Privacy-Preserving Enforcement of Spatially Aware RBAC

被引:11
|
作者
Kirkpatrick, Michael S. [1 ]
Ghinita, Gabriel [2 ]
Bertino, Elisa [3 ]
机构
[1] James Madison Univ, Dept Comp Sci, Harrisonburg, VA 22807 USA
[2] Univ Massachusetts, Dept Comp Sci, Boston, MA 02125 USA
[3] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
RBAC; privacy; security; access control; applied cryptography; INFORMATION-RETRIEVAL; ACCESS-CONTROL; PROTOCOL;
D O I
10.1109/TDSC.2011.62
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Several models for incorporating spatial constraints into role-based access control (RBAC) have been proposed, and researchers are now focusing on the challenge of ensuring such policies are enforced correctly. However, existing approaches have a major shortcoming, as they assume the server is trustworthy and require complete disclosure of sensitive location information by the user. In this work, we propose a novel framework and a set of protocols to solve this problem. Specifically, in our scheme, a user provides a service provider with role and location tokens along with a request. The service provider consults with a role authority and a location authority to verify the tokens and evaluate the policy. However, none of the servers learn the requesting user's identity, role, or location. In this paper, we define the protocols and the policy enforcement scheme, and present a formal proof of a number of security properties.
引用
收藏
页码:627 / 640
页数:14
相关论文
共 50 条
  • [1] Secure and Privacy-Preserving Car-Sharing Systems
    Malina, Lukas
    Dzurenda, Petr
    Lovinger, Norbert
    Ekeh, Ijeoma Faustina
    Matulevicius, Raimundas
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [2] Context-aware privacy-preserving access control for mobile computing
    Herrera, Juan Luis
    Chen, Hsiao-Yuan
    Berrocal, Javier
    Murillo, Juan M.
    Julien, Christine
    PERVASIVE AND MOBILE COMPUTING, 2022, 87
  • [3] Privacy-preserving Trust Verification
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    Shafiq, Basit
    Adam, Nabil
    SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 139 - 148
  • [4] Privacy-Preserving Authentication Systems Using Smart Devices
    Malina, Lukas
    Hajny, Jan
    Martinasek, Zdenek
    2016 39TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2016, : 11 - 14
  • [5] Privacy-Preserving Federated Deep Learning With Irregular Users
    Xu, Guowen
    Li, Hongwei
    Zhang, Yun
    Xu, Shengmin
    Ning, Jianting
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1364 - 1381
  • [6] A Review of Secure and Privacy-Preserving Medical Data Sharing
    Jin, Hao
    Luo, Yan
    Li, Peilong
    Mathew, Jomol
    IEEE ACCESS, 2019, 7 : 61656 - 61669
  • [7] To pass or not to pass: Privacy-preserving physical access control
    Garcia-Rodriguez, Jesus
    Krenn, Stephan
    Slamanig, Daniel
    COMPUTERS & SECURITY, 2024, 136
  • [8] Distributed Privacy-Preserving Access Control in Sensor Networks
    Zhang, Rui
    Zhang, Yanchao
    Ren, Kui
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (08) : 1427 - 1438
  • [9] Privacy-Preserving Statistics
    Vaidya, Jaideep
    COMPUTER, 2018, 51 (09) : 8 - 9
  • [10] Fairness-Aware Privacy-Preserving Record Linkage
    Vatsalan, Dinusha
    Yu, Joyce
    Henecka, Wilko
    Thorne, Brian
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, ESORICS 2020, DPM 2020, CBT 2020, 2020, 12484 : 3 - 18