QACBAC: an owner-centric QoC-aware context-based access control model for pervasive environments

In Pervasive Computing Environments (PCE), context information can have a strong impact on application adaptation; not only at application logic level but also security management level. Therefore, from an access control point of view, it is required that the access control models take into account context information such as location and time, in determining whether access should be allowed or not. As context information represents real-world situations, it is associated with certain quality indicators that can influence directly the access control decisions. In this paper, we propose an owner-centric QoC-Aware Context-Based Access Control model (QACBAC) that takes into account both context information and its QoC indicators to grant and to adapt access permissions to resources. We also introduce components and equations to measure the revelant QoC indicators to the access control services/users, that will be used in the QACBAC model. Moreover, a case study is presents showing the definition of access rules using the proposed access control model.

[1]  Paddy Nixon,et al.  Categorisation and modelling of quality in context information , 2005, IJCAI 2005.

[2]  Anind K. Dey,et al.  Understanding and Using Context , 2001, Personal and Ubiquitous Computing.

[3]  Jérôme Gensel,et al.  A Semantic Approach and a Web Tool for Contextual Annotation of Photos Using Camera Phones , 2007, WISE.

[4]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[5]  Bill N. Schilit,et al.  Context-aware computing applications , 1994, Workshop on Mobile Computing Systems and Applications.

[6]  Tai-Myung Chung,et al.  Context-Role Based Access Control for Context-Aware Application , 2006, HPCC.

[7]  Claudia Linnhoff-Popien,et al.  A Context Modeling Survey , 2004 .

[8]  Yolande Berbers,et al.  Quality Extensions and Uncertainty Handling for Context Ontologies , 2006, C&O@ECAI.

[9]  Thomas Springer,et al.  Context-Dependent Access Control for Contextual Information , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[10]  Rossana M. de Castro Andrade,et al.  FRAMESEC: a framework for the application development with end-to-end security provision in the mobile computing environment , 2005, Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop (AICT/SAPIR/ELETE'05).

[11]  John M. Boone,et al.  INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .

[12]  Manachai Toahchoodee,et al.  A Spatio-temporal Role-Based Access Control Model , 2007, DBSec.

[13]  Guanling Chen,et al.  A Survey of Context-Aware Mobile Computing Research , 2000 .

[14]  Shigetoshi YOKOYAMA,et al.  An Anonymous Context Aware Access Control Architecture For Ubiquitous Services , 2006, 7th International Conference on Mobile Data Management (MDM'06).

[15]  Elisa Bertino,et al.  TRBAC , 2001, ACM Trans. Inf. Syst. Secur..

[16]  Axel Küpper,et al.  Quality of Context: What It Is And Why We Need It , 2004 .

[17]  Zhaohui Wu,et al.  A Context Quality Model for Ubiquitous Applications , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[18]  Younghee Kim,et al.  A Quality Measurement Method of Context Information in Ubiquitous Environments , 2006, 2006 International Conference on Hybrid Information Technology.

[19]  James B. D. Joshi,et al.  LoT-RBAC: A Location and Time-Based RBAC Model , 2005, WISE.

[20]  Marten van Sinderen,et al.  Middleware Support for Quality of Context in Pervasive Context-Aware Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[21]  Jérôme Gensel,et al.  PhotoMap - Automatic Spatiotemporal Annotation for Mobile Photos , 2007, W2GIS.

[22]  Mustaque Ahamad,et al.  Generalized role-based access control , 2001, Proceedings 21st International Conference on Distributed Computing Systems.

[23]  Andrés Marín López,et al.  TrustAC: Trust-Based Access Control for Pervasive Devices , 2005, SPC.

[24]  Jeong-Oog Lee,et al.  Context-Aware Access Control Mechanism for Ubiquitous Applications , 2005, AWIC.