CA-UCON: a Context-Aware Usage Control Model

被引:0
|
作者
Almutairi, Abulgader [1 ]
Siewe, Francois [1 ]
机构
[1] De Montfort Univ, Software Technol Res Lab, Leicester LE1 9BH, Leics, England
关键词
Pervasive computing; context-aware; usage control; adaptive system;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Usage CONtrol (UCON) model is the latest major enhancement of the traditional access control models which enables mutability of subject and object attributes, and continuity of control on usage of resources. In UCON, access permission decision is based on three factors: authorisations, obligations and conditions. While authorisations and obligations are requirements that must be fulfilled by the subject and the object, conditions are subject and object independent requirements that must be satisfied by the environment. As a consequence, access permission may be revoked (and the access stopped) as a result of changes in the environment regardless of whether the authorisations and obligations requirements are met. This constitutes a major shortcoming of the UCON model in pervasive computing systems which constantly strive to adapt to environmental changes so as to minimise disruptions to the user. To overcome this limitation, this paper proposes a Context-Aware Usage CONtrol (CA-UCON) model which extends the traditional UCON model to enable adaptation to environmental changes in the aim of preserving continuity of access. When the authorisations and obligations requirements are met by the subject and the object, and the conditions requirements fail due to changes in the environment or the system context, CA-UCON model triggers specific actions to adapt to the new situation. Besides the data protection, CA-UCON model so enhances the quality of services, striving to keep explicit interactions with the user at a minimum.
引用
收藏
页码:38 / 43
页数:6
相关论文
共 50 条
  • [1] Context-Aware Usage Control for Android
    Bai, Guangdong
    Gu, Liang
    Feng, Tao
    Guo, Yao
    Chen, Xiangqun
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2010, 50 : 326 - 343
  • [2] Context-aware usage control for web of things
    Bai, Guangdong
    Yan, Lin
    Gu, Liang
    Guo, Yao
    Chen, Xiangqun
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2696 - 2712
  • [3] Context-Aware Policy Analysis for Distributed Usage Control
    Gil, Gonzalo
    Arnaiz, Aitor
    Higuero, Marivi
    Javier Diez, Francisco
    Jacob, Eduardo
    [J]. ENERGIES, 2022, 15 (19)
  • [4] The Application of the Context-Aware Access Control Model
    Zhang, Chao
    Jin, Zhengping
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 2670 - 2674
  • [5] EasyPrivacy: Context-Aware Resource Usage Control System for Android Platform
    Ren, Bingfei
    Liu, Chuanchang
    Cheng, Bo
    Hong, Shuangxi
    Guo, Jie
    Chen, Junliang
    [J]. IEEE ACCESS, 2018, 6 : 44506 - 44518
  • [6] A Context-Aware Access Control Model for Pervasive Environments
    Al-Rwais, Sumayah
    Al-Muhtadi, Jalal
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 425 - +
  • [7] Context-Aware Access Control Model for Cloud Computing
    Zhou, Zhenji
    Wu, Lifa
    Hong, Zheng
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2013, 6 (06): : 1 - 12
  • [8] CaACBIM: A Context-aware Access Control Model for BIM
    Zheng, Rongyue
    Jiang, Jianlin
    Hao, Xiaohan
    Ren, Wei
    Xiong, Feng
    Zhu, Tianqing
    [J]. INFORMATION, 2019, 10 (02)
  • [9] A Context-aware Access Control Model for Pervasive Environments
    Al-Rwais, Sumayah
    Al-Muhtadi, Jalal
    [J]. IETE TECHNICAL REVIEW, 2010, 27 (05) : 371 - 379
  • [10] A Context-Aware Trust Model
    Tian, Junfeng
    Lan, Haitao
    [J]. 2013 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND MANAGEMENT SCIENCE (ICIEMS 2013), 2013, : 903 - 913