Title :
UCSMssp: Ubiquitous computing service model based on SPKI/SDSI and P2P
Author :
Sun, Daoqing ; Pu, Fang ; Cao, Qiying
Author_Institution :
Coll. of Inf. Sci. & Technol., Donghua Univ., Shanghai
Abstract :
Ubiquitous computing systems typically have lots of security problems in the area of service supply. The service types and levels, the security delegation of services and the identity hiding of principal etc are all these unsolved problems. In this paper, UCSMssp, a new novel ubiquitous computing service model based on SPKI/SDSI and P2P is presented. SPKI-based authorization is exploited in UCSMssp to solve above problems in small-scale ubiquitous computing environments. The DHT and flooding or random walk technology of Peer-to-Peer overlay network over the Internet is expanded to solve the routing search in large-scale ubiquitous computing environments. The architecture of ubiquitous computing environment, the service authorization processes and the service supply processes etc of UCSMssp are described in the paper. The performance analysis shows that UCSMssp is a suitable security solution used in large-scale ubiquitous computing environments.
Keywords :
Internet; authorisation; peer-to-peer computing; public key cryptography; search problems; ubiquitous computing; Internet; authorization; distributed hash table; peer-to-peer computing; random walk technology; routing search; service level; service type; simple distributed security infrastructure; simple public key infrastructure; ubiquitous computing service model; Authorization; Educational institutions; IP networks; Information security; Large-scale systems; Libraries; Mobile computing; Peer to peer computing; Performance analysis; Ubiquitous computing; Peer-to-Peer; SPKI/SDSI; Security; Service Model; Ubiquitous Computing;
Conference_Titel :
Intelligent Control and Automation, 2008. WCICA 2008. 7th World Congress on
Conference_Location :
Chongqing
Print_ISBN :
978-1-4244-2113-8
Electronic_ISBN :
978-1-4244-2114-5
DOI :
10.1109/WCICA.2008.4593373