Scheduled System Maintenance:
On May 6th, single article purchases and IEEE account management will be unavailable from 8:00 AM - 12:00 PM ET (12:00 - 16:00 UTC). We apologize for the inconvenience.
By Topic

SUCAS: An Architecture for Secure User Centric Attestation in Location-based Services

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

7 Author(s)
Lee Fueng Yap ; Interfaculty Initiative in Inf. Studies, Univ. of Tokyo, Tokyo, Japan ; Yashiro, T. ; Bessho, M. ; Usaka, T.
more authors

This work proposes a Secure User Centric Attestation Service (SUCAS) protocol that incorporates user's action information with spatial-temporal information rendered from the location-based service to create action-spatial-temporal evidence. This evidence can be used as proof to protect the owner's right in times of need. The SUCAS protocol preserves user's privacy by granting control to the user while protecting the integrity and authenticity of the generated evidences through the use of tamper-resistant device. The SUCAS protocol covers the process flow for evidence generation, evidence attestation, evidence sharing and evidence verification. A train delay certificate application has been developed to evaluate the SUCAS protocol. The evaluation results confirm that the evidences generated by SUCAS are trustable and adhere to user privacy. Attestation service has great potential in the information age as it provides a mechanism to certify the reliability of user generated information.

Published in:

Social Computing (SocialCom), 2010 IEEE Second International Conference on

Date of Conference:

20-22 Aug. 2010