Trust-based Privacy Protecting Method in Pervasive Computing

辛艳,罗长远,霍士伟,应一舟
DOI: https://doi.org/10.3969/j.issn.1000-3428.2010.12.051
2010-01-01
Abstract:The exchange of sensitive information in pervasive computing access control offers opportunity for vicious opposite entity to purloining private information.This paper presents trust-based privacy protecting method in pervasive computing.Taking trust of resource provider,user measures off security grade based on trust worth.For the attributes higher than the security grade,user and resource provider use private comparison protocol validating encrypted attributes.Experimental result shows that the method can protect private attributes effectively and encrypt attributes selectively based on different user attributes sensitivity,and reduce the complexity of computing.It adapts the equipments of capability limitative in pervasive computing.
What problem does this paper attempt to address?