Private and secure service discovery via progressive approach in pervasive computing environments

The dynamic property of pervasive computing hinders users to have complete knowledge of the relationship among services, service providers, and credentials. The involvement of only the necessary users and service providers for service discovery in pervasive computing environments is challenging. Without prudence, users' and service providers' requests or service information, their identities, and their presence information may be sacrificed. The problem may be as difficult as a chicken-and-egg problem, in which both users and service providers want the other parties to expose sensitive information first. In this paper, we propose a progressive approach to solve the problem. Users and service providers expose partial information in turn and avoid unnecessary exposure if there is any mismatch. Although 1 or 2 bits of information are exchanged in each message, the theoretical analysis and experiments show that our approach protects sensitive information with little overhead.

[1]  Marianne Winslett,et al.  A unified scheme for resource protection in automated trust negotiation , 2003, 2003 Symposium on Security and Privacy, 2003..

[2]  S. Ungar,et al.  Home network security , 2002, Proceedings 2002 IEEE 4th International Workshop on Networked Appliances (Cat. No.02EX525).

[3]  Pierangela Samarati,et al.  Regulating service access and information release on the Web , 2000, CCS.

[4]  Hans Scholten,et al.  Home Network Security , 2008, Seventh International Conference on Networking (icn 2008).

[5]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[6]  Lionel M. Ni,et al.  A private, secure, and user-centric information exposure model for service discovery protocols , 2006, IEEE Transactions on Mobile Computing.

[7]  Ben Y. Zhao,et al.  An architecture for a secure service discovery service , 1999, MobiCom.

[8]  Lionel M. Ni,et al.  Service discovery in pervasive computing environments , 2005, IEEE Pervasive Computing.

[9]  Ninghui Li,et al.  Protecting sensitive attributes in automated trust negotiation , 2002, WPES '02.

[10]  Ninghui Li,et al.  Towards practical automated trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[11]  Marianne Winslett,et al.  Negotiating Trust on the Web , 2002, IEEE Internet Comput..

[12]  Roy Want,et al.  Photographic Authentication through Untrusted Terminals , 2003, IEEE Pervasive Comput..