Skip to main content

Chameleon: A Model of Identification, Authorization and Accountability for Ubicomp

  • Conference paper
Ubiquitous Intelligence and Computing (UIC 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6905))

Included in the following conference series:

Abstract

This paper introduces a model for invisible security. Our model provides an unobtrusive multi-factor authentication and context-aware authorization based on a probabilistic approach that takes into account social relationships and natural behaviors of the user, such as sharing objects or borrowing credentials as a form of access delegation. We believe the traditional model with sequential authentication, authorization and accounting modules is not suitable for smart spaces. Instead we propose a “probabilistic-spiral” model that can be as dynamic as the space itself.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Want, R., Hopper, A., Falcao, V., Gibbons, J.: The active badge location system. ACM Transactions on Information Systems 10, 102 (1992)

    Article  Google Scholar 

  2. Snyder Jr., G.F., Pardoe, T.: Network Security. Delmar Cengage Learning (2004)

    Google Scholar 

  3. Barkley, J., Beznosov, K., Uppal, J.: Supporting relationships in access control using role based access control. In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, pp. 55–65. ACM, New York (1999)

    Chapter  Google Scholar 

  4. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security 3, 85–106 (2000)

    Google Scholar 

  5. Pearl, J.: Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan Kaufmann, San Francisco (1988)

    MATH  Google Scholar 

  6. Cobb, B.R., Shenoy, P.P.: A comparison of Bayesian and belief function reasoning. Information Systems Frontiers 5, 345–358 (2003)

    Article  Google Scholar 

  7. Laskey, K.B.: MEBN: A language for first-order Bayesian knowledge bases. Artificial Intelligence 172, 140–178 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  8. Ginsberg, M.: Essentials of artificial intelligence. Morgan Kaufmann, San Francisco (1994)

    Google Scholar 

  9. Kaplan, S., Garrick, B.J.: On The Quantitative Definition of Risk. Risk Analysis 1, 11–27 (1981)

    Article  Google Scholar 

  10. Sabzevar, A.P., Sousa, J.P.: Authentication, authorization and auditing for ubiquitous computing: a survey and vision. International Journal of Space-Based and Situated Computing 1, 59–67 (2011)

    Article  Google Scholar 

  11. Bardram, J.E., Kjær, R.E., Pedersen, M.Ø.: Context-aware user authentication – supporting proximity-based login in pervasive computing. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 107–123. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Corner, M.D., Noble, B.D.: Zero-interaction authentication. In: Intl. Conf. on Mobile Computing and Networking, pp. 1–11. ACM, Atlanta (2002)

    Google Scholar 

  13. Matsumiya, K., Aoki, S., Murase, M., Tokuda, H.: Zero-stop authentication: Sensor-based real-time authentication system. In: Chen, J., Hong, S. (eds.) RTCSA 2003. LNCS, vol. 2968, pp. 296–311. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  14. Beigl, M.: Using spatial co-location for coordination in ubiquitous computing environments. In: Gellersen, H.-W. (ed.) HUC 1999. LNCS, vol. 1707, pp. 259–273. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  15. Sadeh, N.M., Gandon, F.L., Kwon, O.B.: Ambient Intelligence: The MyCampus Experience, TR CMU-ISRI-05-123. School of Computer Science, Carnegie Mellon U, Pittsburgh, PA (2005)

    Google Scholar 

  16. Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: Cerberus: a context-aware security scheme for smart spaces. In: IEEE Intl. Conf. on Pervasive Computing and Communications, pp. 489–496. IEEE CS, Los Alamitos (2003)

    Google Scholar 

  17. Song, Y.J., Tobagus, W., Leong, D.Y., Johanson, B.: iSecurity: A Security Framework for Interactive Workspaces, Technical Report. Stanford University (2003)

    Google Scholar 

  18. Kagal, L., Undercoffer, J., Perich, F., Joshi, A., Finin, T., Yesha, Y.: Vigil: Providing trust for enhanced security in pervasive systems. Technical Report, University of Maryland, Baltimore County (2002)

    Google Scholar 

  19. Roman, M., Campbell, R.H.: Gaia: Enabling active spaces. In: ACM SIGOPS European Workshop, pp. 229–234. ACM, Kolding (2000)

    Google Scholar 

  20. Satyanarayanan, M.: Pervasive computing: Vision and challenges. IEEE Personal Communications 8, 10–17 (2001)

    Article  Google Scholar 

  21. The Location Stack, http://portolano.cs.washington.edu/projects/location/

  22. Park, J., Sandhu, R.: The UCON ABC usage control model. ACM Trans. on Information and System Security 7, 128–174 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sabzevar, A.P., Sousa, J.P. (2011). Chameleon: A Model of Identification, Authorization and Accountability for Ubicomp. In: Hsu, CH., Yang, L.T., Ma, J., Zhu, C. (eds) Ubiquitous Intelligence and Computing. UIC 2011. Lecture Notes in Computer Science, vol 6905. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23641-9_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23641-9_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23640-2

  • Online ISBN: 978-3-642-23641-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics