IDEAS home Printed from https://ideas.repec.org/a/sae/intdis/v5y2009i1p21-21.html
   My bibliography  Save this article

Anonymity Authentication and Measure in Ubiquitous Computing

Author

Listed:
  • Guo Yajun
  • Yan Huifang
  • Li Rong

Abstract

Authentication and anonymity usually are inconsistent. To obtain services, a user must be authenticated. Much of the sensitive information of the user will be exposed to service providers. In order to protect privacy, users must communicate with service providers in an anonymous way. But if the user does not show his true identity, how can the service provider believe that the user is true. This paper presents a secure anonymity authentication protocol for ubiquitous computing which allows service providers to authenticate anonymous users. Anonymity is achieved by separating the linkability of the user's identity information and the action of the user. By finding out objects linkability relationship, we also address an anonymity measure to analyze anonymity and detect the concealing security exposure. 1. Anonymity Authentication There exist three principals in the anonymity authentication protocol: the user, the service discoverer, and the service provider. The anonymity authentication protocol contains two authentication stages. First, the authentication between the user and the service discoverer which determines the user whether he has the right to access the requested resource. And then the service discoverer makes use of blind signature on the user's public key as a ticket. Second, the service provider authenticates the user, in which the service provider judges the user whether is the genuine user. 2. Anonymity Measure Linkability is the relation between objects (such as subjects, events, actions etc.) in a system before and after an action occurs. Unlinkability is the sufficient condition of anonymity. Definition 1 (function decision) Let R denote the object set, X and Y be subsets of R , and X ≠Y . If Y can be known from X with probability p , then say X function decision Y , recorded as: X → Y ( p ). Definition 2 (function decision set) To the object set R , the function decision set is the set F of function decisions among the objects known by attackers. Definition 3 (function decision implication) If F is the function decision set known by attackers, let R denote the object set, X and Y be subsets of R , and X ≠Y . If X → Y ( p ) can be deduced from F , then say F implication X → Y ( p ). Definition 4 (function decision closure) All the function decision sets implicated by F are called the closure of F , written as F + . Whether user anonymity is protected can be judged by seeing if there are relations between users' location/actions and users' identity in F + .

Suggested Citation

  • Guo Yajun & Yan Huifang & Li Rong, 2009. "Anonymity Authentication and Measure in Ubiquitous Computing," International Journal of Distributed Sensor Networks, , vol. 5(1), pages 21-21, January.
  • Handle: RePEc:sae:intdis:v:5:y:2009:i:1:p:21-21
    DOI: 10.1080/15501320802508428
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1080/15501320802508428
    Download Restriction: no

    File URL: https://libkey.io/10.1080/15501320802508428?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:intdis:v:5:y:2009:i:1:p:21-21. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.