A location-aware Revocation Approach
نویسندگان
چکیده
We present a new certificate revocation system for both on-line and off-line use, which is targeted to mobile-commerce systems. It allows to use certificates from any certificate issuer and to apply a proprietary revocation strategy. Our approach is well suited especially for location-aware services and mobile devices, because 1) our protocol reduces the amount of online communication, 2) the revocation tree is structured in such a way that certificates of services, which are located in the same region, can be verified using the same revocation proof.
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملScalability in a Secure Distributed Proof System
A logic-based language is often adopted in systems for pervasive computing, because it provides a convenient way to define rules that change the behavior of the systems dynamically. Those systems might define rules that refer to the users’ context information to provide context-aware services. For example, a smart-home application could define rules referring to the location of a user to contro...
متن کاملContext-aware Modeling for Spatio-temporal Data Transmitted from a Wireless Body Sensor Network
Context-aware systems must be interoperable and work across different platforms at any time and in any place. Context data collected from wireless body area networks (WBAN) may be heterogeneous and imperfect, which makes their design and implementation difficult. In this research, we introduce a model which takes the dynamic nature of a context-aware system into consideration. This model is con...
متن کاملEPA: An efficient and privacy-aware revocation mechanism for vehicular ad hoc networks
Security is vital for the reliable operation of vehicular ad hoc networks (VANETs). One of the critical security issues is the revocation of misbehaving vehicles. While essential, revocation checking can leak private information. In particular, repositories receiving the certificate status queries could infer the identity of the vehicles posing the query and the target of the query. An importan...
متن کاملProviding perfect forward secrecy for location-aware wireless sensor networks
Sensor nodes are resource-constrained, such as low battery life, computation, bandwidth and memory, so traditional public key schemes are impractical in wireless sensor networks. In the previous schemes, symmetric cryptography is the most common method used in sensor nodes. How to distribute keys into every sensor node is an important issue in many applications for hierarchical sensor networks....
متن کامل