Reusable pseudonym privacy protection in pervasive computing

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Pervasive computing brings a lot of convenience to users and also carries serious privacy issues on them. A reusable pseudonym privacy protection for pervasive computing is presented. The pervasive computing systems will be divided into many autonomous regions, and each autonomous region uses the same pseudonym sets. Users will be randomly assigned a pseudonym within a region that it did not use currently in this region. The relationship between the user and a pseudonym are a complex relationship of many to many, and it is better to protect users' privacy. From the security analysis, the method is safe and feasible. In addition, the privacy protection method requires only a small burden for pseudonym management. Pseudonym of the selection process is completed by the authentication server. Therefore, the privacy protection program has little interference on the users. © 2011 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Guo, Y., & Guo, Y. (2011). Reusable pseudonym privacy protection in pervasive computing. Advances in Intelligent and Soft Computing, 105, 201–205. https://doi.org/10.1007/978-3-642-23756-0_33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free