Privacy challenges in Context-sensitive access control for pervasive computing environment

被引:0
作者
Ahamed, Sheikh I. [1 ]
Talukder, Nilothpal [1 ]
Haque, Md. Munirul [1 ]
机构
[1] Marquette Univ, Dept Math Stat & Comp Sci, Milwaukee, WI 53233 USA
来源
2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES | 2007年
关键词
privacy violation; information leak; trust model; healthcare; pervasive computing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread prevalence of pervasive devices and applications has raised the concerns of privacy. Granting Access to Resources and Context sensitive information causes information leakage through inference or obfuscation. Again, the open and dynamic collaborative environment of pervasive computing has rendered the traditional access control models like Role based models to be unfit Even though Trust based models came to rescue in such circumstances, privacy is mostly compromised in the big picture. In this paper, we have drawn examples from pervasive computing environment and illustrated some scenarios of privacy violation. We have presented a trust based access control model for pervasive healthcare environment to prevent information leakage on accessing constraint information that yields privacy violation in the end. We have addressed information leak from three perspectives of constraint information satisfaction to grant access to the resources. They are - satisfy any, satisfy all and hierarchical constraints. Furthermore, the model eliminates requirements for maintaining any keys or access rights certificates for privacy protection. This lightweight model helps ensure the resource constrained small pervasive devices like PDA, cell phones use the access control model effectively and efficiently with privacy of the individuals preserved in the first place.
引用
收藏
页码:510 / 515
页数:6
相关论文
共 11 条
  • [1] AHAMED SI, P 31 ANN IN IN PRESS
  • [2] A statistical matching approach to detect privacy violation for trust-based collaborations
    Ahmed, M
    Quercia, D
    Hailes, S
    [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 598 - 602
  • [3] Cerberus: A context-aware security scheme for smart spaces
    Al-Muhtadi, J
    Ranganathan, A
    Campbell, R
    Mickunas, MD
    [J]. PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM 2003), 2003, : 489 - 496
  • [4] Almenárez F, 2005, LECT NOTES COMPUT SC, V3450, P225
  • [5] [Anonymous], LNCS
  • [6] Gupta SK, 2006, 4 ANN IEEE INT C PER
  • [7] Exploiting hierarchical identity-based encryption for access control to pervasive computing information
    Hengartner, U
    Steenkiste, P
    [J]. FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, : 384 - 393
  • [8] HENGARTNER U, 2006, 4 ANN IEEE INT C PER
  • [9] Keoh SL, 2005, LECT NOTES COMPUT SC, V3450, P210
  • [10] Sharmin M, 2006, PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, P258