Context-aware privacy-preserving access control for mobile computing

被引:8
作者
Herrera, Juan Luis [1 ]
Chen, Hsiao-Yuan [2 ]
Berrocal, Javier [1 ]
Murillo, Juan M. [1 ]
Julien, Christine [2 ]
机构
[1] Univ Extremadura, Badajoz, Spain
[2] Univ Texas Austin, Austin, TX USA
基金
美国国家科学基金会;
关键词
Privacy; Mobile computing; Access control; MODEL;
D O I
10.1016/j.pmcj.2022.101725
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In mobile and pervasive computing applications, opportunistic connections allow co -located devices to exchange data directly. Keeping data sharing local enables large-scale cooperative applications and empowers individual users to control what and how information is shared. Supporting such applications requires runtime frameworks that allow them to manage the who, what, when, and how of access to resources. Existing frameworks have limited expressiveness and do not allow data owners to modulate the granularity of information released. In addition, these frameworks focus exclusively on security and privacy concerns of data providers and do not consider the privacy of data consumers. We present PADEC, a context-sensitive, privacy-aware framework that allows users to define rich access control rules over their resources and to attach levels of granularity to each rule. PADEC is also characterized by its expressiveness, allowing users to decide under which conditions should which information be shared. We provide a formal definition of PADEC and an implementation based on private function evaluation. Our evaluation shows that PADEC is more expressive than other mechanisms, protecting privacy of both consumers and providers. (c) 2022 Elsevier B.V. All rights reserved.
引用
收藏
页数:17
相关论文
共 37 条
[1]  
Abouaroek M., 2018, OPPORTUNISTIC NETWOR
[2]  
Abowd GD, 1999, LECT NOTES COMPUT SC, V1707, P304
[3]  
Amazon, 2019, IAM ROL AWS ID ACC M
[4]  
[Anonymous], 2019, Tech. Rep. NIST SP 800-162, DOI DOI 10.6028/NIST.SP.800-162
[5]   Provably secure authenticated group Diffie-Hellman key exchange [J].
Bresson, Emmanuel ;
Chevassut, Olivier ;
Pointcheval, David .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (03)
[6]  
Brossard D., 2017, P 2 ACM WORKSHOP ATT, P53, DOI DOI 10.1145/3041048.3041051
[7]   Collaboration IoT-Based RBAC with Trust Evaluation Algorithm Model for Massive IoT Integrated Application [J].
Chen, Hsing-Chung .
MOBILE NETWORKS & APPLICATIONS, 2019, 24 (03) :839-852
[8]  
CHOMSKY N, 1956, IRE T INFORM THEOR, V2, P113
[9]   ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation [J].
Demmler, Daniel ;
Schneider, Thomas ;
Zohner, Michael .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[10]  
Dwork C., 2006, PROC 33 INT C AUTOMA, P1