Anonymous Networking Meets Real-World Business Requirements

Ubiquitous systems and the Internet of Things (IoT) are on the rise. However, there are issues from businesses and users which hinder the wide-spread application of such systems. In the FP7 EU project ebbits, which deals with integrating IoT into business systems, we collected real-world requirement...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Vinkovits, M., Elmasllari, E., Pastrone, C.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 457
container_issue
container_start_page 451
container_title
container_volume
creator Vinkovits, M.
Elmasllari, E.
Pastrone, C.
description Ubiquitous systems and the Internet of Things (IoT) are on the rise. However, there are issues from businesses and users which hinder the wide-spread application of such systems. In the FP7 EU project ebbits, which deals with integrating IoT into business systems, we collected real-world requirements from participants. From these we designed a complete anonymous network solution including addressing, discovery, authentication and reputation management. Our authentication system relies on Non Interactive Zero Knowledge Proofs augmented for fine granulated access right decisions and accounting. Anonymous reputation is created using reputation tickets, which are obtained through public votings. A reputation ticket is an unforgeable evidence of trustworthiness held by the provider and presented to a consumer on request. Discovery also has to specially be designed for anonymous environments else they leak information about the identity. We provide an attribute based discovery mechanism built with Bloom-filters. Our concept protects privacy but still enables discovery based on partial matches.
doi_str_mv 10.1109/TrustCom.2012.93
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6296007</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6296007</ieee_id><sourcerecordid>6296007</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-71b8614cbd568247c064843eeb22d4027753c3d6d9cd4cb81d90e3dcceaa467b3</originalsourceid><addsrcrecordid>eNotj1tLxDAUhOMNXNe-C770D7TmJGku-LQWb7AqSEHfljY5SrQXTVpk_70Vd14GZj4GhpAzoDkANRdVmOJYDl3OKLDc8D1yQpU0hVCigH2yYJyJzFDgByQxSoOQijNQjB_uOm306zFJYvygs2aCKViQy1U_9NtumGL6iOPPED59_54-II4xfca6zV6G0Lr0aoq-x_iXfU8-YIf9GE_J0VvdRkx2viTVzXVV3mXrp9v7crXOvKFjpqDREoRtXCE1E8pSKbTgiA1jTlCmVMEtd9IZ62ZKgzMUubMW63o-0fAlOf-f9Yi4-Qq-q8N2I5mR8w3-C2DvTb4</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Anonymous Networking Meets Real-World Business Requirements</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Vinkovits, M. ; Elmasllari, E. ; Pastrone, C.</creator><creatorcontrib>Vinkovits, M. ; Elmasllari, E. ; Pastrone, C.</creatorcontrib><description>Ubiquitous systems and the Internet of Things (IoT) are on the rise. However, there are issues from businesses and users which hinder the wide-spread application of such systems. In the FP7 EU project ebbits, which deals with integrating IoT into business systems, we collected real-world requirements from participants. From these we designed a complete anonymous network solution including addressing, discovery, authentication and reputation management. Our authentication system relies on Non Interactive Zero Knowledge Proofs augmented for fine granulated access right decisions and accounting. Anonymous reputation is created using reputation tickets, which are obtained through public votings. A reputation ticket is an unforgeable evidence of trustworthiness held by the provider and presented to a consumer on request. Discovery also has to specially be designed for anonymous environments else they leak information about the identity. We provide an attribute based discovery mechanism built with Bloom-filters. Our concept protects privacy but still enables discovery based on partial matches.</description><identifier>ISSN: 2324-898X</identifier><identifier>ISBN: 9781467321723</identifier><identifier>ISBN: 1467321729</identifier><identifier>EISSN: 2324-9013</identifier><identifier>EISBN: 0769547451</identifier><identifier>EISBN: 9780769547459</identifier><identifier>DOI: 10.1109/TrustCom.2012.93</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Anonymous network ; Authentication ; Bloom filters ; Context ; Cryptography ; distributed network ; Internet of Things ; Organizations ; Privacy ; reputation management ; zero knowledge proofs</subject><ispartof>2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012, p.451-457</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6296007$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6296007$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Vinkovits, M.</creatorcontrib><creatorcontrib>Elmasllari, E.</creatorcontrib><creatorcontrib>Pastrone, C.</creatorcontrib><title>Anonymous Networking Meets Real-World Business Requirements</title><title>2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications</title><addtitle>trustcom</addtitle><description>Ubiquitous systems and the Internet of Things (IoT) are on the rise. However, there are issues from businesses and users which hinder the wide-spread application of such systems. In the FP7 EU project ebbits, which deals with integrating IoT into business systems, we collected real-world requirements from participants. From these we designed a complete anonymous network solution including addressing, discovery, authentication and reputation management. Our authentication system relies on Non Interactive Zero Knowledge Proofs augmented for fine granulated access right decisions and accounting. Anonymous reputation is created using reputation tickets, which are obtained through public votings. A reputation ticket is an unforgeable evidence of trustworthiness held by the provider and presented to a consumer on request. Discovery also has to specially be designed for anonymous environments else they leak information about the identity. We provide an attribute based discovery mechanism built with Bloom-filters. Our concept protects privacy but still enables discovery based on partial matches.