Privacy-Preserving Enforcement of Spatially Aware RBAC

被引:11
|
作者
Kirkpatrick, Michael S. [1 ]
Ghinita, Gabriel [2 ]
Bertino, Elisa [3 ]
机构
[1] James Madison Univ, Dept Comp Sci, Harrisonburg, VA 22807 USA
[2] Univ Massachusetts, Dept Comp Sci, Boston, MA 02125 USA
[3] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
RBAC; privacy; security; access control; applied cryptography; INFORMATION-RETRIEVAL; ACCESS-CONTROL; PROTOCOL;
D O I
10.1109/TDSC.2011.62
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Several models for incorporating spatial constraints into role-based access control (RBAC) have been proposed, and researchers are now focusing on the challenge of ensuring such policies are enforced correctly. However, existing approaches have a major shortcoming, as they assume the server is trustworthy and require complete disclosure of sensitive location information by the user. In this work, we propose a novel framework and a set of protocols to solve this problem. Specifically, in our scheme, a user provides a service provider with role and location tokens along with a request. The service provider consults with a role authority and a location authority to verify the tokens and evaluate the policy. However, none of the servers learn the requesting user's identity, role, or location. In this paper, we define the protocols and the policy enforcement scheme, and present a formal proof of a number of security properties.
引用
收藏
页码:627 / 640
页数:14
相关论文
共 50 条
  • [41] Verifying Indistinguishability of Privacy-Preserving Protocols
    Linvill, Kirby
    Kaki, Gowtham
    Wustrow, Eric
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2023, 7 (OOPSLA):
  • [42] Privacy-Preserving Deep Learning and Inference
    Riazi, M. Sadegh
    Koushanfar, Farinaz
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [43] Privacy-preserving naive Bayesian classification
    Zhan, Z
    Chang, LW
    Matwin, S
    Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Vols 1and 2, 2004, : 14 - 20
  • [44] Privacy-preserving programming using sython
    Gaiman, Michael
    Simha, Rahul
    Narahari, Bhagirath
    COMPUTERS & SECURITY, 2007, 26 (02) : 130 - 136
  • [45] Privacy-preserving Naive Bayes classification
    Vaidya, Jaideep
    Kantarcioglu, Murat
    Clifton, Chris
    VLDB JOURNAL, 2008, 17 (04): : 879 - 898
  • [46] Cryptography for Privacy-Preserving Electronic Services
    Hajny, Jan
    Dzurenda, Petr
    Malina, Lukas
    Zeman, Vaclav
    2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 596 - 600
  • [47] Privacy-Preserving Collaborative Recommender Systems
    Zhan, Justin
    Hsieh, Chia-Lung
    Wang, I-Cheng
    Hsu, Tsan-Sheng
    Liau, Churn-Jung
    Wang, Da-Wei
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2010, 40 (04): : 472 - 476
  • [48] Privacy-Preserving Authentication Protocols in Vanet
    Nath H.J.
    Choudhury H.
    SN Computer Science, 4 (5)
  • [49] CBACS: A Privacy-Preserving and Efficient Cache-Based Access Control Scheme for Software Defined Vehicular Networks
    Zhang, Xiaoyu
    Zhong, Hong
    Fan, Chunyang
    Bolodurina, Irina
    Cui, Jie
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1930 - 1945
  • [50] Protocols Design and Area Division for Privacy-Preserving Delay-Aware Authentication in Vehicular Networks
    Wang, Qianpeng
    Gao, Deyun
    Foh, Chuan Heng
    Zhang, Hongke
    Leung, Victor C. M.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (11) : 11129 - 11144