Access control for local personal smart spaces

As computer systems grow more compact, powerful and cheap to produce, they become more pervasive in society. Smart devices enable users to compute and share resources on the go. Services such as Wi-Fi Direct allow for the creation of device-to-device networks, of a peer-to-peer nature, deemed “smart spaces”. Smart spaces are capable of providing an access-point-less means to share information and resources between their peers. Recent research points to the personalisation of smart spaces, making their management more challenging. Personalised smart spaces, advanced as they may be, introduce new security challenges such as secure resource sharing. This paper consequently evaluates a family-related scenario then a LPSS access control framework is proposed, with a focus on the specific nature of LPSS environments namely, local and global sets of rules defined in local and global policies. Finally, access control rules are presented, with respect to the motivating scenario, to illustrate the operation of access control enforcement using local and global policy rules.

[1]  Ying Zheng,et al.  Study on the access control model , 2011, Proceedings of 2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference.

[2]  Jan H. P. Eloff,et al.  Web services access control architecture incorporating trust , 2007, Internet Res..

[3]  Alexander V. Smirnov,et al.  Context-based access control model for smart space , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[4]  Elizabeth Papadopoulou,et al.  A Personal Smart Space approach to realising Ambient Ecologies , 2012, Pervasive Mob. Comput..

[5]  Patrick Brézillon,et al.  Context-based security policies: a new modeling approach , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[6]  Erik Vullings,et al.  A Trust-based Access Control Model for Virtual Organizations , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops.

[7]  Dan Wang,et al.  ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[8]  Neeli R. Prasad,et al.  A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.

[9]  Bernhard Walke,et al.  IEEE 802.11 Wireless Local Area Networks , 2006 .

[10]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[11]  M. Weiser The Computer for the Twenty-First Century , 1991 .

[12]  Xiaojiang Du,et al.  An effective access control scheme for preventing permission leak in Android , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).

[13]  Mark Weiser The computer for the 21st century , 1991 .

[14]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[15]  Stefan Poslad,et al.  Ubiquitous Computing: Smart Devices, Environments and Interactions , 2009 .

[16]  Claudia Roncancio,et al.  Context aware mobile transactions , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.

[17]  Suhaimi Ibrahim,et al.  A Security Conscious Service Discovery Framework in Pervasive Computing Environments , 2009, 2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies.

[18]  J.A. Gutierrez,et al.  IEEE 802.15.4: a developing standard for low-power low-cost wireless personal area networks , 2001, IEEE Network.