</description><subject>Anonymous network</subject><subject>Authentication</subject><subject>Bloom filters</subject><subject>Context</subject><subject>Cryptography</subject><subject>distributed network</subject><subject>Internet of Things</subject><subject>Organizations</subject><subject>Privacy</subject><subject>reputation management</subject><subject>zero knowledge proofs</subject><issn>2324-898X</issn><issn>2324-9013</issn><isbn>9781467321723</isbn><isbn>1467321729</isbn><isbn>0769547451</isbn><isbn>9780769547459</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj1tLxDAUhOMNXNe-C770D7TmJGku-LQWb7AqSEHfljY5SrQXTVpk_70Vd14GZj4GhpAzoDkANRdVmOJYDl3OKLDc8D1yQpU0hVCigH2yYJyJzFDgByQxSoOQijNQjB_uOm306zFJYvygs2aCKViQy1U_9NtumGL6iOPPED59_54-II4xfca6zV6G0Lr0aoq-x_iXfU8-YIf9GE_J0VvdRkx2viTVzXVV3mXrp9v7crXOvKFjpqDREoRtXCE1E8pSKbTgiA1jTlCmVMEtd9IZ62ZKgzMUubMW63o-0fAlOf-f9Yi4-Qq-q8N2I5mR8w3-C2DvTb4</recordid><startdate>201206</startdate><enddate>201206</enddate><creator>Vinkovits, M.</creator><creator>Elmasllari, E.</creator><creator>Pastrone, C.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201206</creationdate><title>Anonymous Networking Meets Real-World Business Requirements</title><author>Vinkovits, M. ; Elmasllari, E. ; Pastrone, C.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-71b8614cbd568247c064843eeb22d4027753c3d6d9cd4cb81d90e3dcceaa467b3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Anonymous network</topic><topic>Authentication</topic><topic>Bloom filters</topic><topic>Context</topic><topic>Cryptography</topic><topic>distributed network</topic><topic>Internet of Things</topic><topic>Organizations</topic><topic>Privacy</topic><topic>reputation management</topic><topic>zero knowledge proofs</topic><toplevel>online_resources</toplevel><creatorcontrib>Vinkovits, M.</creatorcontrib><creatorcontrib>Elmasllari, E.</creatorcontrib><creatorcontrib>Pastrone, C.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEL</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Vinkovits, M.</au><au>Elmasllari, E.</au><au>Pastrone, C.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Anonymous Networking Meets Real-World Business Requirements</atitle><btitle>2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications</btitle><stitle>trustcom</stitle><date>2012-06</date><risdate>2012</risdate><spage>451</spage><epage>457</epage><pages>451-457</pages><issn>2324-898X</issn><eissn>2324-9013</eissn><isbn>9781467321723</isbn><isbn>1467321729</isbn><eisbn>0769547451</eisbn><eisbn>9780769547459</eisbn><coden>IEEPAD</coden><abstract>Ubiquitous systems and the Internet of Things (IoT) are on the rise. However, there are issues from businesses and users which hinder the wide-spread application of such systems. In the FP7 EU project ebbits, which deals with integrating IoT into business systems, we collected real-world requirements from participants. From these we designed a complete anonymous network solution including addressing, discovery, authentication and reputation management. Our authentication system relies on Non Interactive Zero Knowledge Proofs augmented for fine granulated access right decisions and accounting. Anonymous reputation is created using reputation tickets, which are obtained through public votings. A reputation ticket is an unforgeable evidence of trustworthiness held by the provider and presented to a consumer on request. Discovery also has to specially be designed for anonymous environments else they leak information about the identity. We provide an attribute based discovery mechanism built with Bloom-filters. Our concept protects privacy but still enables discovery based on partial matches.</abstract><pub>IEEE</pub><doi>10.1109/TrustCom.2012.93</doi><tpages>7</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2324-898X
ispartof 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012, p.451-457
issn 2324-898X
2324-9013
language eng
recordid cdi_ieee_primary_6296007
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Anonymous network
Authentication
Bloom filters
Context
Cryptography
distributed network
Internet of Things
Organizations
Privacy
reputation management
zero knowledge proofs
title Anonymous Networking Meets Real-World Business Requirements
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-18T15%3A56%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Anonymous%20Networking%20Meets%20Real-World%20Business%20Requirements&rft.btitle=2012%20IEEE%2011th%20International%20Conference%20on%20Trust,%20Security%20and%20Privacy%20in%20Computing%20and%20Communications&rft.au=Vinkovits,%20M.&rft.date=2012-06&rft.spage=451&rft.epage=457&rft.pages=451-457&rft.issn=2324-898X&rft.eissn=2324-9013&rft.isbn=9781467321723&rft.isbn_list=1467321729&rft.coden=IEEPAD&rft_id=info:doi/10.1109/TrustCom.2012.93&rft_dat=%3Cieee_6IE%3E6296007%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=0769547451&rft.eisbn_list=9780769547459&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6296007&rfr_iscdi=true