JOURNAL ARTICLE

A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments

Abstract

In a pervasive computing environment, users interact with many smart devices or service providers (SPs) to obtain some useful services from them. These SPs can be either genuine or malicious. As a result, users privacy is at a greater risk, as they are prone to revealing their location, identity and transactions information to such SPs. On the other hand, user authentication is also required for SPs to provide service access control to only authorized users. In order to protect users privacy, they must be allowed to have anonymous interactions with SPs. But, authenticating and authorizing an anonymous user becomes a challenging task. In this paper, we propose a simple and efficient scheme that allows users to anonymously interact with SPs and the SPs can effectively authenticate and authorize the users based on the anonymous information submitted by the users.

Keywords:
Computer science Computer security Authentication (law) Anonymity Internet privacy Service provider Ubiquitous computing Identity (music) Task (project management) Service (business) Scheme (mathematics) Information privacy Access control Human–computer interaction Business

Metrics

10
Cited By
1.92
FWCI (Field Weighted Citation Impact)
25
Refs
0.88
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence
User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

JOURNAL ARTICLE

A privacy-preserving authentication scheme using biometrics for pervasive computing environments

Lin YaoXiangwei KongGuowei WuQingna FanChi Lin

Journal:   Journal of Electronics (China) Year: 2010 Vol: 27 (1)Pages: 68-78
JOURNAL ARTICLE

A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments

Kui RenWenjing LouKihong KimRobert H. Deng

Journal:   IEEE Transactions on Vehicular Technology Year: 2006 Vol: 55 (4)Pages: 1373-1384
BOOK-CHAPTER

Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments

Emmanouil MagkosPanayiotis Kotzanikolaou

Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Year: 2010 Pages: 53-64
JOURNAL ARTICLE

A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments

Zuowen Tan

Journal:   Journal of Network and Computer Applications Year: 2012 Vol: 35 (6)Pages: 1839-1846
© 2026 ScienceGate Book Chapters — All rights reserved.