A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems

Pho Duc Giang, Le Xuan Hung, Sungyoung Lee, Young K. Lee, Heejo Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

It is the ubiquity and mobility absolutely necessary for ubiquitous computing environments that raise new challenges for pervasive service provision invisibly. Particularly, mobility of users/devices causes unpredefined and unpredictable changes in physical location and in available resources and services, event at runtime and during the same service session, thus forcing us to consider very dynamic aspects of evaluation when designing an access control mechanism. Alternatively, there is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it essential to establish trust from scratch. This task becomes extremely challenging when it is simultaneously necessary to protect the privacy of the users involved. In this paper, we first show how trust evaluation process of the user's system can be based on previous accesses and peer recommendations. A solution then relied on trust to control access is proposed that depends upon pre-defined access control security policy. Several tuning parameters and options are suggested so that end-users can customize to meet the security and privacy requirement of a ubiquitous system.

Original languageEnglish
Title of host publicationProceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007
Pages698-703
Number of pages6
DOIs
Publication statusPublished - 2007 Dec 31
Event2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007 - Seoul, Korea, Republic of
Duration: 2007 Apr 262007 Apr 28

Other

Other2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007
CountryKorea, Republic of
CitySeoul
Period07/4/2607/4/28

Fingerprint

Access control
Ubiquitous computing
Tuning

ASJC Scopus subject areas

  • Software
  • Media Technology

Cite this

Giang, P. D., Hung, L. X., Lee, S., Lee, Y. K., & Lee, H. (2007). A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems. In Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007 (pp. 698-703). [4197354] https://doi.org/10.1109/MUE.2007.13

A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems. / Giang, Pho Duc; Hung, Le Xuan; Lee, Sungyoung; Lee, Young K.; Lee, Heejo.

Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. 2007. p. 698-703 4197354.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Giang, PD, Hung, LX, Lee, S, Lee, YK & Lee, H 2007, A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems. in Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007., 4197354, pp. 698-703, 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007, Seoul, Korea, Republic of, 07/4/26. https://doi.org/10.1109/MUE.2007.13
Giang PD, Hung LX, Lee S, Lee YK, Lee H. A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems. In Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. 2007. p. 698-703. 4197354 https://doi.org/10.1109/MUE.2007.13
Giang, Pho Duc ; Hung, Le Xuan ; Lee, Sungyoung ; Lee, Young K. ; Lee, Heejo. / A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems. Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. 2007. pp. 698-703
@inproceedings{284fc532cfd848a9b32ba20a991ac85b,
title = "A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems",
abstract = "It is the ubiquity and mobility absolutely necessary for ubiquitous computing environments that raise new challenges for pervasive service provision invisibly. Particularly, mobility of users/devices causes unpredefined and unpredictable changes in physical location and in available resources and services, event at runtime and during the same service session, thus forcing us to consider very dynamic aspects of evaluation when designing an access control mechanism. Alternatively, there is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it essential to establish trust from scratch. This task becomes extremely challenging when it is simultaneously necessary to protect the privacy of the users involved. In this paper, we first show how trust evaluation process of the user's system can be based on previous accesses and peer recommendations. A solution then relied on trust to control access is proposed that depends upon pre-defined access control security policy. Several tuning parameters and options are suggested so that end-users can customize to meet the security and privacy requirement of a ubiquitous system.",
author = "Giang, {Pho Duc} and Hung, {Le Xuan} and Sungyoung Lee and Lee, {Young K.} and Heejo Lee",
year = "2007",
month = "12",
day = "31",
doi = "10.1109/MUE.2007.13",
language = "English",
isbn = "0769527779",
pages = "698--703",
booktitle = "Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007",

}

TY - GEN

T1 - A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems

AU - Giang, Pho Duc

AU - Hung, Le Xuan

AU - Lee, Sungyoung

AU - Lee, Young K.

AU - Lee, Heejo

PY - 2007/12/31

Y1 - 2007/12/31

N2 - It is the ubiquity and mobility absolutely necessary for ubiquitous computing environments that raise new challenges for pervasive service provision invisibly. Particularly, mobility of users/devices causes unpredefined and unpredictable changes in physical location and in available resources and services, event at runtime and during the same service session, thus forcing us to consider very dynamic aspects of evaluation when designing an access control mechanism. Alternatively, there is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it essential to establish trust from scratch. This task becomes extremely challenging when it is simultaneously necessary to protect the privacy of the users involved. In this paper, we first show how trust evaluation process of the user's system can be based on previous accesses and peer recommendations. A solution then relied on trust to control access is proposed that depends upon pre-defined access control security policy. Several tuning parameters and options are suggested so that end-users can customize to meet the security and privacy requirement of a ubiquitous system.

AB - It is the ubiquity and mobility absolutely necessary for ubiquitous computing environments that raise new challenges for pervasive service provision invisibly. Particularly, mobility of users/devices causes unpredefined and unpredictable changes in physical location and in available resources and services, event at runtime and during the same service session, thus forcing us to consider very dynamic aspects of evaluation when designing an access control mechanism. Alternatively, there is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it essential to establish trust from scratch. This task becomes extremely challenging when it is simultaneously necessary to protect the privacy of the users involved. In this paper, we first show how trust evaluation process of the user's system can be based on previous accesses and peer recommendations. A solution then relied on trust to control access is proposed that depends upon pre-defined access control security policy. Several tuning parameters and options are suggested so that end-users can customize to meet the security and privacy requirement of a ubiquitous system.

UR - http://www.scopus.com/inward/record.url?scp=37349002329&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=37349002329&partnerID=8YFLogxK

U2 - 10.1109/MUE.2007.13

DO - 10.1109/MUE.2007.13

M3 - Conference contribution

AN - SCOPUS:37349002329

SN - 0769527779

SN - 9780769527772

SP - 698

EP - 703

BT - Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007

ER -