Pervasive computing brings a lot of convenience to users and also carries serious privacy issues on them. A reusable pseudonym privacy protection for pervasive computing is presented. The pervasive computing systems will be divided into many autonomous regions, and each autonomous region uses the same pseudonym sets. Users will be randomly assigned a pseudonym within a region that it did not use currently in this region. The relationship between the user and a pseudonym are a complex relationship of many to many, and it is better to protect users' privacy. From the security analysis, the method is safe and feasible. In addition, the privacy protection method requires only a small burden for pseudonym management. Pseudonym of the selection process is completed by the authentication server. Therefore, the privacy protection program has little interference on the users. © 2011 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Guo, Y., & Guo, Y. (2011). Reusable pseudonym privacy protection in pervasive computing. Advances in Intelligent and Soft Computing, 105, 201–205. https://doi.org/10.1007/978-3-642-23756-0_33
Mendeley helps you to discover research relevant for your work.