A privacy-aware access control model for distributed network monitoring

被引:7
|
作者
Papagiannakopoulou, Eugenia I. [1 ]
Koukovini, Maria N. [1 ]
Lioudakis, Georgios V. [1 ]
Garcia-Alfaro, Joaquin [2 ]
Kaklamani, Dimitra I. [1 ]
Venieris, Iakovos S. [1 ]
Cuppens, Frederic [2 ]
Cuppens-Boulahia, Nora [2 ]
机构
[1] Natl Tech Univ Athens, Sch Elect & Comp Engn, Athens, Greece
[2] TELECOM Bretagne, Inst TELECOM, F-35576 Rennes, France
关键词
ANONYMIZATION; CRYPTOGRAPHY;
D O I
10.1016/j.compeleceng.2012.08.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce a new access control model that aims at addressing the privacy implications surrounding network monitoring. In fact, despite its importance, network monitoring is natively leakage-prone and, moreover, this is exacerbated due to the complexity of the highly dynamic monitoring procedures and infrastructures, that may include multiple traffic observation points, distributed mitigation mechanisms and even interoperator cooperation. Conceived on the basis of data protection legislation, the proposed approach is grounded on a rich in expressiveness information model, that captures all the underlying monitoring concepts along with their associations. The model enables the specification of contextual authorisation policies and expressive separation and binding of duty constraints. Finally, two key innovations of our work consist in the ability to define access control rules at any level of abstraction and in enabling a verification procedure, which results in inherently privacy-aware workflows, thus fostering the realisation of the Privacy by Design vision. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:2263 / 2281
页数:19
相关论文
共 50 条
  • [41] Communication-Efficient and Privacy-Aware Distributed Learning
    Gogineni, Vinay Chakravarthi
    Moradi, Ashkan
    Venkategowda, Naveen K. D.
    Werner, Stefan
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2023, 9 : 705 - 720
  • [42] A Distributed Privacy-Aware Architecture for Communication in Smart Grids
    Callegari, Christian
    De Pietro, Sara
    Giordano, Stefano
    Pagano, Michele
    Procissi, Gregorio
    2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 1622 - 1627
  • [43] A Privacy-Aware Semantic Model for Provenance Management
    Can, Ozgu
    Yilmazer, Dilek
    METADATA AND SEMANTICS RESEARCH, MTSR 2014, 2014, 478 : 162 - 169
  • [44] Privacy-aware Remote Monitoring System by Skeleton Recognition
    Nitta, Yoshihisa
    Murayama, Yuko
    PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 582 - 589
  • [45] Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things
    Zhang, Yinghui
    Deng, Robert H.
    Han, Gang
    Zheng, Dong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 123 : 89 - 100
  • [46] Privacy-Aware and Secure Decentralized Air Quality Monitoring
    Mrissa, Michael
    Tosic, Aleksandar
    Hrovatin, Niki
    Aslam, Sidra
    David, Balazs
    Hajdu, Laszlo
    Kresz, Miklos
    Brodnik, Andrej
    Kavsek, Branko
    APPLIED SCIENCES-BASEL, 2022, 12 (04):
  • [47] Privacy-Aware Wrappers
    Jafer, Yasser
    Matwin, Stan
    Sokolova, Marina
    ADVANCES IN ARTIFICIAL INTELLIGENCE (AI 2015), 2015, 9091 : 130 - 138
  • [48] Privacy-Aware Folksonomies
    Heidinger, Clemens
    Buchmann, Erik
    Huber, Matthias
    Boehm, Klemens
    Mueller-Quade, Joern
    RESEARCH AND ADVANCED TECHNOLOGY FOR DIGITAL LIBRARIES, 2010, 6273 : 156 - 167
  • [49] Privacy-Aware and Scalable Content Dissemination in Distributed Social Networks
    Kapanipathi, Pavan
    Anaya, Julia
    Sheth, Amit
    Slatkin, Brett
    Passant, Alexandre
    SEMANTIC WEB - ISWC 2011, PT II, 2011, 7032 : 157 - +
  • [50] THE PRIVACY-AWARE ACCESS CONTROL SYSTEM USING ATTRIBUTE-AND ROLE-BASED ACCESS CONTROL IN PRIVATE CLOUD
    Mon, Ei Ei
    Naing, Thinn Thu
    2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, : 447 - 451