TY - GEN
T1 - DP 2AC
T2 - 28th Conference on Computer Communications, IEEE INFOCOM 2009
AU - Zhang, Rui
AU - Zhang, Yanchao
AU - Ren, Kui
PY - 2009
Y1 - 2009
N2 - The owner and users of a sensor network may be different, which necessitates privacy-preserving access control. On the one hand, the network owner need enforce strict access control so that the sensed data are only accessible to users willing to pay. On the other hand, users wish to protect their respective data access patterns whose disclosure may be used against their interests. This paper presents DP 2AC, a Distributed Privacy-Preserving Access Control scheme for sensor networks, which is the first work of its kind. Users in DP 2AC purchase tokens from the network owner whereby to query data from sensor nodes which will reply only after validating the tokens. The use of blind signatures in token generation ensures that tokens are publicly verifiable yet unlinkable to user identities, so privacypreserving access control is achieved. A central component in DP 2AC is to prevent malicious users from reusing tokens. We propose a suite of distributed techniques for token-reuse detection (TRD) and thoroughly compare their performance with regard to TRD capability, communication overhead, storage overhead, and attack resilience. The efficacy and efficiency of DP 2AC are confirmed by detailed performance evaluations.
AB - The owner and users of a sensor network may be different, which necessitates privacy-preserving access control. On the one hand, the network owner need enforce strict access control so that the sensed data are only accessible to users willing to pay. On the other hand, users wish to protect their respective data access patterns whose disclosure may be used against their interests. This paper presents DP 2AC, a Distributed Privacy-Preserving Access Control scheme for sensor networks, which is the first work of its kind. Users in DP 2AC purchase tokens from the network owner whereby to query data from sensor nodes which will reply only after validating the tokens. The use of blind signatures in token generation ensures that tokens are publicly verifiable yet unlinkable to user identities, so privacypreserving access control is achieved. A central component in DP 2AC is to prevent malicious users from reusing tokens. We propose a suite of distributed techniques for token-reuse detection (TRD) and thoroughly compare their performance with regard to TRD capability, communication overhead, storage overhead, and attack resilience. The efficacy and efficiency of DP 2AC are confirmed by detailed performance evaluations.
UR - http://www.scopus.com/inward/record.url?scp=70349658629&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70349658629&partnerID=8YFLogxK
U2 - 10.1109/INFCOM.2009.5062039
DO - 10.1109/INFCOM.2009.5062039
M3 - Conference contribution
AN - SCOPUS:70349658629
SN - 9781424435135
T3 - Proceedings - IEEE INFOCOM
SP - 1251
EP - 1259
BT - IEEE INFOCOM 2009 - The 28th Conference on Computer Communications
Y2 - 19 April 2009 through 25 April 2009
ER -