Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments

被引:6
|
作者
Choi, Jung Hwan [1 ]
Kang, Dong Hyun [1 ]
Jang, Hyunsu [1 ]
Eom, Young Ik [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, Seoul, South Korea
关键词
D O I
10.1109/PCCC.2008.4745089
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In pervasive computing environments, where various types of information are publicly owned, and multiple users access the networks via various networked devices anytime and anywhere, access control that grants permission to an authorized user is definitely needed for secure information access. Context awareness refers to the idea that computers can both sense and react based on various context in their environments. In many access control schemes, recently, context awareness has been utilized to guarantee dynamic access control according to current context and various access control schemes utilizing context awareness have been proposed. However, previous studies have difficulty describing conditions for assigning roles and modifying permissions. They also simply consider assigning roles or modifying permissions, rather than providing detailed access control algorithms such as role delegation or role revocation. In this paper, we propose an adaptive access control scheme utilizing context awareness in pervasive computing environments. We design an adaptive access control model based on traditional RBAC(Role-based Access Control) model, and present an adaptive access control scheme to guarantee dynamic user and permission assignment according to changes of context. In this scheme, we define context requirements in each table, enabling a more detailed description. We also guarantee dynamic access control via various access control algorithms.
引用
收藏
页码:491 / 498
页数:8
相关论文
共 50 条
  • [1] Capturing context-awareness in access control for pervasive environments
    Medidi, M
    Nguyen, T
    [J]. PSC '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON PERVASIVE SYSTEMS AND COMPUTING, 2005, : 124 - 130
  • [2] A context-aware access control model for pervasive computing environments
    Emami, Sareh Sadat
    Amini, Morteza
    Zokaei, Saadan
    [J]. 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 51 - +
  • [3] A novel privacy preserving authentication and access control scheme for pervasive computing environments
    Ren, Kui
    Lou, Wenjing
    Kim, Kwangjo
    Deng, Robert
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2006, 55 (04) : 1373 - 1384
  • [4] A Context-Aware Access Control Model for Pervasive Computing in Enterprise Environments
    Zhu, Zhou
    Xu, Renzuo
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4572 - 4577
  • [5] An authorization and access control scheme for pervasive computing
    Staffans, LA
    Saridakis, T
    [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2004, : 726 - 733
  • [6] Uncertainty assessment in access control of pervasive computing environments
    Pashazadeh, Saeid
    Dizaji, Mohammad Zendedel
    Amiri, Ali
    [J]. 2012 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2012, : 1174 - 1179
  • [7] Privacy Enhanced Access Control in Pervasive Computing Environments
    Ren, Kui
    Lou, Wenjing
    [J]. 2ND INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS (BROADNETS 2005), 2005, : 384 - +
  • [8] A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments
    Tan, Zuowen
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 1839 - 1846
  • [9] Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments
    Li, Chun-Ta
    Hwang, Min-Shiang
    Chu, Yen-Ping
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4255 - 4258
  • [10] Context-based secure resource access in pervasive computing environments
    Tripathi, A
    Ahmed, T
    Kulkarni, D
    Kumar, R
    Kashiramka, K
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 159 - 163