 7.ps-RSN 8.verify its validity sending the ps-RSN 9.notarization taking ps-RSN as identification 10.PPL 11.apply the service utilizing the ps-RSN 12.teansfers service

System divides time into pieces, carves out the entire domain into some certain areas. When a person’s random data stream is due or out of the confined area, the random data stream updates itself and distributes a new data stream to represent the person, then invalidates the old random data stream. Spatiotemporally-based anonymous

1:00 The prescriptive time The time interval is 30 min The RSN refreshed itself

Spatiotemporally-based anonymous 1:00 More than 30 min here The time interval is 30 min The RSN refreshed itself

Service matching All the services in ubiquitous computing have the limits of spatial and temporal. Only the service’s spatial and temporal preferences strictly match with the entity’s requirements, the service is valid for entity.

Service matching Example: Service: Entity: The service match can be processed as follow: If mSer is true, the service matching is successful.

Random coordinates The service is available in a relatively large domain, the privacy system mask the entity’s precise spatiotemporal information, so system randomly chooses a geographic location coordinates within the valid area and sent it to the relevant SP. Service: Entity: The privacy system can disturb the entity’s location information to random data as:

Fixed coordinates Privacy system provides a fixed coordinate to whoever enters the service area regardless of any different coordinate, if the enters are in the service valid area.

Discussion Anonymity: ◦ First, user are anonymously while in querying, applying and utilizing service, as only RSNs used to indicate the users. ◦ Secondly, the RSNs can be changed using a spatiotemporally-based anonymous strategy. Protection of user preference: ◦ We assume the AC is trustful. So, we can say users’ preference won’t be leaked.

Discussion Non-linkability: ◦ Each session, every users has different temporal RSN as identifier under spatiotemporally-based anonymous. Performance evaluation: ◦ We divide the steps into two processes, one is query service process, which step 1 to 4. The other is applying service process, which include step 5 to 12.

Conclusion This study is the first step to integrate privacy protection technologies into access control architecture for ubiquitous computing.