InfoSpaces: A ubiquitous application for distributed data exchange and anonymous peer to peer access control. In the near future ubiquitous applications will be used on an increased basis. These applications communicate anywhere and at any time with each other by building ad hoc peer-to-peer networks. Therefore the communication between the networks’ users will proliferate and the demand for applications for those networks grows, which allow for an easy and straightforward data exchange. A ubiquitous application which realises the data exchange as easily as possible is supposed to guarantee the security of the participants’ local and usually private data in spite of increased communication. This protection has to be made clear to the users of the application at any time. The users alone should decide what information or data is presented to other participants. If much information is exchanged via virtual rooms in the peer-to-peer network, not all participants should be able to enter all areas and have access to all information in these areas. Hence, ubiquitous applications require access control as well. In addition, a demand for the users’ anonymity arises from increased communication. Such users do not want to permanently appear with only one identity. Therefore a future access control has to allow authorisation without verification of identities in a distributed system. This Ph.D. thesis shows existing techniques which can be used for Ubiquitous Computing and clarifies that none of these techniques offers the aforementioned range of functions. Subsequently, the thesis introduces a solution, the InfoSpace Application, implementing an easy data exchange and protecting private and local data. The protection is made clear to the users at any time. In addition, the InfoSpace Application implements fine-grained access control allowing the user to act anonymously as well. In this thesis a new approach is taken in order to simultaneously realise anonymity and access control in a peer-to-peer network. The aforesaid approach is accomplished by the adaptation of the key-lock paradigm to peer-to-peer applications, realised by means of asymmetrical cryptography. Using an exemplary implementation, this thesis shows that the present approach can be used for effective access control.

References in zbMATH (referenced in 1 article , 1 standard article )

Showing result 1 of 1.
Sorted by year (citations)

  1. Voigt, Sebastian: InfoSpaces: A ubiquitous application for distributed data exchange and anonymous peer to peer access control. (2008)