A privacy-aware access control model for distributed network monitoring

被引:7
|
作者
Papagiannakopoulou, Eugenia I. [1 ]
Koukovini, Maria N. [1 ]
Lioudakis, Georgios V. [1 ]
Garcia-Alfaro, Joaquin [2 ]
Kaklamani, Dimitra I. [1 ]
Venieris, Iakovos S. [1 ]
Cuppens, Frederic [2 ]
Cuppens-Boulahia, Nora [2 ]
机构
[1] Natl Tech Univ Athens, Sch Elect & Comp Engn, Athens, Greece
[2] TELECOM Bretagne, Inst TELECOM, F-35576 Rennes, France
关键词
ANONYMIZATION; CRYPTOGRAPHY;
D O I
10.1016/j.compeleceng.2012.08.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce a new access control model that aims at addressing the privacy implications surrounding network monitoring. In fact, despite its importance, network monitoring is natively leakage-prone and, moreover, this is exacerbated due to the complexity of the highly dynamic monitoring procedures and infrastructures, that may include multiple traffic observation points, distributed mitigation mechanisms and even interoperator cooperation. Conceived on the basis of data protection legislation, the proposed approach is grounded on a rich in expressiveness information model, that captures all the underlying monitoring concepts along with their associations. The model enables the specification of contextual authorisation policies and expressive separation and binding of duty constraints. Finally, two key innovations of our work consist in the ability to define access control rules at any level of abstraction and in enabling a verification procedure, which results in inherently privacy-aware workflows, thus fostering the realisation of the Privacy by Design vision. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:2263 / 2281
页数:19
相关论文
共 50 条
  • [31] Privacy-aware access control for message exchange in vehicular ad hoc networks
    Sushama Karumanchi
    Anna Squicciarini
    Dan Lin
    Telecommunication Systems, 2015, 58 : 349 - 361
  • [32] Purpose fusion: The risk purpose based privacy-aware data access control
    Liu Y.-M.
    Zhou H.-F.
    Wang Z.-H.
    Wang W.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (08): : 1339 - 1348
  • [33] Privacy-aware collaborative access control in Web-based Social Networks
    Carminati, Barbara
    Ferrari, Elena
    DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 81 - 96
  • [34] Privacy-aware access control for message exchange in vehicular ad hoc networks
    Karumanchi, Sushama
    Squicciarini, Anna
    Lin, Dan
    TELECOMMUNICATION SYSTEMS, 2015, 58 (04) : 349 - 361
  • [35] A privacy-aware continuous authentication scheme for proximity-based access control
    Agudo, Isaac
    Rios, Ruben
    Lopez, Javier
    COMPUTERS & SECURITY, 2013, 39 : 117 - 126
  • [36] Privacy-Aware and Context-Sensitive Access Control for Opportunistic Data Sharing
    Luis Herrera, Juan
    Chen, Hsiao-Yuan
    Berrocal, Javier
    Murillo, Juan M.
    Julien, Christine
    21ST IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2021), 2021, : 762 - 769
  • [37] A Privacy-aware Graph-based Access Control System for the Healthcare Domain
    Tian, Yuan
    Song, Biao
    Hassan, M. Mehedi
    Huh, Eui-Nam
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (10): : 2708 - 2730
  • [38] Risk-Based Privacy-Aware Access Control for Threat Detection Systems
    Metoui, Nadia
    Bezzi, Michele
    Armando, Alessandro
    TRANSACTIONS ON LARGE-SCALE DATA- AND KNOWLEDGECENTERED SYSTEMS XXXVI: SPECIAL ISSUE ON DATA AND SECURITY ENGINEERING, 2018, 10720 : 1 - 30
  • [39] Language-Integrated Privacy-Aware Distributed Queries
    Salvaneschi, Guido
    Koehler, Mirko
    Sokolowski, Daniel
    Haller, Philipp
    Erdweg, Sebastian
    Mezini, Mira
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2019, 3 (OOPSLA):
  • [40] A Privacy-Aware Collaborative DDoS Defence Network
    Fung, Carol
    Pillai, Yadunandan
    NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,