Towards the realisation of context-risk-aware access control in pervasive computing

被引:8
作者
Ahmed, Ali [1 ]
Zhang, Ning [1 ]
机构
[1] Univ Manchester, Sch Comp Sci, Manchester M13 9PL, Lancs, England
关键词
Access Control; Ubiquitous Computing; Context-aware; Level of assurance; Risk assessment; Context-Risk-Aware Access Control; CONTROL MODEL;
D O I
10.1007/s11235-009-9240-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper proposes a novel Context-Risk-Aware Access Control (CRAAC) model for Ubiquitous Computing (UbiComp) environments. Context-aware access control allows access permissions to be adjusted dynamically in adaptation to the changes in the surrounding context. Though current context-aware access control solutions can, to a certain extent, achieve such context adaptation, there are still limitations in these solutions. One of the limitations is that they make use of an architectural model by which the two major functional blocks, context infrastructure and access control system, are tightly coupled together. As a result, they are not flexible nor generic to accommodate various access control constraints and policy settings. The CRAAC model is designed to overcome this limitation. By introducing the concept of risk aware and authorisation levels of assurance (LoA) into the authorisation decision making, and by maximising the use of a component-based approach in the architectural design; the model has successfully decoupled context infrastructure and access control system making it more extensible in providing the required functionality, and more flexible in accommodating different contextual attributes and their mutual correlation. In addition, it interoperates and is backward compatible with traditional role-based access control solutions.
引用
收藏
页码:127 / 137
页数:11
相关论文
共 27 条
[1]   Comparing methods for multiattribute decision making with ordinal weights [J].
Ahn, Byeong Seok ;
Park, Kyung Sam .
COMPUTERS & OPERATIONS RESEARCH, 2008, 35 (05) :1660-1670
[2]   Decision quality using ranked attribute weights [J].
Barron, FH ;
Barrett, BE .
MANAGEMENT SCIENCE, 1996, 42 (11) :1515-1523
[3]  
BARRON FH, 1992, ACTA PSYCHOL, V80, P91
[4]  
Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
[5]  
Burr W.E., 2006, NIST SPECIAL PUBLICA
[6]  
Chae SH, 2006, LECT NOTES COMPUT SC, V3786, P354
[7]   An RBAC-based access control model for object-oriented systems offering dynamic aspect features [J].
Chou, SC .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2005, E88D (09) :2143-2147
[8]   A context-aware security architecture for emerging applications [J].
Covington, MJ ;
Fogla, P ;
Zhan, ZY ;
Ahamad, M .
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, :249-258
[9]   Understanding and Using Context [J].
Dey, Anind K. .
PERSONAL AND UBIQUITOUS COMPUTING, 2001, 5 (01) :4-7
[10]  
Diep NN, 2007, ECUMN 2007: FOURTH EUROPEAN CONFERENCE ON UNIVERSAL MULTISERVICE NETWORKS, PROCEEDINGS, P419