Dynamic permission access control model based on privacy protection
نویسندگان
چکیده
Access control technology is one of the key technologies to ensure safe resource sharing. Identity authentication and authority distribution are two for access restrict unauthorized users from accessing resources, only authorised legal can resources. However, user privacy protection frequent permission changes thorny issues that need be solved urgently by technology. In this paper, a dynamic model based on proposed deal with these problems. Compared existing technologies, main advantages paper as follows: (1) Encrypt hide attributes entities, use attribute-based identity authentication, which not achieves purpose traditional but also ensures entities leaked; (2) Binding permissions entity attributes, dynamically assigning adjusting through in making more fine-grained flexible. Security proof performance analysis show protocol secure under hardness assumption discrete logarithm problem decision bilinear Diffie–Hellman problem. cited references, has low computational complexity, short time, communication overhead.
منابع مشابه
Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth
eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...
متن کاملConditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited purpose in the model. It allows users using some data for certain purpose with conditions. The structure of conditional purpose based access control model is defined and investigated through a practical paradigm with ac...
متن کاملPurpose based access control for privacy protection
Enforcement of the Sticky-policy requirement. Investigation of Fine-grained Access Control. <{G}, {T}> 94037 CA S. F. 9898 First Ave 1003 <{G}, > 46464 IL Chicago 433 State Road 1002 <{G}, {A, M}> 47907 IN W.Lafayette 232 Oval Drive 1001 addr_ip zip state city street c_id <{G}, {T}> [email protected] <{G}, > Jack <{G}, > 1003 <{G}, > [email protected] <{G}, > Paul <{G}, > 1002 <{P, S}, {M}> [email protected] ...
متن کاملPrivacy Protection Data Access Control
For some purposes, such as benefits, requirement-fitted services and management, enterprises regularly ask customers, employees, and business partner to provide relevance data including sensitive personal information. However, transparent information bring the infringement of privacy and threats of living security to the data providers. Recently, enterprises have suffered from the loss of poten...
متن کاملINSPIRED: Intention-based Privacy-preserving Permission Model
Mobile operating systems adopt permission systems to protect system integrity and user privacy. In this work, we propose INSPIRED, an intention-aware dynamic mediation system for mobile operating systems with privacy preserving capability. When a security or privacy sensitive behavior is triggered, INSPIRED automatically infers the underlying program intention by examining its runtime environme...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Telecommunication Systems
سال: 2022
ISSN: ['1572-9451', '1018-4864']
DOI: https://doi.org/10.1007/s11235-022-00937-8