ABSTRACT
Ubiquitous computing aims to enhance computer use by utilizing many computer resources available through physical environments, but also making them invisible to users. The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. This ubiquitous computing poses new security challenges while the information can be accessed at anywhere and anytime because it may be applied by criminal users. The information may contain private information that cannot be shared by all user communities. Several approaches are designed to protect information for pervasive environments. However, ad-hoc mechanisms or protocols are typically added in the approaches by compromising disorganized policies or additional components to protect from unauthorized access.Usage control has been considered as the next generation access control model with distinguishing properties of decision continuity. In this paper, we present a usage control model to protect services and devices in ubiquitous computing environments, which allows the access restrictions directly on services and object documents. The model not only supports complex constraints for pervasive computing, such as services, devices and data types but also provides a mechanism to build rich reuse relationships between models and objects. Finally, comparisons with related works are analysed.
- M. Weiser, "Hot topics-ubiquitous computing," Computer, Vol. 26, no. 10, pp. 71--72, 1993. Google ScholarDigital Library
- W. Edwards, M. Newman and J. Sedivy, "Building the ubiquitous computing user experience," in CHI '01: CHI '01 extended abstracts on Human factors in computing systems. New York, NY, USA: ACM Press, 2001, pp. 501--502. Google ScholarDigital Library
- G. Zhang and M. Parashar, "Context-aware dynamic access control for pervasive applications," in CND'04: Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference. Society for Modeling and Simulation International, 2004, pp. 21--30.Google Scholar
- J. Seigneur and C. Jensen, "Trust enhanced ubiquitous payment without too much privacy loss," in SAC '04: Proceedings of the 2004 ACM symposium on Applied computing. New York, NY, USA: ACM Press, 2004, pp. 1593--1599. Google ScholarDigital Library
- G. Sampemane, P. Naldurg and R. Campbell, "Access control for active spaces," in ACSAC '02: Proceedings of the 18th Annual Computer Security Applications Conference. Washington, DC, USA: IEEE Computer Society, 2002, p. 343. Google ScholarDigital Library
- P. Viswanathan, B. Gill and R. Campbell, "Security architecture in gaia," Champaign, IL, USA, Tech. Rep., 2001. Google ScholarDigital Library
- J. JA1-Muhtadi, R. Campbell, A. Kapadia, M. Mickunas and S. Yi, "Routing through the mist: Privacy preserving communication in ubiquitous computing environments," in ICDCS '02: Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02). Washington, DC, USA: IEEE Computer Society, 2002, p. 74. Google ScholarDigital Library
- R. Sandhu, "Role activation hierarchies," in Third ACM Workshop on RoleBased Access Control. ACM Press, October 1998, pp. 33--40. Google ScholarDigital Library
- H. Wang, J. Li, R. Addie, S. Dekeyser and R. Watson, "A framework for role-based group delegation in distributed environment," in Proceedings of the 29th Australasian Computer Science Conference. Australian Computer Society, 2006. Google ScholarDigital Library
- J. Park and R. Sandhu, "Towards usage control models: beyond traditional access control," in Proceedings of the seventh ACM symposium on Access control models and technologies. ACM Press, 2002, pp. 57--64. Google ScholarDigital Library
- ISO, "Security frameworks for open systems: Access control framework, ISO/IEC 10181--3," 1996.Google Scholar
- H. Wedde and M. Lischka, "Role-based access control in ambient and remote space," in SACMAT '04: Proceedings of the ninth ACM symposium on Access control models and technologies. New York, NY, USA: ACM Press, 2004, pp. 21--30. Google ScholarDigital Library
- H. Wang, J. Cao and Y. Zhang, "Formal authorization allocation approaches for permission-role assignments using relational algebra operations," in Proceedings of the 14th Australian Database Conference ADC2003, Adelaide, Australia, 2003. Google ScholarDigital Library
- H. Wang, Y. Zhang, J. Cao and V. Varadharajan, "Achieving secure and flexible m-services through tickets," IEEE Transactions on Systems, Man, and Cybernetics, Part A, Special issue on M-Services, pp. 697--708, 2003. Google ScholarDigital Library
- H. Wang, J. Cao, Y. Zhang, "A flexible payment scheme and its role based access control," IIEEE Transactions on Knowledge and Data Engineering, Vol. 17, no. 3, pp. 425--436, 2005. Google ScholarDigital Library
- D. Goldschlag, M. Reed and P. Syverson, "Onion routing for anonymous and private Internet connections," Communications of the ACM, Vol. 24, no. 2, pp. 39--41, 1999. Google ScholarDigital Library
- S. Jajodia, P. Samarati, V. Subrahmanian and E. Bertino, "A unified framework for enforcing multiple access control policies," in Proceedings of the 1997 ACM SIGMOD international conference on Management of data. ACM Press, 1997, pp. 474--485. Google ScholarDigital Library
- E. Bertino, S. Castano, E. Ferrari and M. Mesiti, "Controlled access and dissemination of xml documents," in Proceedings of the second international workshop on Web information and data management. ACM Press, 1999, pp. 22--27. Google ScholarDigital Library
- E. Damiani, D. Sabrina, S. Paraboschi and P. Samarati, "Fine grained access control for soap e-services," in Proceedings of the tenth international conference on World Wide Web. ACM Press, 2001, pp. 504--513. Google ScholarDigital Library
- D. Sabrina, "An authorization model for temporal xml documents," in Proceedings of the 2002 ACM symposium on Applied computing. ACM Press, 2002, pp. 1088--1093. Google ScholarDigital Library
- Q. Li and V. Atluri, "Concept-level access control for the semantic web," in Proceedings of the 2003 ACM workshop on XML security. ACM Press, 2003, pp. 94--103. Google ScholarDigital Library
Index Terms
- Ubiquitous computing environments and its usage access control
Recommendations
Learning in Ubiquitous Computing Environments
The application of ubiquitous technologies in the improvement of education strategies is called Ubiquitous Learning. GlobalEdu is a model created to support ubiquitous learning. The model has the necessary support to implement learning-related ...
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. This ubiquitous computing poses new security challenges while the information ...
A flexible and scalable access control for ubiquitous computing environments
ISI'06: Proceedings of the 4th IEEE international conference on Intelligence and Security InformaticsThe ubiquity and invisibility characteristics of ubiquitous computing (ubicomp) arise many security problems, especially in the field of access control. Some important issues that are needed to be addressed in access control design are: (1) Ubicomp ...
Comments