Skip to main content

Context-Aware Access Control Model for Services Provided from Cloud Computing

  • Chapter
  • First Online:
Book cover Intelligent Distributed Computing XI (IDC 2017)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 737))

Included in the following conference series:

Abstract

Since computing devices in IoT tend to have only limited computational resources, to provide enrich context-aware services, e.g., location-aware user assistant services, from IoT environments, such services should be offloaded to be executed on server-sides, including cloud computing platforms. However, there are differences between access control models in context-aware services and cloud computing platforms, where the former needs context-aware access models and the latter widely uses role/subject-based access control models. This paper aims to bridging the models. We present a model for spatially specifying containment relationships of persons, physical entities, spaces, and computers to specify contextual information about the real world. Our approach connects between the world model and services offloaded to cloud computing as an access control mechanism. This paper presents the basic notion of the model and its prototype implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Beigl, M., Zimmer, T., Decker, C.: A location model for communicating and processing of context. Pers. Ubiquit. Comput. (Springer) 6(5–6), 341–357 (2002)

    Google Scholar 

  2. Brumitt, B.L., Meyers, B., Krumm, J., Kern, A., Shafer, S.: Easy living: technologies for intelligent environments. In: International Symposium on Handheld and Ubiquitous Computing, pp. 12–27. Springer (2000)

    Google Scholar 

  3. Covington, M.J., Long, W., Srinivasan, S., Dev, A.K., Ahamad, M., Abowd, G.D.: Securing context-aware applications using environment roles. In: Proceedings of 6th ACM Symposium on Access Control Models and Technologies (SACMAT’2001), pp. 10–20 (2001)

    Google Scholar 

  4. Ferraiolo, D.F., Barkley, J.F., Kuhn, D.: A role based access control model and reference implementation within a corporate intranet. ACM Trans. Inf. Syst. Secur. 2(1), 34–64 (1999)

    Article  Google Scholar 

  5. Georgiadis, C.K., Mavridis, I., Pangalos, G., Thomas, R.K.: Flexible team-based access control using contexts. In: 6th ACM Symposium on Access Control Models and Technologies (SACMAT’01), pp. 21–27 (2001)

    Google Scholar 

  6. Giuri, L., Iglio, P.: Role templates for content-based access control. In: 2nd ACM Workshop on Role Based Access Control (RBAC’97), pp. 153–159 (1997)

    Google Scholar 

  7. Hulsebosch, R.J., Salden, A.H., Bargh, M.S., Ebben, P.W.G., Reitsma. J.: Context sensitive access control. In: 10th ACM Symposium on Access Control Models and Technologies (SACMAT ’05), pp. 111–119 (2005)

    Google Scholar 

  8. Leonhardt, U., Magee, J.: Towards a general location service for mobile environments. In: IEEE Workshop on Services in Distributed and Networked Environments, pp. 43–50, IEEE Computer Society (1996)

    Google Scholar 

  9. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29 (1996)

    Google Scholar 

  10. Satoh, I.: A location model for pervasive computing environments. In: Proceedings of IEEE 3rd International Conference on Pervasive Computing and Communications (PerCom’05), pp, 215–224. IEEE Computer Society (2005)

    Google Scholar 

  11. Satoh, I.: Mobile agents. In: Handbook of Ambient Intelligence and Smart Environments, pp. 771–791. Springer (2010)

    Google Scholar 

  12. Tandler, P.: The BEACH application model and software framework for synchronous collaboration in ubiquitous computing environments. J. Syst. Softw. 69(3), 267–296 (2004)

    Article  Google Scholar 

  13. Thomas, R.K.: Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In: 3nd ACM workshop on Role-based Access Control, pp. 13–19 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ichiro Satoh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Satoh, I. (2018). Context-Aware Access Control Model for Services Provided from Cloud Computing. In: Ivanović, M., Bădică, C., Dix, J., Jovanović, Z., Malgeri, M., Savić, M. (eds) Intelligent Distributed Computing XI. IDC 2017. Studies in Computational Intelligence, vol 737. Springer, Cham. https://doi.org/10.1007/978-3-319-66379-1_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-66379-1_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-66378-4

  • Online ISBN: 978-3-319-66379-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics