skip to main content
10.1145/1516241.1516285acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

RBAC-based access control for privacy protection in pervasive environments

Published: 15 February 2009 Publication History

Abstract

Pervasive environment is a post-desktop model of human-computer interaction in which information processing has been thoroughly integrated into everyday object and activities. In there environment access control is a critical issue, with many aspects relating to the establishment, authorization and enforcement of policies that protect the resources from adversaries. Recently, many researches have been worked methods that have access to resources in ubiquitous applications. However they are inadequate to meet the requirement for privacy safeguard and dynamic changes. In this paper we propose how to protect sensitive data and present extended Role Based Access Control (RBAC) that respond to all the requirements for privacy control. We also show how proposed model preserves safety properties in spite of dynamic changes to access control permission.

References

[1]
Zhang, G., Parashar, M. Context-Aware Dynamic Access Control for Pervasive Application. In Proceeding of the Communication Networks and Distributed Systems Modeling and Simulation Conference. Society for Modeling and Simulation International, 2004, pp. 21--30
[2]
Matthew J. M, Mustaque Ahamad. Generalized Role Based Access Control, Distributed Computing Systems, Proceeding of the IEEE, 21st International Conference. 2001, pp. 391--398
[3]
Rakesk Agrawal, Jerry Kiernan, Ramakrishman Srikant, and Yirong Xu. Hippocratic Databases. In Proceedings of the 28th International Conference on Very Large Databases (VLDB), 2002
[4]
Adam N. R., Atluri V. Bertino E., Ferrari E, A Content-Based Authorization Model for Digital Libraires. IEEE Transactions on Knowledge Data Engineering, Vol.14 No.2 March 2002, pp 103--112
[5]
M. Weiser, Scientific America. The Computer for the 21st Century. Sept. 94--104 (1991); reprinted in IEEE Pervasive Computing. March 2002, pp. 19--25
[6]
Evi Syukur, Seng Wai Loke., Peter Stanski, A Policy Based Framework for Context Aware Ubiquitous Services, LNCS, vol. 3207, pp. 346--355, Springer, Heidelberg 2006
[7]
Sandhu R. S, Cynek E. J, Fensteink H. L, Youmank C. E, Role-Based Access Control Model, IEEE Computer, Vol. 29, No.2, February 1996
[8]
Gustavo H. M. B Motta, Sergio S. Furuie. A Contextual Role-Based Access Control Authorization Model for Electronic Patient Record, IEEE Transactions on Information Technology in Biomedicine Vol.7 No.3 2003, pp.202--207
[9]
Bertino E., Sandhu R. Database Security-Concepts, Approaches, and Challenges, IEEE Transaction Vol.2, No.1 2005, pp. 2--19
[10]
Roman M., Hess C., Cerqueira R., Ranganathan A, Campbell R. H. A middleware infrastructure for active spaces. IEEE Pervasive Computing Vol.1 issue4, October 2002, pp.74--83
[11]
Coradi A., Montanari R., Tibaldi D. Context-based access control for ubiquitous service provisioning, Proceedings of the 28th Annual Interantional Vol.1 2004, pp.444--451
[12]
Thomas Y. C Woo and Simon S. Lam. Designing a Distributed Authorization Service. Proceeding of IEEE INFOCOM, March 1998
[13]
Murata M., Tozawa A., Kudo. M. XML Access Control Using Static Analysis. Proceedings of the 10th ACM conference on Computer and Communication security, 2003, pp. 73--84
[14]
LeFevre K., Agrawal R., Ercegovac V., Ramakrishnan R., Xu Y., and DeWitt D. Limiting Disclosure in Hippocratic Databases, In Proceedings of the 30th International Conference on Very Large Databases (VLDB), 2004

Cited By

View all

Index Terms

  1. RBAC-based access control for privacy protection in pervasive environments

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
      February 2009
      704 pages
      ISBN:9781605584058
      DOI:10.1145/1516241
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 February 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. RBAC
      2. access control
      3. pervasive environments
      4. privacy

      Qualifiers

      • Research-article

      Funding Sources

      • Foundation of Ubiquitous Computing and Networking Project (UCN)

      Conference

      ICUIMC '09
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 251 of 941 submissions, 27%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 06 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media