Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A Flexible Privacy and Trust Based Context-Aware Secure Framework

  • Conference paper
Aging Friendly Technology for Health and Independence (ICOST 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6159))

Included in the following conference series:

  • 2245 Accesses

Abstract

Ubiquitous and pervasive technologies contribute significantly to the quality of life of dependent people by providing personalized services in context aware environments. The deployment of these services within indoor and outdoor environments still require security, privacy and trust issues for dependent persons. Considering the strong links between these three issues, our challenging task was to integrate them in a common and flexible framework using contextual information. In this paper, we propose a security framework that integrates context awareness to perform authentication and access control in a very flexible and scalable model while ensuring both privacy and trust. The framework focuses on the authentication of users who request access to the resources of smart environment system through static devices (i.e. smart card, RFID, etc.), or dynamic devices (i.e. PDA, mobile phones, etc.).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Mhamed, A.: Safety, Security, Privacy and Trust in Smart Environements. In: Helal, A., Mokhtari, M., Abdulrazak, B. (eds.) The Engineering Handbook on Smart Technology for Aging, Disability and Indepen- dence. Computer Engineering Series. John Wiley & Sons, Chichester (2007), ISBN 0471711551

    Google Scholar 

  2. Covington, J.M., Sastry, M., Manohar, D.J.: Attribute-Based Authentication Model for Dynamic Mobile Environments. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 227–242. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Marc, L.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)

    Google Scholar 

  4. Corner, M.D., Noble, B.D.: Protecting Applications with Transient Authentication. In: Proceeding of the First International Conference on Mobile Systems, Applications and Services, pp. 57–70 (2003)

    Google Scholar 

  5. Glynos, D., Kotzanikolaou, P., Douligeris, C.: Preventing Impersonation Attacks in MANET with Multi-Factor Authentication. In: Proceeding of the Third International Symposium on Modeling and Optimization in Mobile Ad-hoc, and Wireless Networks, pp. 59–64 (2005)

    Google Scholar 

  6. Jakob, B., Rasmus, K., Michael, P.: Context-aware user authentication: Supporting proximity-based login in pervasive computing. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 107–123. Springer, Heidelberg (2003)

    Google Scholar 

  7. Creese, S.J., Goldsmith, M.H., Zakiuddin, B.R.: Authentication in Pervasive Computing. In: Proceeding of the First International Conference on Security in Pervasive Computing, SPC (2003)

    Google Scholar 

  8. Qin, W., Daqing, Z., Mounir, M., Yuanchun, S., Kejun, D.: Combining User Profiles and Situation Context for Spontaneous Service Provision in Smart Assistive Environments. In: Proceeding of the 5th International Conference on Ubiquitous Intelligence and Computing, pp. 187–200 (2008)

    Google Scholar 

  9. Behzad, M., Ali, M., Ahmed, K.: A Framework for Context-Aware Authentication. In: Proceeding of 2008 IET 4th International Conference on Intelligent Environments, pp. 1–8 (2008)

    Google Scholar 

  10. Adrian, L., Chris, M.J.: Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 73–90. Springer, Heidelberg (2007)

    Google Scholar 

  11. Abi-Char, P., Mhamed, A., El-Hassan, B., Mokhtari, M.: A Dynamic Trust- Based Context-Aware Authentication Framework With Privacy Preserving. Proceeding of International Journal of Computer and Network Security, IJCNS 2 (accepted) (to appear)

    Google Scholar 

  12. Abi-Char, P., Mhamed, A., El-Hassan, B., Mokhtari, M.: Secure Authenticated and Key Agreement Protocols With Access Control for Mobile Environments. Proceeding of International Journal of Computer Science and Information Security, IJCSIS 6(2), 170–183 (2009) (Best Paper Award)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Abi-Char, P.E., Mhamed, A., El-Hassan, B., Mokhtari, M. (2010). A Flexible Privacy and Trust Based Context-Aware Secure Framework. In: Lee, Y., et al. Aging Friendly Technology for Health and Independence. ICOST 2010. Lecture Notes in Computer Science, vol 6159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13778-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13778-5_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13777-8

  • Online ISBN: 978-3-642-13778-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics