Access control and privacy in MANET emergency environment

Mobile ad hoc networks (MANETs) cultivate a new research trend in today's computing. With some unique features such as scalability, fault tolerant and autonomous system enable a network to be setup with or without any trusted authority. This makes MANET suitable for the emergency and rescue operations. During an emergency situation, there is a need for the data to be shared with the rescuers. However, there are some of the personal data cannot be shared to all rescuers. Thus, the privacy and security of data becomes a main concern here. This paper addresses these issues with a combination of access control mechanism and privacy policy to ensure that the privacy and security of personal data is protected accordingly.

[1]  Lili Sun,et al.  A purpose based usage access control model , 2010 .

[2]  Emil C. Lupu,et al.  An opportunistic authority evaluation scheme for data security in crisis management scenarios , 2010, ASIACCS '10.

[3]  Jamalul-lail Ab Manan,et al.  Group based access control scheme: proof of method for secure access control architecture in mobile ad-hoc networks , 2009, MoMM.

[4]  Joseph Migga Kizza Access Control and Authorization , 2015 .

[5]  Ning Zhang,et al.  A Purpose-Based Access Control Model , 2007 .

[6]  Zhibin Wang,et al.  Trust Representation and Reasoning for Access Control in Large Scale Distributed Systems , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.

[7]  Joan Feigenbaum,et al.  Privacy, integrity, and incentive-compatibility in computations with untrusted parties , 2004 .

[8]  Ninghui Li,et al.  Purpose based access control for privacy protection in relational database systems , 2008, The VLDB Journal.

[9]  Tommy Back P 2 P Information Sharing in Mobile Ad-hoc Networks , 2005 .

[10]  Celeste Campo,et al.  PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .

[11]  Naikuo Yang Formalism of privacy preserving access control , 2011 .

[12]  Thomas Plagemann,et al.  A Data Sharing Facility for Mobile Ad-Hoc Emergency and Rescue Applications , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).

[13]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[14]  Danfeng Yao An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing , 2008, Security and Management.

[15]  Dina Satybaldina,et al.  Short Paper: A Framework for the Privacy Access Control Model , 2013, Business Process Management Workshops.

[16]  Elisa Bertino,et al.  Privacy Protection , 2022 .

[17]  Qi Shi,et al.  Journal of Information Assurance and Security , 2009 .

[18]  Patrick C. K. Hung,et al.  Towards a Privacy Access Control Model for e-Healthcare Services , 2005, PST.

[19]  Ning Zhang,et al.  A Purpose-Based Access Control Model , 2007, Third International Symposium on Information Assurance and Security.

[20]  N.J. Davis,et al.  Toward a decentralized trust-based access control system for dynamic collaboration , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[21]  Heejo Lee,et al.  A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[22]  S. Swamynathan,et al.  Purpose Based Access Control for Privacy Protection in Object Relational Database Systems , 2010, 2010 International Conference on Data Storage and Data Engineering.

[23]  Vladimir A. Oleshchuk,et al.  Spatial role-based access control model for wireless networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[24]  Kazi M. Ahmed,et al.  Emergency Response Communications and Associated Security Challenges , 2010, ArXiv.

[25]  Lalana Kagal,et al.  Access Control is an Inadequate Framework for Privacy Protection , 2010 .

[26]  M. Fragkakis,et al.  Comparing the Trust and Security Models of Mobile Agents , 2007 .

[27]  Jamalul-lail Ab Manan,et al.  Group based access control scheme (GBAC): Keeping information sharing secure in mobile Ad- hoc environment , 2009, 2009 Fourth International Conference on Digital Information Management.

[28]  J. Rubenfeld The Right of Privacy , 1989 .