Secure Attestation Service Framework
Secure Attestation Service Framework for Ubiquitous Computing with Activity-based Attestation
The proliferation of ubiquitous computing deployments has enabled the widespread use of various computer and mobile applications. As a result, large amount of digital information has been produced directly or indirectly from these ubiquitous computing applications. In recent years, this generated information has been gradually used by some users for earning financial and social benefits. However, most of the digital information rendered by current systems is still susceptible to illegal manipulations. Furthermore, the privacy protection of information owner is usually very limited, especially in applications that enable the owner to reuse the generated information for earning benefits. Hence to address these problems, this research introduces an activity-based attestation service framework, which enables the creation of ubiquitous computing applications that support the generation of trusted information and protect user’s privacy. The proposed framework uses the activity-based attestation model for inferring user’s action in ubiquitous computing environment, user’s action information is used for enhancing the trust of the generated information. Unlike other approaches, the proposed activity-based attestation model adopts user-centric design, thus information owner’s privacy is protected. One of the important elements used in the proposed activity-based attestation service framework is the eTRON architecture. The eTRON is used for providing stringent security and privacy protections. The proposed framework could be used in aiding the creation of ubiquitous computing applications that require attestation service provisioning.
One of the applications of secure attestation service framework is the medical certificate application. This application can generate trusted information, i.e., digital medical certificate that can attest to its user’s whereabouts and also infer the activity engaged by the user at that particular location. The user can share her/his information with recipients of her/his choice through secure peer-to-peer communication channel at anytime. To further protect the privacy of the user (information owner), the recipients are prohibited from illegally redistributing the received information. This feature is provided through the eTRON File access control list settings defined in the proposed framework.
The medical certificate application ‘s flow
- Lee Fueng Yap, Takeshi Yashiro, Masahiro Bessho, Tomonori Usaka, M. Fahim Ferdous Khan, Noboru Koshizuka, and Ken Sakamura, (2010) Link: “SUCAS: An Architecture for Secure User Centric Attestation in Location-Based Services”IEEE Int Conf on Information Privacy, Security, Risk and Trust (PASSAT 2010) IEEE Press, Aug 2010 pp.760-767.
- Lee Fueng Yap, Takeshi Yashiro, Masahiro Bessho, Tomonori Usaka, M. Fahim Ferdous Khan, Noboru Koshizuka, and Ken Sakamura, (2012) “SUCAS: smart-card-based secure user-centric attestation framework for location-based services” Int. J. Information Privacy, Security and Integrity, Vol. 1, Nos. 2/3, pp.160?183.
- Lee Fueng Yap, Masahiro Bessho, Tomonori Usaka, Takeshi Yashiro, M. Fahim Ferdous Khan, Noboru Koshizuka, and Ken Sakamura, (2012) “Secure Consumer-Oriented Integrated Services Using Activity-Based Attestation for Converging Online and In-Store Shopping Experience” Int. J. of Computer Theory and Engineering vol. 4, no. 2, pp. 165-170.
- Lee Fueng Yap, Masahiro Bessho, Noboru Koshizuka, and Ken Sakamura, (2012) “User-Generated Content for Location-Based Services: A Review” the Annals of Information Systems Series special issue on Virtual Communities, Social Networks and Collaboration, Vol. 15, Chapter 9, July 31, 2012 (To be published)