Reference Hub11
Risk-Based Privacy-Aware Information Disclosure

Risk-Based Privacy-Aware Information Disclosure

Alessandro Armando, Michele Bezzi, Nadia Metoui, Antonino Sabetta
Copyright: © 2015 |Volume: 6 |Issue: 2 |Pages: 20
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781466678668|DOI: 10.4018/IJSSE.2015040104
Cite Article Cite Article

MLA

Armando, Alessandro, et al. "Risk-Based Privacy-Aware Information Disclosure." IJSSE vol.6, no.2 2015: pp.70-89. http://doi.org/10.4018/IJSSE.2015040104

APA

Armando, A., Bezzi, M., Metoui, N., & Sabetta, A. (2015). Risk-Based Privacy-Aware Information Disclosure. International Journal of Secure Software Engineering (IJSSE), 6(2), 70-89. http://doi.org/10.4018/IJSSE.2015040104

Chicago

Armando, Alessandro, et al. "Risk-Based Privacy-Aware Information Disclosure," International Journal of Secure Software Engineering (IJSSE) 6, no.2: 70-89. http://doi.org/10.4018/IJSSE.2015040104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Risk-aware access control systems grant or deny access to resources based on the notion of risk. It has many advantages compared to classical approaches, allowing for more flexibility, and ultimately supporting for a better exploitation of data. The authors propose and demonstrate a risk-aware access control framework for information disclosure, which supports run-time risk assessment. In their framework access-control decisions are based on the disclosure-risk associated with a data access request and, differently from existing models, adaptive anonymization operations are used as risk-mitigation method. The inclusion of on-the-fly anonymization allows for extending access to data, still preserving privacy below the maximum tolerable risk. Risk thresholds can be adapted to the trustworthiness of the requester role, so a single access control framework can support multiple data access use cases, ranging from sharing data among a restricted (highly trusted) group to public release (low trust value). The authors have developed a prototype implementation of their framework and have assessed it by running a number of queries against the Adult Data Set from the UCI Machine Learning Repository, a publicly available dataset that is widely used by the research community. The experimental results are encouraging and confirm the feasibility of the proposed approach.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.