C-CBPM: collective context based privacy model

Existing research on developing privacy models, although seem persuasive, are essentially based on user, role or service identification. Such models are incapable of automatically adjusting privacy needs of consumers or organizations to the context in which the data is accessed. In this work we present a context based privacy model (CBPM) that leverages the context in which the information content is accessed. We introduce the concepts of donation and adoption for privacy configuration by extending CBPM to collective-CBPM (C-CBPM), bearing the analysis upon the notions of collective intelligence and trust computation. The efficacy of the proposed C-CBPM model is demonstrated by implementing it in various application domains such as, humanitarian assistance and disaster relief operations. CBPM is also implemented as a framework that assists in the comparison and extension of existing role or service based privacy and access control models.

[1]  Shih-Chien Chou,et al.  Dynamic adaptation to object state change in an information flow control model , 2004, Inf. Softw. Technol..

[2]  Agostino Cortesi,et al.  Information flow security in Boundary Ambients , 2008, Inf. Comput..

[3]  Len LaPadula,et al.  Secure Computer Systems: A Mathematical Model , 1996 .

[4]  Richa Jindal,et al.  Dual Layer Privacy Model for Hidden Databases , 2010 .

[5]  Michael J. Nash,et al.  The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[6]  Simon N. Foley Secure information flow using security groups , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.

[7]  John McLean,et al.  Security models and information flow , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[8]  Aneta Poniszewska-Maranda,et al.  Role engineering: From design to evolution of security schemes , 2008, J. Syst. Softw..

[9]  Patricia L. Mabry,et al.  Advances in Social Computing, Third International Conference on Social Computing, Behavioral Modeling, and Prediction, SBP 2010, Bethesda, MD, USA, March 30-31, 2010. Proceedings , 2010, SBP.

[10]  Md. Moniruzzaman,et al.  Delegation of access rights in a privacy preserving access control model , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.

[11]  Werner Kurschl,et al.  A survey on situation-aware ambient intelligence systems , 2011, J. Ambient Intell. Humaniz. Comput..

[12]  Shankara B. Subramanya,et al.  WisColl: Collective wisdom based blog clustering , 2010, Inf. Sci..

[13]  Euiho Suh,et al.  Context-aware systems: A literature review and classification , 2009, Expert Syst. Appl..

[14]  Nicoletta De Francesco,et al.  Instruction-level security analysis for information flow in stack-based assembly languages , 2007, Inf. Comput..

[15]  Ling Liu,et al.  Encyclopedia of Database Systems , 2009, Encyclopedia of Database Systems.

[16]  Srini Ramaswamy,et al.  CBPM: Context Based Privacy Model , 2010, 2010 IEEE Second International Conference on Social Computing.

[17]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[18]  Ran Wolff,et al.  k-TTP: a new privacy model for large-scale distributed environments , 2004, KDD.

[19]  Helen Nissenbaum,et al.  Privacy in Context , 2009 .

[20]  Stavros A. Koubias,et al.  A dynamic context-aware access control architecture for e-services , 2006, Comput. Secur..

[21]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[22]  Philip S. Yu,et al.  Identifying the influential bloggers in a community , 2008, WSDM '08.

[23]  Anne Adams,et al.  Privacy in Multimedia Communications: Protecting Users, Not Just Data , 2001, BCS HCI/IHM.

[24]  C. R. Baker,et al.  Information Technology and the Social Construction of Information Privacy , 2001 .

[25]  E. Michael Maximilien,et al.  Enabling Privacy as a Fundamental Construct for Social Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[26]  Huan Liu,et al.  Trust in Blogosphere , 2009, Encyclopedia of Database Systems.

[27]  Michael Mrissa,et al.  Privacy-Aware DaaS Services Composition , 2011, DEXA.

[28]  Leonard J. LaPadula,et al.  MITRE technical report 2547, volume II , 1996 .

[29]  Tom Gross Cooperative ambient intelligence: towards autonomous and adaptive cooperative ubiquitous environments , 2008, Int. J. Auton. Adapt. Commun. Syst..

[30]  Huan Liu,et al.  Social Computing, Behavioral Modeling, and Prediction , 2008 .