Privacy-Preserving Enforcement of Spatially Aware RBAC

被引:11
|
作者
Kirkpatrick, Michael S. [1 ]
Ghinita, Gabriel [2 ]
Bertino, Elisa [3 ]
机构
[1] James Madison Univ, Dept Comp Sci, Harrisonburg, VA 22807 USA
[2] Univ Massachusetts, Dept Comp Sci, Boston, MA 02125 USA
[3] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
RBAC; privacy; security; access control; applied cryptography; INFORMATION-RETRIEVAL; ACCESS-CONTROL; PROTOCOL;
D O I
10.1109/TDSC.2011.62
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Several models for incorporating spatial constraints into role-based access control (RBAC) have been proposed, and researchers are now focusing on the challenge of ensuring such policies are enforced correctly. However, existing approaches have a major shortcoming, as they assume the server is trustworthy and require complete disclosure of sensitive location information by the user. In this work, we propose a novel framework and a set of protocols to solve this problem. Specifically, in our scheme, a user provides a service provider with role and location tokens along with a request. The service provider consults with a role authority and a location authority to verify the tokens and evaluate the policy. However, none of the servers learn the requesting user's identity, role, or location. In this paper, we define the protocols and the policy enforcement scheme, and present a formal proof of a number of security properties.
引用
收藏
页码:627 / 640
页数:14
相关论文
共 50 条
  • [1] On the Specification and Enforcement of Privacy-Preserving Contractual Agreements
    Schneider, Gerardo
    LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: DISCUSSION, DISSEMINATION, APPLICATIONS, ISOLA 2016, PT II, 2016, 9953 : 413 - 419
  • [2] GEO-RBAC: A spatially aware RBAC
    Damiani, Maria Luisa
    Bertino, Elisa
    Catania, Barbara
    Perlasca, Paolo
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (01)
  • [3] Mobility-Aware Privacy-Preserving Mobile Crowdsourcing
    Qiu, Guoying
    Shen, Yulong
    Cheng, Ke
    Liu, Lingtong
    Zeng, Shuiguang
    SENSORS, 2021, 21 (07)
  • [4] Privacy-preserving Location-aware Mobile Advertisement
    Troja, Erald
    Bakiras, Spiridon
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 783 - 790
  • [5] A context-aware location privacy-preserving technique
    Mao, Dianhui
    Cai, Qiang
    Li, Haisheng
    Cao, Jian
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2013, 41 (SUPPL.I): : 180 - 183
  • [6] Fairness-Aware Privacy-Preserving Record Linkage
    Vatsalan, Dinusha
    Yu, Joyce
    Henecka, Wilko
    Thorne, Brian
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, ESORICS 2020, DPM 2020, CBT 2020, 2020, 12484 : 3 - 18
  • [7] Trajectory-aware privacy-preserving method with local differential privacy in crowdsourcing
    Hong, Yingcong
    Li, Junyi
    Lin, Yaping
    Hu, Qiao
    Li, Xiehua
    EURASIP JOURNAL ON INFORMATION SECURITY, 2024, 2024 (01):
  • [8] Privacy-Preserving Genome-Aware Remote Health Monitoring
    Gong, Yanmin
    Zhang, Chi
    Hu, Yaodan
    Fang, Yuguang
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [9] Correlation-Aware and Personalized Privacy-Preserving Data Collection
    Yu, Dongxiao
    Zhang, Kaiyi
    Tao, Youming
    Xu, Wenlu
    Zou, Yifei
    Cheng, Xiuzhen
    2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 724 - 729
  • [10] An Information-Aware Privacy-Preserving Accelerometer Data Sharing
    Lu, Mingming
    Guo, Yihan
    Meng, Dan
    Li, Cuncai
    Zhao, Yin
    DATA SCIENCE, PT 1, 2017, 727 : 425 - 432