Purpose based access control for privacy protection in relational database systems

被引:0
作者
Ji-Won Byun
Ninghui Li
机构
[1] Purdue University,CERIAS and Department of Computer Science
来源
The VLDB Journal | 2008年 / 17卷
关键词
Privacy; Access control; Purpose; Private data management;
D O I
暂无
中图分类号
学科分类号
摘要
In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated with a given data element specifies the intended use of the data element. A key feature of our model is that it allows multiple purposes to be associated with each data element and also supports explicit prohibitions, thus allowing privacy officers to specify that some data should not be used for certain purposes. An important issue addressed in this article is the granularity of data labeling, i.e., the units of data with which purposes can be associated. We address this issue in the context of relational databases and propose four different labeling schemes, each providing a different granularity. We also propose an approach to represent purpose information, which results in low storage overhead, and we exploit query modification techniques to support access control based on purpose information. Another contribution of our work is that we address the problem of how to determine the purpose for which certain data are accessed by a given user. Our proposed solution relies on role-based access control (RBAC) models as well as the notion of conditional role which is based on the notions of role attribute and system attribute.
引用
收藏
页码:603 / 619
页数:16
相关论文
共 50 条
  • [41] A role-involved purpose-based access control model
    Kabir, Md Enamul
    Wang, Hua
    Bertino, Elisa
    INFORMATION SYSTEMS FRONTIERS, 2012, 14 (03) : 809 - 822
  • [42] A privacy protection method for health care big data management based on risk access control
    Mingyue Shi
    Rong Jiang
    Xiaohan Hu
    Jingwei Shang
    Health Care Management Science, 2020, 23 : 427 - 442
  • [43] Mandatory Content Access Control for Privacy Protection in Information Centric Networks
    Li, Qi
    Sandhu, Ravi
    Zhang, Xinwen
    Xu, Mingwei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (05) : 494 - 506
  • [44] An efficient blind filter: Location privacy protection and the access control in FinTech
    Li, Zhidan
    Li, Wenmin
    Wen, QiaoYan
    Chen, Jiageng
    Yin, Wei
    Liang, Kaitai
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 797 - 810
  • [45] Privacy-aware access control for video data in intelligent surveillance systems
    Vagts, Hauke
    Jakoby, Andreas
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2012, 2012, 8406
  • [46] A privacy-enhanced access control
    Department of Computer Science, Faculty of Science and Technology, Meiji University, Kawasaki, 214-8571, Japan
    不详
    不详
    不详
    Syst Comput Jpn, 2006, 5 (77-86): : 77 - 86
  • [47] Security and privacy based access control model for internet of connected vehicles
    Habib, Muhammad Asif
    Ahmad, Mudassar
    Jabbar, Sohail
    Khalid, Shehzad
    Chaudhry, Junaid
    Saleem, Kashif
    Rodrigues, Joel J. P. C.
    Khalil, Muhammad Sayim
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 : 687 - 696
  • [48] Trust Based Privacy Preserving Access Control In Web Services Paradigm
    Bhatia, Rekha
    Singh, Manpreet
    2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 243 - 246
  • [49] Privacy Protection Technology and Access Control Mechanism for Medical Big Data
    Lee, Narn-Yih
    Wu, Bing-Han
    2017 6TH IIAI INTERNATIONAL CONGRESS ON ADVANCED APPLIED INFORMATICS (IIAI-AAI), 2017, : 424 - 429
  • [50] A Pursuit of Sustainable Privacy Protection in Big Data Environment by an Optimized Clustered-Purpose Based Algorithm
    Ghani, Norjihan Binti Abdul
    Ahmad, Muneer
    Mahmoud, Zahra
    Mehmood, Raja Majid
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2020, 26 (06) : 1217 - 1231