skip to main content
10.1145/1667502.1667507acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article

A generalized context-based access control model for pervasive environments

Published:03 November 2009Publication History

ABSTRACT

Pervasive Computing Environments enable new opportunities for users to share and to access resources anytime and anywhere in a more natural way, making access control a critical issue. These heterogeneous and dynamic sensor-rich environments characterized by frequent and unpredictable changes on user's, resource's, and environment situations, call for access control solutions that allow dynamically adjust access permissions based on information describing the conditions of these entities (context), such as location and time. Some research attempts have been done based on existing models, which context information is used as an optional attribute for limiting the scope of access control permissions. However, these approaches normally exploit identities and roles dynamically assigned to the users in order to grant access permissions, which is an inappropriate solution for open and dynamic environments which we cannot assume the existence of predefined roles and user-role associations. In this scenario, we claim that access permissions should be assigned to the users only based on context information characterizing the three most important entities of any access control framework: owners, requestors, and resources. Thus, this paper proposes a generalized context-based access control model for making access control decisions completely based on context information.

References

  1. Trusted computer system evaluation criteria, dod 5200.28-std, department of defense, 1985.Google ScholarGoogle Scholar
  2. E. Bertino, P. A. Bonatti, and E. Ferrari. Trbac: a temporal role-based access control model. In ACM Workshop on Role-Based Access Control, pages 21--30, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. T. Buchholz, A. Küpper, and M. Schiffers. Quality of context: What it is and why we need it. In (HPOVUA 2003), Geneva, 2003, 2003.Google ScholarGoogle Scholar
  4. A. K. Dey. Understanding and using context. Personal and Ubiquitous Computing, 5(1):4--7, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. Filho, W. Viana, R. Braga, and R. Andrade. Framesec: A framework for the application development with end-to-end security provision in the mobile computing environment. In AICT-SAPIR-ELETE '05, pages 72--77, Washington, DC, USA, 2005. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. B. Filho and H. Martin. Qacbac: an owner-centric qoc-aware context-based access control model for pervasive environments. In SPRINGL '08: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, pages 30--38, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. B. Filho and H. Martin. A quality-aware context-based access control model for ubiquitous applications. In ICDIM, Third IEEE International Conference on Digital Information Management (ICDIM), November 13--16, 2008, London, UK, Proceedings, pages 113--118, 2008.Google ScholarGoogle Scholar
  8. J. B. Filho and H. Martin. Using context quality indicators for improving context-based access control in pervasive environments. Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on, 2:285--290, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Groba, S. Grob, and T. Springer. Context-dependent access control for contextual information. In ARES '07: Proceedings of the The Second International Conference on Availability, Reliability and Security, pages 155--161, Washington, DC, USA, 2007. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Y.-G. Kim, C.-J. Moon, D. Jeong, J.-O. Lee, C.-Y. Song, and D.-K. Baik. Context-aware access control mechanism for ubiquitous applications. In AWIC, volume 3528 of Lecture Notes in Computer Science, pages 236--242. Springer, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. J. Moyer and M. Ahamad. Generalized role-based access control. In ICDCS, pages 391--398, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S.-H. Park, Y.-J. Han, and T.-M. Chung. Context-role based access control for context-aware application. In High Performance Computing and Communications, Second International Conference, HPCC 2006, Munich, Germany, September 13--15, 2006, Proceedings, volume 4208 of Lecture Notes in Computer Science, pages 572--580. Springer, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. I. Ray and M. Toahchoodee. A spatio-temporal role-based access control model. In Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8--11, 2007, Proceedings, volume 4602 of Lecture Notes in Computer Science, pages 211--226. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38--47, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Toninelli, R. Montanari, L. Kagal, and O. Lassila. A semantic context-aware access control framework for secure collaborations in pervasive computing environments. In International Semantic Web Conference, pages 473--486, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. W. Viana, J. B. Filho, J. Gensel, M. Villanova-Oliver, and H. Martin. Photomap - automatic spatiotemporal annotation for mobile photos. In Web and Wireless Geographical Information Systems, 7th International Symposium, W2GIS 2007, Cardiff, UK, November 28--29, 2007. Proceedings, pages 187--201, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. W. Viana, J. B. Filho, J. Gensel, M. Villanova-Oliver, and H. Martin. A semantic approach and a web tool for contextual annotation of photos using camera phones. In WISE, pages 225--236, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. W. Viana, J. B. Filho, J. C. F. Junior, G. J. de Sena, E. L. F. Senne, J. Gensel, M. Villanova-Oliver, and H. Martin. Caus: Uma arquitetura para sistemas de ensino. In SBCUP, 2009.Google ScholarGoogle Scholar
  19. S. Yokoyama, E. Kamioka, and S. Yamada. An anonymous context aware access control architecture for ubiquitous services. In 7th International Conference on Mobile Data Management (MDM2006), Nara, Japan, May 9--13, 2006, page 74. IEEE Computer Society, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. G. Zhang and M. Parashar. Context-aware dynamic access control for pervasive computing, 2004.Google ScholarGoogle Scholar

Index Terms

  1. A generalized context-based access control model for pervasive environments

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SPRINGL '09: Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
            November 2009
            79 pages
            ISBN:9781605588537
            DOI:10.1145/1667502

            Copyright © 2009 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 3 November 2009

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader