Data Centered and Usage-Based Security Service

被引:0
|
作者
Yuan, Jingya [1 ]
Biennier, Frederique [1 ]
Benharkat, Nabila [1 ]
机构
[1] Univ Lyon, LIRIS, INSA Lyon, UMR 5205,CNRS, Lyon, France
来源
关键词
Privacy; Data-driven organization; Blockchain; GDPR; Usage governance; ONTOLOGY;
D O I
10.1007/978-3-030-76352-7_42
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Protecting Information Systems (IS) relies traditionally on security risk analysis methods. Designed for well-perimetrised environments, these methods rely on a systematic identification of threats and vulnerabilities to identify efficient control-centered protection countermeasures. Unfortunately, this does not fit security challenges carried out by the opened and agile organizations provided by the Social, Mobile, big data Analytics, Cloud and Internet of Things (SMACIT) environment. Due to their inherently collaborative and distributed organization, such multi-tenancy systems require the integration of contextual vulnerabilities, depending on the a priori unknown way of using, storing and exchanging data in opened cloud environment. Moreover, as data can be associated to multiple copies, different protection requirements can be set for each of these copies, which may lead the initial data owner lose control on the data protection. This involves (1) turning the traditional control-centered security vision to a dynamic data-centered protection and even (2) considering that the way a data is used can be a potential threat that may corrupt data protection efficiency. To fit these challenges, we propose a Data-centric Usage-based Protection service (DUP). This service is based on an information system meta-model, used to identify formally data assets and store the processes using copies of these assets. To define a usage-entered protection, we extend the Usage Based Access Control model, which is mostly focused on managing CRUD operations, to more complex operation fitting the SMACIT context. These usage rules are used to generate smart contracts, storing usage consents and managing usage control for cloud services.
引用
收藏
页码:457 / 471
页数:15
相关论文
共 50 条
  • [1] USER: A usage-based service recommendation approach
    Hu, Rong
    Liu, Jianxun
    Wen, Yiping
    Mao, Yiyu
    2016 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS), 2016, : 716 - 719
  • [2] Improving Security Testing with Usage-Based Fuzz Testing
    Schneider, Martin A.
    Herbold, Steffen
    Wendland, Marc-Florian
    Grabowski, Jens
    RISK ASSESSMENT AND RISK-DRIVEN TESTING, 2015, 9488 : 110 - 119
  • [3] Usage-based Ranking of Distributed XML Data
    Constantin, Camelia
    Amann, Bernd
    APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 1008 - 1012
  • [4] Corpus data in a usage-based cognitive grammar
    Mukherjee, J
    ADVANCES IN CORPUS LINGUISTICS, 2004, (49): : 85 - 100
  • [5] Toward a usage-based security framework for collaborative computing systems
    Zhang, Xinwen
    Nakae, Masayuki
    Covington, Michael J.
    Sandhu, Ravi
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (01)
  • [6] Usage-based Theory
    王帅
    海外英语, 2019, (07) : 245 - 246
  • [7] Usage-Based Pricing and Competition in Congestible Network Service Markets
    Ma, Richard T. B.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (05) : 3084 - 3097
  • [8] Investigating elicited data from a usage-based perspective
    Nordquist, Dawn
    CORPUS LINGUISTICS AND LINGUISTIC THEORY, 2009, 5 (01) : 105 - 130
  • [9] Dialect data, lexical frequency and the usage-based approach
    Clark, Lynn
    DIALECT LABORATORY: DIALECTS AS A TESTING GROUND FOR THEORIES OF LANGUAGE CHANGE, 2012, 128 : 53 - 72
  • [10] Data usage-based privacy and security issues in mobile app recommendation (MAR): a systematic literature review
    Beg, Saira
    Khan, Saif Ur Rehman
    Anjum, Adeel
    LIBRARY HI TECH, 2022, 40 (03) : 725 - 749