Building a Trusted Location Service for Pervasive Computing Environments
نویسندگان
چکیده
Locationand context-awareness significantly enhance the functionality of pervasive computing services and applications, and enrich the way they interact with users and resources in the environment. Much of this functionality depends on validating context information and using it for granting access to data or resources. Since location and context services are usually composed of various distributed components spread throughout the pervasive environment, it is essential to develop a threat model that can be used as basis for developing a trustworthy platform for managing location and context information. In this paper we examine the various ways that trust can be incorporated and asserted in a location service for a pervasive environment. We specify the trust requirements for a non-forgeable location service for a pervasive computing space. Our approach is unique in that it is based on certification of behavior rather than a traditional reputation-based approach to trust. In our system, trust in a particular component is derived from its ability to attest that its actions meet the trust requirements.
منابع مشابه
A context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملAn Approach for Location privacy in Pervasive Computing Environment
AbstractThis paper focus on location privacy in location based services, Location privacy is a particular type of information privacy that can be defined as the ability to prevent others from learning one’s current or past location. Many systems such as GPS implicitly and automatically give its users location privacy. Once user sends his or her current location to the application server, Applic...
متن کاملA Semantic Location Service for Pervasive Grids
In the last decade, Grid Computing and Pervasive Computing paradigms have emerged and rapidly affirmed. These two worlds, however, can no longer be separated islands. As a matter of fact, traditional grids are moving towards Pervasive Grid environments and, as a result, they benefit from both grid and mobile technologies. In particular, a key feature of the Pervasive Computing paradigm, like th...
متن کاملA Context-Aware Entity Recognition Scheme for Pervasive Computing
In the future world filled with pervasive computing, almost all entities can be mobile, which means not only service requesters but also service providers are always dynamic and unpredictable. This raises two security problems. For service providers, how can they keep their security capability when they move here and there? And for service requesters, how can they be trusted by various service ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007