A privacy-aware access control model for distributed network monitoring

被引:7
|
作者
Papagiannakopoulou, Eugenia I. [1 ]
Koukovini, Maria N. [1 ]
Lioudakis, Georgios V. [1 ]
Garcia-Alfaro, Joaquin [2 ]
Kaklamani, Dimitra I. [1 ]
Venieris, Iakovos S. [1 ]
Cuppens, Frederic [2 ]
Cuppens-Boulahia, Nora [2 ]
机构
[1] Natl Tech Univ Athens, Sch Elect & Comp Engn, Athens, Greece
[2] TELECOM Bretagne, Inst TELECOM, F-35576 Rennes, France
关键词
ANONYMIZATION; CRYPTOGRAPHY;
D O I
10.1016/j.compeleceng.2012.08.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce a new access control model that aims at addressing the privacy implications surrounding network monitoring. In fact, despite its importance, network monitoring is natively leakage-prone and, moreover, this is exacerbated due to the complexity of the highly dynamic monitoring procedures and infrastructures, that may include multiple traffic observation points, distributed mitigation mechanisms and even interoperator cooperation. Conceived on the basis of data protection legislation, the proposed approach is grounded on a rich in expressiveness information model, that captures all the underlying monitoring concepts along with their associations. The model enables the specification of contextual authorisation policies and expressive separation and binding of duty constraints. Finally, two key innovations of our work consist in the ability to define access control rules at any level of abstraction and in enabling a verification procedure, which results in inherently privacy-aware workflows, thus fostering the realisation of the Privacy by Design vision. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:2263 / 2281
页数:19
相关论文
共 50 条
  • [1] A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress
    Papagiannakopoulou, Eugenia I. .
    Koukovini, Maria N.
    Lioudakis, Georgios V.
    Garcia-Alfaro, Joaquin
    Kaklamani, Dimitra I.
    Venieris, Iakovos S.
    FOUNDATIONS AND PRACTICE OF SECURITY, 2011, 6888 : 208 - +
  • [2] Privacy-Aware Network Monitoring
    Dorfinger, Peter
    Schmoll, Carsten
    Strohmeier, Felix
    ERCIM NEWS, 2009, (77): : 28 - 29
  • [3] Privacy-Aware Passive Network Monitoring
    Gogoulos, Fotios
    Antonakopoulou, Anna
    Mousas, Aziz S.
    Lioudakis, Georgios V.
    Kaklamani, Dimitra I.
    Venieris, Iakovos S.
    13TH PANHELLENIC CONFERENCE ON INFORMATICS, PROCEEDINGS, 2009, : 171 - 175
  • [4] A privacy-aware access control system
    Ardagna, C.
    Cremonini, M.
    di Vimercati, S.
    Samarati, P.
    JOURNAL OF COMPUTER SECURITY, 2008, 16 (04) : 369 - 397
  • [5] Privacy query rewriting algorithm instrumented by a privacy-aware access control model
    Oulmakhzoune, Said
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Morucci, Stephane
    Barhamgi, Mahmoud
    Benslimane, Djamal
    ANNALS OF TELECOMMUNICATIONS, 2014, 69 (1-2) : 3 - 19
  • [6] Privacy query rewriting algorithm instrumented by a privacy-aware access control model
    Said Oulmakhzoune
    Nora Cuppens-Boulahia
    Frédéric Cuppens
    Stéphane Morucci
    Mahmoud Barhamgi
    Djamal Benslimane
    annals of telecommunications - annales des télécommunications, 2014, 69 : 3 - 19
  • [7] Privacy-aware Role Based Access Control
    Ni, Qun
    Trombetta, Alberto
    Bertino, Elisa
    Lobo, Jorge
    SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 41 - 50
  • [8] A Semantic Framework for Privacy-Aware Access Control
    Lioudakis, Georgios V.
    Dellas, Nikolaos L.
    Koutsoloukas, Eleftherios A.
    Kapitsaki, Georgia M.
    Kaklamani, Dimitra I.
    Venieris, Iakovos S.
    2008 INTERNATIONAL MULTICONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (IMCSIT), VOLS 1 AND 2, 2008, : 757 - 764
  • [9] Access control in a privacy-aware eLearning environment
    Franz, Elke
    Wahrig, Hagen
    Boettcher, Alexander
    Borcea-Pfitzmann, Katrin
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 879 - +
  • [10] A Privacy-Aware Access Model on Anonymized Data
    Huang, Xuezhen
    Liu, Jiqiang
    Han, Zhen
    TRUSTED SYSTEMS, INTRUST 2014, 2015, 9473 : 201 - 212