Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Context-based authentication and transport of cultural assets

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

We present a ubiquitous system that combines context information, security mechanisms and a transport infrastructure to provide authentication and secure transport of works of art. Authentication is provided for both auctions and exhibitions, where users can use their own mobile devices to authenticate works of art. Transport is provided by a secure protocol that makes use of position–time information and wireless sensors providing context information. The system has been used in several real case studies in the context of the CUSPIS project and continues to be used as a commercial product for the transportation and exhibition of cultural assets in Italy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Notes

  1. In the CUSPIS project, the private keys are generated by the certification authorities and sealed into a tamper-proof device which is delivered securely to the organisations.

  2. We used RFID tags with 128 KB of memory that maintain full compatibility with the EPC standard [11].

  3. Small fluctuations may be consequence of hardware imprecision.

  4. The search inside the revocation lists is performed based on the GD digital signature S, the UC code and the owner.

References

  1. Mostarda L, Dong C, Dulay N (2008) Place and time authentication of cultural assets. In: 2nd Joint ITRUST and PST conferences on privacy, trust and security (IFIPTM 2008)

  2. Center of Study TCI: Dossier of MUSEUM (2006) http://www.touringclub.it/ricerca/pdf/DOSSIER_MUSEI_2007.pdf

  3. Artprice: 2006 Art Market Trends, Tendances du marche’ de l’art (2006) http://img1.artprice.com/pdf/trends2006.pdf

  4. Jacob J (2002) Counterfeit art—how to keep it out of your collection. Chubb Collectors

  5. Mostarda L, Tocchio A, Inverardi P, Costantini S (2007) A geo time authentication system. In: Proceeding of IFIPTM 2007

  6. Radiocarbon Dating (2002) BBC on line resource. http://www.bbc.co.uk/dna/h2g2/A637418

  7. Thermoluminescence (2002) Minnesota State University. http://www.mnsu.edu/emuseum/archaeology/dating/thermoluminescence.html

  8. Klarreich E (2004) Con artists: Scanning program can discern true art. science news 166:340

    Article  Google Scholar 

  9. CUSPIS demonstration and performance evaluation report (2007) CUSPIS official home page. http://www.cuspis-project.info/demonstrations.htm

  10. Stallings W (2006) Cryptography and network security: principles and practice, 4th edn. Prentice Hall

  11. Web page on EPC global organization (2008) http://www.epcglobalinc.org/home

  12. Buchanan JDR, Cowburn RP, Jausovec AV, Petit D, Seem P, Xiong G, Atkinson D, Fenton K, Allwood DA, Bryan MT (2005) ‘Fingerprinting’ documents and packaging. Nature 436:475

    Article  Google Scholar 

  13. Pozzobon O, Wullems C, Kubic K (2004) Secure tracking using trusted GNSS receivers and Galileo authentication services. J Glob Position Syst 3:200–207

    Article  Google Scholar 

  14. Cultural Heritage Space Identification System (CUSPIS) (2007) European Commission 6th framework program—2nd call Galileo joint undertaking. http://www.epcglobalinc.org/home

  15. Next SpA company (2008) http://www.next.it/site/Home.aspx?content=trasporti

  16. Official web page of Galileo (2008) http://www.galileoju.com

  17. Augello A, Santangelo A, Sorce S, Pilato G, Gentile A, Genco A, Gaglio S (2006) Maga: a mobile archaeological guide at Agrigento. University of Palermo, ICAR_CNR

  18. Pilato G, Augello A, Santangelo A, Gentile A, Gaglio S (2006) An intelligent multimodal site-guide for the “parco archeologico della valle dei templi” in Agrigento. In: Proceedings of first European workshop on intelligent technologies for cultural heritage exploitation, at the 17th European conference on artificial intelligence

  19. Park D, Nam T, Shi C, Golub G, Loan CV (2006) Designing an immersive tour experience system for cultural tour sites. In: Chi ’06 extended abstracts on human factors in computing systems edition, April 22–27. ACM Press, Montréal, Québec, Canada, pp 1193–1198

  20. Vicenzaoro winter: Traceability and guarantee label (2007) http://www.vicenzafiera.it/uk/rassegna/vioro1_2007/crapanzano_en.doc

  21. Juels A (2006) Rfid security and privacy: a research survey. IEEE J Sel Areas Commun

  22. Caputo T (2005) Rfid technology beyond wal-mart. WinesandVines

  23. Web page of the TagStream Company (2008) http://www.tagstreaminc.com

  24. Texas Instruments and VeriSign, Inc. (2007) Securing the pharmaceutical supply chain with RFID and public-key infrastructure technologies

  25. Juels A, Weis SA (2005) Authenticating pervasive devices with human protocols. In: Shoup V (ed) CRYPTO. Volume 3621 of lecture notes in computer science. Springer, pp 293–308

  26. Tuyls P, Batina L (2006) Rfid-tags for anti-counterfeiting. In: Pointcheval D (ed) CT-RSA. Volume 3860 of lecture notes in computer science. Springer, pp 115–131

  27. EPC global standard powered by GS1: Object Naming Service (ONS) 5 Version 1.0 (2005)

  28. Mirowski L (2006) Detecting clone radio frequency identifications tags. Bachelor’s Thesis, School of Computing, University of Tasmania

  29. Lehtonen M, Michahelles F, Fleisch E (2007) Probabilistic approach for location-based authentication. In: 1st International workshop on security for spontaneous interaction IWSSI 2007

  30. Anderson RJ (1998) On the security of digital tachographs. In: ESORICS ’98: proceedings of the 5th European symposium on research in computer security. Springer-Verlag, London, UK, pp 111–125

  31. A GPS based monitoring system (2008) http://www.vehiclegpstrackingsystem.com/

Download references

Acknowledgments

This research was supported by UK EPSRC research grants EP/D076633/1 (UBIVAL) and EP/C537181/1 (CAREGRID). We would also like to thank the members of the Policy Research Group at Imperial College, and the CUSPIS partners: the Next S.p.A. research group, Vodafone, and the Italian and Greek ministries who supported our case studies.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Leonardo Mostarda.

Additional information

This article is a revised and extended version of a paper that was presented at the IFIPTM 2008 conference [1].

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mostarda, L., Dong, C. & Dulay, N. Context-based authentication and transport of cultural assets. Pers Ubiquit Comput 14, 321–334 (2010). https://doi.org/10.1007/s00779-009-0233-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-009-0233-8

Keywords