Abstract
In this paper, we propose an architecture to enable service providers personalise services in a pervasive environment, while minimising risks to users’ privacy. We describe the design of two critical parts of such systems: a mechanism forr defining authenticated personas that can be pseudonymous; and mechanisms for users to share such personas with service providers. A trust-based approach supports decisions about accepting personas. We describe a prototype implementation and performance evaluations.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Jiang, X., Landay, J.A.: Modeling Privacy Control in Context-Aware Systems. IEEE Pervasive Computing 1(3), 59–63 (2002)
Myles, G., Friday, A., Davies, N.: Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computing 2(1), 56–64 (2003)
Beresford, A., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1), 46–55 (2003)
Hengartner, U., Steenkiste, P.: Access Control to Information in Pervasive Computing Environments. In: Ninth Workshop on Hot Topics in Operating Systems (HotOS IX). ACM, New York (2003)
Ishitani, I., Almedia, V., Meira, W.: Masks: Bringing Anonymity and Personalisation Together. IEEE Pervasive Computing 2(2), 18–23 (2003)
Goldberg, A.: A Pseudonymous Communications Infrastructure for the Internet, PhD Thesis, University of California at Berkely (2000)
Vinge, V.: True Names, Dell Books (1981)
Campbell, R.H., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards security and privacy for pervasive computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 1–15. Springer, Heidelberg (2003)
Rao, J., Rohatgi, P.: Can Pseudonymity Really Guarantee Privacy? In: 9th USENIX Security Symposium, Denver, USA (August 2000), pp. 85–96.
Kay, J., Kummerfeld, R.J., Lauder, P.: Personis: a server for user models. In: De Bra, P., Brusilovsky, P., Conejo, R. (eds.) Proceedings of AH 2002, Adaptive Hypertext 2002, pp. 203–212. Springer, Heidelberg (2002)
Kobsa, A., Schreck, J.: Privacy through Pseudonymity in User-Adaptive Systems. ACM Transactions on Internet Technology 3(2), 149–183 (2003)
Kobsa, A.: A Taxonomy of Beliefs and Goals for User Models in Dialog Systems. In: Kobsa, A., Wahlster, W. (eds.) User Models in Dialog Systems. Springer Symbolic Computation, New York (1989)
Kobsa, A.: Generic User Modeling Systems. User Modeling and User-Adapted Interaction 11(1-2), 49–63 (2001)
Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)
Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing 2(1), 56–64 (2003)
Pfitzmann, A., Hansen, M.: Anonymity, Unobservability, Pseudonymity and Identity Management – A Proposal for Terminology, http://www.freehaven.net/anonbib/cache/terminology.pdf
Hitchens, M., Kay, J., Kummerfeld, R.J.: School of Information Technologies, Secure identity management for pseudo-anonymous service access. TR 546 School of Information Technologies, University of Sydney (June 2004)
Brar, A., Kay, J.: Privacy and Security in Ubiquitous Personalized Applications. TR 561. School of Information Technologies, University of Sydney (November 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hitchens, M., Kay, J., Kummerfeld, B., Brar, A. (2005). Secure Identity Management for Pseudo-Anonymous Service Access. In: Hutter, D., Ullmann, M. (eds) Security in Pervasive Computing. SPC 2005. Lecture Notes in Computer Science, vol 3450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-32004-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-32004-3_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25521-5
Online ISBN: 978-3-540-32004-3
eBook Packages: Computer ScienceComputer Science (R0)