UCSMssp: Ubiquitous Computing Service Model Based on SPKI/SDSI and P2P

被引:0
|
作者
Sun, Daoqing [1 ]
Pu, Fang [1 ]
Cao, Qiying [1 ]
机构
[1] Donghua Univ, Coll Informat Sci & Technol, Shanghai 201620, Peoples R China
关键词
Peer-to-Peer; Security; Service Model; SPKI/SDSI; Ubiquitous Computing;
D O I
10.1109/WCICA.2008.4593373
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ubiquitous computing systems typically have lots of security problems in the area of service supply. The service types and levels, the security delegation of services and the identity hiding of principal etc are all these unsolved problems. In this paper, UCSMssp, a new novel ubiquitous computing service model based on SPKI/SDSI and P2P is presented. SPKI-based authorization is exploited in UCSMssp to solve above problems in small-scale ubiquitous computing environments. The DHT and flooding or random walk technology of Peer-to-Peer overlay network over the Internet is expanded to solve the routing search in large-scale ubiquitous computing environments. The architecture of ubiquitous computing environment, the service authorization processes and the service supply processes etc of UCSMssp are described in the paper. The performance analysis shows that UCSMssp is a suitable security solution used in large-scale ubiquitous computing environments.
引用
收藏
页码:2822 / 2827
页数:6
相关论文
共 50 条
  • [21] Secure trust model for P2P systems based on trusted computing
    Hao L.-M.
    Yang S.-T.
    Lu S.-N.
    Chen G.-L.
    Journal of Shanghai Jiaotong University (Science), 2008, 13 (1) : 86 - 90
  • [22] JXTA-Overlay: A P2P Platform for Distributed, Collaborative, and Ubiquitous Computing
    Barolli, Leonard
    Xhafa, Fatos
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2011, 58 (06) : 2163 - 2172
  • [23] Reliable P2P computing model based on probabilistic redundant scheduling
    Lin W.-W.
    Qi D.-Y.
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2010, 38 (06): : 84 - 88
  • [24] P2P file sharing for P2P computing
    Briquet, Cyril
    Dalem, Xavier
    Jodogne, Sebastien
    de Marneffe, Pierre-Arnoul
    MULTIAGENT AND GRID SYSTEMS, 2009, 5 (02) : 137 - 164
  • [25] A Cloud Computing Platform Based on P2P
    Xu, Ke
    Song, Meina
    Zhang, Xiaoqi
    Song, Junde
    2009 IEEE INTERNATIONAL SYMPOSIUM ON IT IN MEDICINE & EDUCATION, VOLS 1 AND 2, PROCEEDINGS, 2009, : 427 - 432
  • [26] Mobile Cloud Computing Service Based on Heterogeneous Wireless and Mobile P2P Networks
    Larosa, Yanuarius Teofilus
    Chen, Jiann-Liang
    Deng, Der-Jiunn
    Chao, Han-Chieh
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 661 - 665
  • [27] A GroupTrust Model Based on Service Similarity Evaluation in P2P Networks
    Zhang, Yong
    Zheng, Hongliang
    Liu, Yining
    Li, Keqiu
    Qu, Wenyu
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2011, 26 (01) : 47 - 62
  • [28] An active data integration model based on P2P routing service
    Ren, Wuling
    Han, Ping
    Zhou, Pan
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 417 - 420
  • [29] A trust model of P2P in cloud computing environment
    Song Fei
    Wang Xiao-Jing
    Cui Zhe
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1962 - +
  • [30] A transaction description model and properties for P2P computing
    School of Computer Science and Engineering, South China University of Technology, Guang Zhou, 510641, China
    不详
    Information Technology Journal, 2007, 6 (04) : 509 - 517