Risk-Based Access Control for Personal Data Services

被引:0
|
作者
Chun, Soon Ae [1 ]
Atluri, Vijayalakshmi [2 ,3 ]
机构
[1] CUNY Coll Staten Isl, Staten Isl, NY 10314 USA
[2] Rutgers State Univ, MSIS Dept, Newark, NJ 07102 USA
[3] Rutgers State Univ, CIMIC, Newark, NJ 07102 USA
来源
ALGORITHMS, ARCHITECTURES AND INFORMATION SYSTEMS SECURITY | 2009年 / 3卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the context of ubiquitous computing, small mobile devices are used as a platform for consuming various services. Specifically, personal data and information of a person (called data owner) are distributed over many third party organizations (data/service provider), and are being made available as Web services, such as monthly financial statements, personal medical data services (e.g., X-ray results), etc. Very often, the personal information Web services are not just used by the data owner, but by third party data consumers who work on the cases on behalf of the data owner, such as financial advisers or doctors. In this environment, the data consumers often are not the same as the data owner. Access control is enforced to prevent confidential personal information from falling into the hands of "unauthorized" users. However, in many critical situations, such as emergencies, relevant information may need to be released even if users are not explicitly authorized. In this paper, we present the notion of situational role and propose a risk-based access control model that makes the decisions by assessing the risk in releasing data in the situation at hand. Specifically, it employs the "access first and verify later" strategy so that needed personal information is released without delaying access for a decision making third-party, and yet providing an adequate mechanism for appropriate release of personal information by a third party provider. Our approach employs the notion of situation role and uses semantics in building situation role hierarchies. It computes the semantic distance between the credential attributes required by the situational role and the actual role of a user requesting access, which essentially is used in assessing the risk.
引用
收藏
页码:263 / +
页数:2
相关论文
共 50 条
  • [1] Beyond Risk-Based Access Control: Towards Incentive-Based Access Control
    Liu, Debin
    Li, Ninghui
    Wang, XiaoFeng
    Camp, L. Jean
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2012, 7035 : 102 - +
  • [2] Risk-based Decision Method for Access Control Systems
    Shaikh, Riaz Ahmed
    Adi, Kamel
    Logrippo, Luigi
    Mankovski, Serge
    2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 189 - 192
  • [3] A framework and risk assessment approaches for risk-based access control in the cloud
    dos Santos, Daniel Ricardo
    Marinho, Roberto
    Schmitt, Gustavo Roecker
    Westphall, Carla Merkle
    Westphall, Carlos Becker
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 74 : 86 - 97
  • [4] An Adaptive Risk-Based Access Control System Using Risk Factor for e-Services (ARBAC-RF)
    Ramtohul, Avinash
    PROCEEDINGS OF THE 16TH EUROPEAN CONFERENCE ON E-GOVERNMENT (ECEG 2016), 2016, : 291 - 301
  • [5] A Dynamic Risk-based Access Control Architecture for Cloud Computing
    dos Santos, Daniel Ricardo
    Westphall, Carla Merkle
    Westphall, Carlos Becker
    2014 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2014,
  • [6] Dynamic risk-based decision methods for access control systems
    Shaikh, Riaz Ahmed
    Adi, Kamel
    Logrippo, Luigi
    COMPUTERS & SECURITY, 2012, 31 (04) : 447 - 464
  • [7] A Dynamic Risk-based Access Control Model for Cloud Computing
    Chen, Aiguo
    Xing, Hanwen
    She, Kun
    Duan, Guiduo
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCES ON BIG DATA AND CLOUD COMPUTING (BDCLOUD 2016) SOCIAL COMPUTING AND NETWORKING (SOCIALCOM 2016) SUSTAINABLE COMPUTING AND COMMUNICATIONS (SUSTAINCOM 2016) (BDCLOUD-SOCIALCOM-SUSTAINCOM 2016), 2016, : 579 - 584
  • [8] Risk-Based Access Control Model: A Systematic Literature Review
    Atlam, Hany F.
    Azad, Muhammad Ajmal
    Alassafi, Madini O.
    Alshdadi, Abdulrahman A.
    Alenezi, Ahmed
    FUTURE INTERNET, 2020, 12 (06):
  • [9] Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model
    Atlam, Hany F.
    Azad, Muhammad Ajmal
    Fadhel, Nawfal F.
    SENSORS, 2022, 22 (05)
  • [10] ANFIS for risk estimation in risk-based access control model for smart homes
    Hany F. Atlam
    Gary B. Wills
    Multimedia Tools and Applications, 2023, 82 : 18269 - 18298