A geotemporal role-based authorisation system

Geospatial databases include any data with reference to geocoordinate information. The geospatial data can either be digital raster images that represent the data on the earth in the form of pixels or digital vector data that is primarily from satellites. Due to the fact that many of the high-resolution satellites are commercial in nature, uncontrolled dissemination of the high resolution imagery may cause severe threats to national security as well as personal privacy. The severity of the threats is even more significant when this information is combined with vector maps or other publicly available vector data. In this paper, we present a GeoSpatial Authorisation System (GSAS), which is based on a GeoSpatial Authorisation Model (GSAM), for specifying and enforcing access control policies that makes reference to the spatial regions and locational credentials. The specification of authorisations is based on the spatial and temporal attributes associated with the image data, resolution of the images, geospatial credentials associated with users and privilege modes including view, zoom-in, overlay, view-thumbnail, view-annotation, identify, animate and fly-by that are relevant for geospatial image data. We present the GSAS system and its functionalities.

[1]  Silvana Castano,et al.  Database Security , 1997, IFIP Advances in Information and Communication Technology.

[2]  Alfons H. Salden,et al.  Context sensitive access control , 2005, SACMAT '05.

[3]  James Ze Wang,et al.  Classifying Objectionable Websites Based on Image Content , 1998, IDMS.

[4]  Jim Gray,et al.  Microsoft TerraServer: a spatial data warehouse , 1999, SIGMOD '00.

[5]  Vijayalakshmi Atluri,et al.  An authorization model for temporal and derived data: securing information portals , 2002, TSEC.

[6]  Arnon Rosenthal,et al.  Security Administration for Federations, Warehouses, and other Derived Data , 1999, DBSec.

[7]  Ernesto Damiani,et al.  Design and implementation of an access control processor for XML documents , 2000, Comput. Networks.

[8]  Oscar Firschein,et al.  System for Classifying Objectionable Websites , 1998 .

[9]  Jun Zhang,et al.  A Novel Watermarking for Image Security , 2004, ISCIS.

[10]  Manish Parashar,et al.  Dynamic context-aware access control for grid applications , 2003, Proceedings. First Latin American Web Congress.

[11]  Cheng-Zhong Xu,et al.  A coordinated spatio-temporal access control model for mobile computing in coalition environments , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[12]  Elisa Bertino,et al.  A Content-Based Authorization Model for Digital Libraries , 2002, IEEE Trans. Knowl. Data Eng..

[13]  Vijayalakshmi Atluri,et al.  Protecting Privacy from Continuous High-resolution Satellite Surveillance , 2000, DBSec.

[14]  Jim Gray,et al.  TerraService.NET: An Introduction to Web Services , 2002, ArXiv.

[15]  Vijayalakshmi Atluri,et al.  An authorization model for geospatial data , 2004, IEEE Transactions on Dependable and Secure Computing.

[16]  A. Murat Tekalp,et al.  A hierarchical image authentication watermark with improved localization and security , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[17]  Vijayalakshmi Atluri,et al.  An Authorization Model for Workflows , 1996, ESORICS.

[18]  Michiharu Kudo,et al.  XML document security based on provisional authorization , 2000, CCS.

[19]  Pierangela Samarati,et al.  An Access Control System for SVG Documents , 2002 .

[20]  Elisa Bertino,et al.  An access control system for a Web map management service , 2004, 14th International Workshop Research Issues on Data Engineering: Web Services for e-Commerce and e-Government Applications, 2004. Proceedings..

[21]  Elisa Bertino,et al.  Specifying and enforcing access control policies for XML document sources , 2004, World Wide Web.

[22]  Elisa Bertino,et al.  An Authorization Model for a Distributed Hypertext System , 1996, IEEE Trans. Knowl. Data Eng..

[23]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[24]  Elisa Bertino,et al.  An access control model for video database systems , 2000, CIKM '00.

[25]  Elisa Bertino,et al.  GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.