Expose or not? A progressive exposure approach for service discovery in pervasive computing environments

In pervasive computing environments, service discovery facilitates users to access network services by automating tedious manual configurations. When network services become pervasive, the number of service providers also increase dramatically. Because of security and privacy concerns, network services are segmented by service providers. Existing service discovery protocols, however, do not address how to facilitate users to properly identify and authenticate with existing service providers. Without prudence, sensitive information may be exposed. Conversely, with prudence both users and service providers prefer the other party to expose sensitive information first. We identify that even among legitimate users and service providers, there are privacy concerns that may be expressed as a chicken-and-egg problem. In this paper, we propose a progressive approach to solve the problem. Users and service providers expose minimal sensitive information in turn and identify necessary exposure during the process. Theoretical analysis, simulation, and experiments show that our approach protects sensitive information with little overhead.

[1]  Michael Nidd,et al.  Service discovery in DEAPspace , 2001, IEEE Wirel. Commun..

[2]  Hari Balakrishnan,et al.  The design and implementation of an intentional naming system , 1999, SOSP.

[3]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[4]  Sheldon M. Ross,et al.  Introduction to Probability Models, Eighth Edition , 1972 .

[5]  Ben Y. Zhao,et al.  An architecture for a secure service discovery service , 1999, MobiCom.

[6]  S. Ungar,et al.  Home network security , 2002, Proceedings 2002 IEEE 4th International Workshop on Networked Appliances (Cat. No.02EX525).

[7]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.

[8]  Marianne Winslett,et al.  A unified scheme for resource protection in automated trust negotiation , 2003, 2003 Symposium on Security and Privacy, 2003..

[9]  Sheldon M. Ross,et al.  Introduction to probability models , 1975 .

[10]  J. Rice Mathematical Statistics and Data Analysis , 1988 .

[11]  Charles E. Perkins,et al.  Service Location Protocol, Version 2 , 1999, RFC.

[12]  Lionel M. Ni,et al.  PrudentExposure: a private and user-centric service discovery protocol , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[13]  Roy Want,et al.  Photographic Authentication through Untrusted Terminals , 2003, IEEE Pervasive Comput..

[14]  David R. Karger,et al.  INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery , 2002, Pervasive.

[15]  Armando Fox,et al.  System Software for Ubiquitous Computing , 2022 .

[16]  Pierangela Samarati,et al.  Regulating service access and information release on the Web , 2000, CCS.

[17]  Matt W. Mutka,et al.  Classification of Service Discovery in Pervasive Computing Environments , 2003 .