Secure Attestation Service Framework

Secure Attestation Service Framework

Secure Attestation Service Framework for Ubiquitous Computing with Activity-based Attestation

The proliferation of ubiquitous computing deployments has enabled the widespread use of various computer and mobile applications. As a result, large amount of digital information has been produced directly or indirectly from these ubiquitous computing applications. In recent years, this generated information has been gradually used by some users for earning financial and social benefits. However, most of the digital information rendered by current systems is still susceptible to illegal manipulations. Furthermore, the privacy protection of information owner is usually very limited, especially in applications that enable the owner to reuse the generated information for earning benefits. Hence to address these problems, this research introduces an activity-based attestation service framework, which enables the creation of ubiquitous computing applications that support the generation of trusted information and protect user’s privacy. The proposed framework uses the activity-based attestation model for inferring user’s action in ubiquitous computing environment, user’s action information is used for enhancing the trust of the generated information. Unlike other approaches, the proposed activity-based attestation model adopts user-centric design, thus information owner’s privacy is protected. One of the important elements used in the proposed activity-based attestation service framework is the eTRON architecture. The eTRON is used for providing stringent security and privacy protections. The proposed framework could be used in aiding the creation of ubiquitous computing applications that require attestation service provisioning.

One of the applications of secure attestation service framework is the medical certificate application. This application can generate trusted information, i.e., digital medical certificate that can attest to its user’s whereabouts and also infer the activity engaged by the user at that particular location. The user can share her/his information with recipients of her/his choice through secure peer-to-peer communication channel at anytime. To further protect the privacy of the user (information owner), the recipients are prohibited from illegally redistributing the received information. This feature is provided through the eTRON File access control list settings defined in the proposed framework.


The medical certificate application ‘s flow