TY - GEN
T1 - A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems
AU - Giang, Pho Duc
AU - Hung, Le Xuan
AU - Lee, Sungyoung
AU - Lee, Young Koo
AU - Lee, Heejo
N1 - Copyright:
Copyright 2008 Elsevier B.V., All rights reserved.
PY - 2007
Y1 - 2007
N2 - It is the ubiquity and mobility absolutely necessary for ubiquitous computing environments that raise new challenges for pervasive service provision invisibly. Particularly, mobility of users/devices causes unpredefined and unpredictable changes in physical location and in available resources and services, event at runtime and during the same service session, thus forcing us to consider very dynamic aspects of evaluation when designing an access control mechanism. Alternatively, there is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it essential to establish trust from scratch. This task becomes extremely challenging when it is simultaneously necessary to protect the privacy of the users involved. In this paper, we first show how trust evaluation process of the user's system can be based on previous accesses and peer recommendations. A solution then relied on trust to control access is proposed that depends upon pre-defined access control security policy. Several tuning parameters and options are suggested so that end-users can customize to meet the security and privacy requirement of a ubiquitous system.
AB - It is the ubiquity and mobility absolutely necessary for ubiquitous computing environments that raise new challenges for pervasive service provision invisibly. Particularly, mobility of users/devices causes unpredefined and unpredictable changes in physical location and in available resources and services, event at runtime and during the same service session, thus forcing us to consider very dynamic aspects of evaluation when designing an access control mechanism. Alternatively, there is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it essential to establish trust from scratch. This task becomes extremely challenging when it is simultaneously necessary to protect the privacy of the users involved. In this paper, we first show how trust evaluation process of the user's system can be based on previous accesses and peer recommendations. A solution then relied on trust to control access is proposed that depends upon pre-defined access control security policy. Several tuning parameters and options are suggested so that end-users can customize to meet the security and privacy requirement of a ubiquitous system.
UR - http://www.scopus.com/inward/record.url?scp=37349002329&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=37349002329&partnerID=8YFLogxK
U2 - 10.1109/MUE.2007.13
DO - 10.1109/MUE.2007.13
M3 - Conference contribution
AN - SCOPUS:37349002329
SN - 0769527779
SN - 9780769527772
T3 - Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007
SP - 698
EP - 703
BT - Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007
T2 - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007
Y2 - 26 April 2007 through 28 April 2007
ER -