A conditional purpose-based access control model with dynamic roles

被引:34
作者
Kabir, Md. Enamul [1 ]
Wang, Hua [1 ]
Bertino, Elisa [2 ,3 ]
机构
[1] Univ So Queensland, Dept Math & Comp, Toowoomba, Qld 4350, Australia
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[3] Purdue Univ, CERIAS, W Lafayette, IN 47907 USA
关键词
Access control; Purpose; Privacy;
D O I
10.1016/j.eswa.2010.07.057
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited purpose in the model. It allows users using some data for certain purpose with conditions. The structure of conditional purpose-based access control model is defined and investigated through dynamic roles. Access purpose is verified in a dynamic behavior, based on subject attributes, context attributes and authorization policies. Intended purposes are dynamically associated with the requested data object during the access decision. An algorithm is developed to achieve the compliance computation between access purposes and intended purposes and is illustrated with Role-based access control (RBAC) in a dynamic manner to support conditional purpose-based access control. According to this model, more information from data providers can be extracted while at the same time assuring privacy that maximizes the usability of consumers' data. It extends traditional access control models to a further coverage of privacy preserving in data mining atmosphere. The structure helps enterprises to circulate clear privacy promise, to collect and manage user preferences and consent. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1482 / 1489
页数:8
相关论文
共 23 条
[1]  
Agrawal R, 2005, PROC INT CONF DATA, P1013
[2]  
Agrawal R., 2002, Proceedings of the Twenty-eighth International Conference on Very Large Data Bases, P143
[3]  
Al-Fedaghi SabahS., 2007, ADC '07: Proceedings of the Eighteenth Australasian Database Conference, P23
[4]  
[Anonymous], PLATF PRIV PREF P3P
[5]  
Barker S., 2003, ACM Transactions on Information and Systems Security, V6, P501, DOI 10.1145/950191.950194
[6]   DATABASE-SECURITY - RESEARCH AND PRACTICE [J].
BERTINO, E ;
JAJODIA, S ;
SAMARATI, P .
INFORMATION SYSTEMS, 1995, 20 (07) :537-556
[7]   Purpose based access control for privacy protection in relational database systems [J].
Byun, Ji-Won ;
Li, Ninghui .
VLDB JOURNAL, 2008, 17 (04) :603-619
[8]  
*IBM, ENT PRIV AUTH LANG
[9]  
Kabir ME., 2009, Twentieth Australasian Database Conference (ADC 2009), P137
[10]  
LEFEVRE K, 2002, 30 INT C VER LARG DA, P108