Specification and Enforcement of Location-Aware Attribute-Based Access Control for Online Social Networks

被引:16
作者
Hsu, Andy Chunliang [1 ]
Ray, Indrakshi [1 ]
机构
[1] Colorado State Univ, Ft Collins, CO 80523 USA
来源
ABAC'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON ATTRIBUTE BASED ACCESS CONTROL | 2016年
关键词
Online Social Networks; Location-Aware Attribute-Based Access Control; Geolocation; Authentication; Range Zone; WEB;
D O I
10.1145/2875491.2875495
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online social networks (OSNs) are gaining in popularity and are used by a large number of users with varied educational and socio-economic backgrounds. OSNs contain a plethora of personal information which, if misused, may cause enormous damage to individuals. A well-designed and user-friendly authentication and access control mechanism are the initial steps towards protecting personal information stored on OSNs. Researchers have proposed access control models for OSNs, some of which are classified as relationship based and others are in the category of attribute based access control models. In this paper, we demonstrate the use of an attribute-based access control model which has an attribute called location to provide additional security for OSNs. A user location attribute authenticates user credential during login process by correlating geolocation of the incoming IP address with user behaviors characterized by geographic metadata. Specifically, we focus on the enforcement of this location attribute and demonstrate how it can be used to detect security violations arising out of stolen credentials of authorized users. We implemented a prototype and performed experiments to demonstrate the feasibility of our approach.
引用
收藏
页码:25 / 34
页数:10
相关论文
共 31 条
[1]  
[Anonymous], 2012, P 8 ACM S US PRIV SE
[2]  
[Anonymous], 2014, THESIS
[3]  
Beach A., 2009, P 12 IEEE INT C COMP
[4]  
Bennett Phillipa., 2015, Proceedings of the Eighth International C* Conference on Computer Science Software Engineering, P1
[5]  
Bruns Glenn., 2012, Proceedings of the second CODASPY, P117, DOI DOI 10.1145/2133601.2133616
[6]  
Carminati B, 2006, LECT NOTES COMPUT SC, V4278, P1734
[7]   Enforcing Access Control in Web-Based Social Networks [J].
Carminati, Barbara ;
Ferrari, Elena ;
Perego, Andrea .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 13 (01)
[8]  
Cheng Y, 2012, LECT NOTES COMPUT SC, V7371, P8, DOI 10.1007/978-3-642-31540-4_2
[9]   Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships [J].
Cheng, Yuan ;
Park, Jaehong ;
Sandhu, Ravi .
PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012), 2012, :646-655
[10]  
Dougherty Chad, PRACTICAL IDENTIFICA