Privacy-Aware and Context-Sensitive Access Control for Opportunistic Data Sharing

被引:0
|
作者
Luis Herrera, Juan [1 ]
Chen, Hsiao-Yuan [2 ]
Berrocal, Javier [1 ]
Murillo, Juan M. [1 ]
Julien, Christine [2 ]
机构
[1] Univ Extremadura, Badajoz, Spain
[2] Univ Texas Austin, Austin, TX 78712 USA
基金
美国国家科学基金会;
关键词
opportunistic networks; access control; privacy;
D O I
10.1109/CCGrid51090.2021.00092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Opportunistic data sharing allows users to receive real-time, dynamic data directly from peers. These systems not only allow large-scale cooperative sensing but they also empower users to fully control what information is sensed, stored, and shared, enhancing an individual's control over their own potentially private data. While there exist context-aware frameworks that allow individual users to define when and what shared information peers can consume, these approaches have limited expressiveness and do not allow data owners to modulate the granularity of the information released depending on a particular peer or situation. In addition, these frameworks do not consider the consuming peers' privacy, i.e., how much information they have to provide to get access to some desired data. In this paper, we present PADEC, a context-sensitive, privacy-aware framework that allows users to define rich access control rules over their resources and to attach levels of granularity to each rule in order to precisely define who has access to what data when and at what level of detail. Our evaluation shows that PADEC is more expressive than other access control mechanisms and protects the provider's privacy up to 90% more.
引用
收藏
页码:762 / 769
页数:8
相关论文
共 50 条
  • [31] Context-Dependent Privacy-Aware Photo Sharing Based on Machine Learning
    Yuan, Lin
    Theytaz, Joel
    Ebrahimi, Touradj
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017, 2017, 502 : 93 - 107
  • [32] Privacy-Aware Data Trading
    Wang, Shengling
    Shi, Lina
    Hu, Qin
    Zhang, Junshan
    Cheng, Xiuzhen
    Yu, Jiguo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3916 - 3927
  • [33] Privacy-Aware Tag Recommendation for Image Sharing
    Tonge, Ashwini
    Caragea, Cornelia
    Squicciarini, Anna
    [J]. HT'18: PROCEEDINGS OF THE 29TH ACM CONFERENCE ON HYPERTEXT AND SOCIAL MEDIA, 2018, : 52 - 56
  • [34] CONTEXT-SENSITIVE ACCESS CONTROL MODEL FOR GOVERNMENT SERVICES
    Gostojic, Stevan
    Sladic, Goran
    Milosavljevic, Branko
    Konjovic, Zora
    [J]. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2012, 22 (02) : 184 - 213
  • [35] A context-sensitive access control model and prototype implementation
    Cholewka, DG
    Botha, RA
    Eloff, JHP
    [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 341 - 350
  • [36] A Context-sensitive Access Control Model for Workflow Environment
    Zhu, Zhou
    Xu, Renzuo
    [J]. ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, : 955 - 961
  • [37] Context-sensitive Access Control Model for Business Processes
    Sladic, Goran
    Milosavljevic, Branko
    Konjovic, Zora
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (03) : 939 - 972
  • [38] Context-sensitive Constraints for Access Control of Business Processes
    Milosavljevic, Gordana
    Sladic, Goran
    Milosavljevic, Branko
    Zaric, Miroslav
    Gostojic, Stevan
    Slivka, Jelena
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2018, 15 (01) : 1 - 30
  • [39] Creating a Privacy-aware framework for fine-grained Data Access
    Salant, Eliot
    [J]. ERCIM NEWS, 2023, (133): : 16 - 17
  • [40] Privacy-aware access control through negotiation in daily life service
    Park, Hyun-A
    Zhan, Justin
    Lee, Dong Hoon
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5075 : 514 - +