A Card Requirements Language Enabling Privacy-Preserving Access Control

被引:7
|
作者
Camenisch, Jan [1 ]
Moedersheim, Sebastian [1 ]
Neven, Gregory [1 ]
Preiss, Franz-Stefan [1 ]
Sommer, Dieter [1 ]
机构
[1] IBM Res Zurich, Zurich, Switzerland
关键词
Access Control; Policy Languages; Privacy; Anonymous Credentials; Digital Credentials;
D O I
10.1145/1809842.1809863
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We address the problem of privacy-preserving access control in distributed systems. Users commonly reveal more personal data than strictly necessary to be granted access to online resources, even though existing technologies, such as anonymous credential systems, offer functionalities that would allow for privacy-friendly authorization. An important reason for this lack of technology adoption is, as we believe, the absence of a suitable authorization language offering adequate expressiveness to address the privacy-friendly functionalities. To overcome this problem, we propose an authorization language that allows for expressing access control requirements in a privacy-preserving way. Our language is independent from concrete technology, thus it allows for specifying requirements regardless of implementation details while it is also applicable for technologies designed without privacy considerations. We see our proposal as an important step towards making access control systems privacy-preserving.
引用
收藏
页码:119 / 128
页数:10
相关论文
共 50 条
  • [21] Enabling Privacy-preserving Auctions in Big Data
    Jung, Taeho
    Li, Xiang-Yang
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2015, : 173 - 178
  • [22] DIMY: Enabling privacy-preserving contact tracing
    Ahmed, Nadeem
    Michelin, Regio A.
    Xue, Wanli
    Putra, Guntur Dharma
    Ruj, Sushmita
    Kanhere, Salil S.
    Jha, Sanjay
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 202
  • [23] Privacy-Preserving Access Control Model for Big Data Cloud
    Fugkeaw, Somchart
    Sato, Hiroyuki
    2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015, : 130 - 135
  • [24] Hybrid Solution for Privacy-Preserving Access Control for Healthcare Data
    Smithamol, Mukalel Bhaskaran
    Sridhar, Rajeswari
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2017, 17 (02) : 31 - 38
  • [25] A Privacy-Preserving Attribute-Based Access Control Scheme
    Xu, Yang
    Zeng, Quanrun
    Wang, Guojun
    Zhang, Cheng
    Ren, Ju
    Zhang, Yaoxue
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 361 - 370
  • [26] A privacy-preserving Blockchain with fine-grained access control
    Adams, Carlisle
    SECURITY AND PRIVACY, 2020, 3 (02):
  • [27] Efficient and Privacy-Preserving Similarity Query With Access Control in eHealthcare
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 880 - 893
  • [28] Privacy-Preserving Access Control in Electronic Health Record Linkage
    Lu, Yang
    Sinnott, Richard O.
    Verspoor, Kain
    Parampalli, Udaya
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1079 - 1090
  • [29] Privacy-Preserving Decentralized Access Control for Cloud Storage Systems
    Chen, Jianwei
    Ma, Huadong
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 507 - 514
  • [30] Privacy-Preserving Attribute Distribution Mechanism for Access Control in a Grid
    Park, Sang M.
    Chung, Soon M.
    ICTAI: 2009 21ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, 2009, : 308 - 313