Anonymous Networking Meets Real-World Business Requirements
Ubiquitous systems and the Internet of Things (IoT) are on the rise. However, there are issues from businesses and users which hinder the wide-spread application of such systems. In the FP7 EU project ebbits, which deals with integrating IoT into business systems, we collected real-world requirement...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 457 |
---|---|
container_issue | |
container_start_page | 451 |
container_title | |
container_volume | |
creator | Vinkovits, M. Elmasllari, E. Pastrone, C. |
description | Ubiquitous systems and the Internet of Things (IoT) are on the rise. However, there are issues from businesses and users which hinder the wide-spread application of such systems. In the FP7 EU project ebbits, which deals with integrating IoT into business systems, we collected real-world requirements from participants. From these we designed a complete anonymous network solution including addressing, discovery, authentication and reputation management. Our authentication system relies on Non Interactive Zero Knowledge Proofs augmented for fine granulated access right decisions and accounting. Anonymous reputation is created using reputation tickets, which are obtained through public votings. A reputation ticket is an unforgeable evidence of trustworthiness held by the provider and presented to a consumer on request. Discovery also has to specially be designed for anonymous environments else they leak information about the identity. We provide an attribute based discovery mechanism built with Bloom-filters. Our concept protects privacy but still enables discovery based on partial matches. |
doi_str_mv | 10.1109/TrustCom.2012.93 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6296007</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6296007</ieee_id><sourcerecordid>6296007</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-71b8614cbd568247c064843eeb22d4027753c3d6d9cd4cb81d90e3dcceaa467b3</originalsourceid><addsrcrecordid>eNotj1tLxDAUhOMNXNe-C770D7TmJGku-LQWb7AqSEHfljY5SrQXTVpk_70Vd14GZj4GhpAzoDkANRdVmOJYDl3OKLDc8D1yQpU0hVCigH2yYJyJzFDgByQxSoOQijNQjB_uOm306zFJYvygs2aCKViQy1U_9NtumGL6iOPPED59_54-II4xfca6zV6G0Lr0aoq-x_iXfU8-YIf9GE_J0VvdRkx2viTVzXVV3mXrp9v7crXOvKFjpqDREoRtXCE1E8pSKbTgiA1jTlCmVMEtd9IZ62ZKgzMUubMW63o-0fAlOf-f9Yi4-Qq-q8N2I5mR8w3-C2DvTb4</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Anonymous Networking Meets Real-World Business Requirements</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Vinkovits, M. ; Elmasllari, E. ; Pastrone, C.</creator><creatorcontrib>Vinkovits, M. ; Elmasllari, E. ; Pastrone, C.</creatorcontrib><description>Ubiquitous systems and the Internet of Things (IoT) are on the rise. However, there are issues from businesses and users which hinder the wide-spread application of such systems. In the FP7 EU project ebbits, which deals with integrating IoT into business systems, we collected real-world requirements from participants. From these we designed a complete anonymous network solution including addressing, discovery, authentication and reputation management. Our authentication system relies on Non Interactive Zero Knowledge Proofs augmented for fine granulated access right decisions and accounting. Anonymous reputation is created using reputation tickets, which are obtained through public votings. A reputation ticket is an unforgeable evidence of trustworthiness held by the provider and presented to a consumer on request. Discovery also has to specially be designed for anonymous environments else they leak information about the identity. We provide an attribute based discovery mechanism built with Bloom-filters. Our concept protects privacy but still enables discovery based on partial matches.</description><identifier>ISSN: 2324-898X</identifier><identifier>ISBN: 9781467321723</identifier><identifier>ISBN: 1467321729</identifier><identifier>EISSN: 2324-9013</identifier><identifier>EISBN: 0769547451</identifier><identifier>EISBN: 9780769547459</identifier><identifier>DOI: 10.1109/TrustCom.2012.93</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Anonymous network ; Authentication ; Bloom filters ; Context ; Cryptography ; distributed network ; Internet of Things ; Organizations ; Privacy ; reputation management ; zero knowledge proofs</subject><ispartof>2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012, p.451-457</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6296007$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6296007$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Vinkovits, M.</creatorcontrib><creatorcontrib>Elmasllari, E.</creatorcontrib><creatorcontrib>Pastrone, C.</creatorcontrib><title>Anonymous Networking Meets Real-World Business Requirements</title><title>2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications</title><addtitle>trustcom</addtitle><description>Ubiquitous systems and the Internet of Things (IoT) are on the rise. However, there are issues from businesses and users which hinder the wide-spread application of such systems. In the FP7 EU project ebbits, which deals with integrating IoT into business systems, we collected real-world requirements from participants. From these we designed a complete anonymous network solution including addressing, discovery, authentication and reputation management. Our authentication system relies on Non Interactive Zero Knowledge Proofs augmented for fine granulated access right decisions and accounting. Anonymous reputation is created using reputation tickets, which are obtained through public votings. A reputation ticket is an unforgeable evidence of trustworthiness held by the provider and presented to a consumer on request. Discovery also has to specially be designed for anonymous environments else they leak information about the identity. We provide an attribute based discovery mechanism built with Bloom-filters. Our concept protects privacy but still enables discovery based on partial matches.