Abstract
A logic-based language is often adopted in systems for pervasive computing, because it provides a convenient way to define rules that change the behavior of the systems dynamically. Those systems might define rules that refer to the users’ context information to provide context-aware services. For example, a smart-home application could define rules referring to the location of a user to control the light of a house automatically. In general, the context information is maintained in different administrative domains, and it is, therefore, desirable to construct a proof in a distributed way while preserving each domain’s confidentiality policies. In this paper, we introduce such a system, a secure distributed proof system for context-sensitive authorization and show that our novel caching and revocation mechanism improves the performance of the system, which depends on public key cryptographic operations to protect confidential information in rules and facts. Our revocation mechanism maintains dependencies among facts and recursively revokes across multiple hosts all the cached facts that depend on a fact that has become invalid. Our initial experimental results show that our caching mechanism, which maintains both positive and negative facts, significantly reduces the latency for handling a logical query.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, D.: Cerberus: a context-aware security scheme for smart spaces. In: Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, March 2003, pp. 489–496. IEEE Computer Society Press, Los Alamitos (2003)
Bacon, J., Moody, K., Yao, W.: A model of OASIS role-based access control and its support for active security. In: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, vol. 5(4), pp. 492–540 (2002)
Bauer, L., Garriss, S., Reiter, M.K.: Distributed proving in access-control systems. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 81–95. IEEE Computer Society Press, Washington, DC, USA (2005)
Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996)
Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1), 46–55 (2003), http://www.computer.org/pervasive/pc2003/b1046abs.htm
Brezillon, P.: Context-based security policies: A new modeling approach. In: Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, March 2004, pp. 154–158. IEEE Computer Society, Los Alamitos (2004), http://csdl.computer.org/comp/proceedings/percomw/2004/2106/00/21060154abs.htm
Chen, H., Finin, T., Joshi, A.: An Ontology for Context-Aware Pervasive Computing Environments. Special Issue on Ontologies for Distributed Systems, Knowledge Engineering Review 18(3), 197–207 (2004)
Covington, M.J., Long, W., Srinivasan, S., Dey, A.K., Ahamad, M., Abowd, G.D.: Securing context-aware applications using environment roles. In: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, pp. 10–20. ACM Press, New York (2001)
Data Encryption Standard (DES) (October 1999), http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
Henricksen, K., Indulska, J.: A software engineering framework for context-aware pervasive computing. In: Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), pp. 77–86. IEEE Computer Society, Washington, DC, USA (2004)
Hulsebosch, R.J., Salden, A.H., Bargh, M.S., Ebben, P.W.G., Reitsma, J.: Context Sensitive Access Control. In: Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, Baltimore, MD, June 2005, pp. 111–119 (2005), http://doi.acm.org/10.1145/1063979.1064000
National incident management system (March 2004), http://www.fema.gov/pdf/nims/nims_doc_full.pdf
Katsiri, E., Mycroft, A.: Knowledge representation and scalable abstract reasoning for sentient computing using first-order logic. In: Proceedings of Challenges and Novel Applications for Automatic Reasoning (CADE-19), July 2003, pp. 73–87 (2003)
Krawczyk, H., Bellare, M., Canetti, R.: Hmac: Keyed-hashing for message authentication. Internet RFC 2693 (February 1997), http://www-cse.ucsd.edu/users/mihir/papers/rfc2104.txt
Minami, K.: Secure context-sensitive authorization. Technical Report TR2006-571, Dept. of Computer Science, Dartmouth College (February 2006)
Minami, K., Kotz, D.: Secure context-sensitive authorization. In: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications (PerCom), Kauai, Hawaii, March 2005, pp. 257–268 (2005), http://www.cs.dartmouth.edu/~dfk/papers/minami:csa.pdf
Minami, K., Kotz, D.: Secure context-sensitive authorization. Journal of Pervasive and Mobile Computing 1(1), 123–156 (2005), http://www.cs.dartmouth.edu/~dfk/papers/minami:jcsa.pdf
Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing 2(1), 56–64 (2003)
Ranganathan, A., Campbell, R.H.: An infrastructure for context-awareness based on first order logic. Personal Ubiquitous Computing 7(6), 353–364 (2003)
RFC 1423 - Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers (February 1993), http://www.faqs.org/rfcs/rfc1423.html
Rivest, R.L.: The MD5 message-digest algorithm (April 1992), http://www.ietf.org/rfc/rfc1321.txt
Schilit, B.N., Adams, N., Want, R.: Context-aware computing applications. In: Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, California, December 1994, pp. 85–90. IEEE Computer Society Press, Los Alamitos (1994), ftp://ftp.parc.xerox.com/pub/schilit/wmc-94-schilit.ps
Tanenbaum, A.S., van Renesse, R., van Staveren, H., Sharp, G.J., Mullender, S.J.: Experiences with the amoeba distributed operating system. Communications of the ACM 33(12), 46–63 (1990)
Tripathi, A., Ahmed, T., Kulkarni, D., Kumar, R., Kashiramka, K.: Context-based secure resource access in pervasive computing environments. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, March 2004, pp. 159–163. IEEE Computer Society, Los Alamitos (2004), http://csdl.computer.org/comp/proceedings/percomw/2004/2106/00/21060159abs.htm
Vaucher, J.: XProlog.java: the successor to Winikoff’s WProlog (February 2003), http://www.iro.umontreal.ca/~vaucher/XProlog/AA_README
Zheng, P.: Tradeoffs in certificate revocation schemes. ACM SIGCOMM Computer Communication Review 33(2), 103–112 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Minami, K., Kotz, D. (2006). Scalability in a Secure Distributed Proof System. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds) Pervasive Computing. Pervasive 2006. Lecture Notes in Computer Science, vol 3968. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11748625_14
Download citation
DOI: https://doi.org/10.1007/11748625_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33894-9
Online ISBN: 978-3-540-33895-6
eBook Packages: Computer ScienceComputer Science (R0)