Privacy-Preserving Protocol for Smart Space Services with Negotiable Comfort Preferences

Adam Wójtowicz , Daniel Wilusz


In this paper an architecture and a protocol for secure and privacy-preserving service usage in smart spaces are presented. Comfort preferences that are defined and stored on end-users mobile devices are subject to negotiations. The approach relies on a single trusted party operating as a public service in the “security infrastructure as a service” model. It is designed to assure resilience against attacks on users privacy from the side of service providers (SPs), user’s attempts to use the services in an unauthorized manner, user’s attempts to violate payment policies, as well as payment authority’s attacks on privacy of users’ payment patterns. From the SP perspective, the proposed approach minimizes the risk of unauthorized service usage, or denial of service attacks. All players benefit from the fast and secure micropayments allowing for pay-per-use model implementation, which is natural in ubiquitous services usage scenarios.
Author Adam Wójtowicz (WIiGE / KTI)
Adam Wójtowicz,,
- Department of Information Technology
, Daniel Wilusz (WIiGE / KTI)
Daniel Wilusz,,
- Department of Information Technology
Publication size in sheets0.5
Book Herrero Álvaro, Baruque Bruno, Sedano Javier, Quintián Héctor, Corchado Emilio (eds.): International Joint Conference CISIS’15 and ICEUTE’15, Advances in Intelligent Systems and Computing, vol. 369, 2015, Springer International Publishing, ISBN 978-3-319-19712-8, 641 p., DOI:10.1007/978-3-319-19713-5
Keywords in EnglishUser privacy, Smart spaces, Communication protocol
Languageen angielski
Score (nominal)15
Score sourceconferenceIndex
ScoreMinisterial score = 15.0, 27-04-2020, BookChapterSeriesAndMatConfByIndicator
Ministerial score (2013-2016) = 15.0, 27-04-2020, BookChapterSeriesAndMatConfByIndicator
Publication indicators WoS Citations = 1
Citation count*2 (2020-09-10)
Share Share

Get link to the record

* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.
Are you sure?