</description><subject>Anonymous network</subject><subject>Authentication</subject><subject>Bloom filters</subject><subject>Context</subject><subject>Cryptography</subject><subject>distributed network</subject><subject>Internet of Things</subject><subject>Organizations</subject><subject>Privacy</subject><subject>reputation management</subject><subject>zero knowledge proofs</subject><issn>2324-898X</issn><issn>2324-9013</issn><isbn>9781467321723</isbn><isbn>1467321729</isbn><isbn>0769547451</isbn><isbn>9780769547459</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj1tLxDAUhOMNXNe-C770D7TmJGku-LQWb7AqSEHfljY5SrQXTVpk_70Vd14GZj4GhpAzoDkANRdVmOJYDl3OKLDc8D1yQpU0hVCigH2yYJyJzFDgByQxSoOQijNQjB_uOm306zFJYvygs2aCKViQy1U_9NtumGL6iOPPED59_54-II4xfca6zV6G0Lr0aoq-x_iXfU8-YIf9GE_J0VvdRkx2viTVzXVV3mXrp9v7crXOvKFjpqDREoRtXCE1E8pSKbTgiA1jTlCmVMEtd9IZ62ZKgzMUubMW63o-0fAlOf-f9Yi4-Qq-q8N2I5mR8w3-C2DvTb4</recordid><startdate>201206</startdate><enddate>201206</enddate><creator>Vinkovits, M.</creator><creator>Elmasllari, E.</creator><creator>Pastrone, C.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201206</creationdate><title>Anonymous Networking Meets Real-World Business Requirements</title><author>Vinkovits, M. ; Elmasllari, E. ; Pastrone, C.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-71b8614cbd568247c064843eeb22d4027753c3d6d9cd4cb81d90e3dcceaa467b3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Anonymous network</topic><topic>Authentication</topic><topic>Bloom filters</topic><topic>Context</topic><topic>Cryptography</topic><topic>distributed network</topic><topic>Internet of Things</topic><topic>Organizations</topic><topic>Privacy</topic><topic>reputation management</topic><topic>zero knowledge proofs</topic><toplevel>online_resources</toplevel><creatorcontrib>Vinkovits, M.</creatorcontrib><creatorcontrib>Elmasllari, E.</creatorcontrib><creatorcontrib>Pastrone, C.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEL</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Vinkovits, M.</au><au>Elmasllari, E.</au><au>Pastrone, C.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Anonymous Networking Meets Real-World Business Requirements</atitle><btitle>2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications</btitle><stitle>trustcom</stitle><date>2012-06</date><risdate>2012</risdate><spage>451</spage><epage>457</epage><pages>451-457</pages><issn>2324-898X</issn><eissn>2324-9013</eissn><isbn>9781467321723</isbn><isbn>1467321729</isbn><eisbn>0769547451</eisbn><eisbn>9780769547459</eisbn><coden>IEEPAD</coden><abstract>Ubiquitous systems and the Internet of Things (IoT) are on the rise. However, there are issues from businesses and users which hinder the wide-spread application of such systems. In the FP7 EU project ebbits, which deals with integrating IoT into business systems, we collected real-world requirements from participants. From these we designed a complete anonymous network solution including addressing, discovery, authentication and reputation management. Our authentication system relies on Non Interactive Zero Knowledge Proofs augmented for fine granulated access right decisions and accounting. Anonymous reputation is created using reputation tickets, which are obtained through public votings. A reputation ticket is an unforgeable evidence of trustworthiness held by the provider and presented to a consumer on request. Discovery also has to specially be designed for anonymous environments else they leak information about the identity. We provide an attribute based discovery mechanism built with Bloom-filters. Our concept protects privacy but still enables discovery based on partial matches.</abstract><pub>IEEE</pub><doi>10.1109/TrustCom.2012.93</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2324-898X |
ispartof | 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012, p.451-457 |
issn | 2324-898X 2324-9013 |
language | eng |
recordid | cdi_ieee_primary_6296007 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Anonymous network Authentication Bloom filters Context Cryptography distributed network Internet of Things Organizations Privacy reputation management zero knowledge proofs |
title | Anonymous Networking Meets Real-World Business Requirements |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-18T15%3A56%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Anonymous%20Networking%20Meets%20Real-World%20Business%20Requirements&rft.btitle=2012%20IEEE%2011th%20International%20Conference%20on%20Trust,%20Security%20and%20Privacy%20in%20Computing%20and%20Communications&rft.au=Vinkovits,%20M.&rft.date=2012-06&rft.spage=451&rft.epage=457&rft.pages=451-457&rft.issn=2324-898X&rft.eissn=2324-9013&rft.isbn=9781467321723&rft.isbn_list=1467321729&rft.coden=IEEPAD&rft_id=info:doi/10.1109/TrustCom.2012.93&rft_dat=%3Cieee_6IE%3E6296007%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=0769547451&rft.eisbn_list=9780769547459&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6296007&rfr_iscdi=true |