XACML Policy Evaluation With Dynamic Context Handling ( Extended Abstract )

نویسندگان

  • Nariman Ammar
  • Zaki Malik
  • Abdelmounaam Rezgui
  • Elisa Bertino
چکیده

In collaborative service-based health data sharing environments, participating services may host different sets of data about the same individuals, identified by some common properties. Each organization in such environments (e.g., testing labs, research institutes, etc.) manages it’s data access and usage through a specialized Web service end point through which users can submit queries. For instance, the Bio2RDF project incorporates data from several ontologies (e.g., NCBIGene,PharmKGB, DrugBank, CDT, and GeneCDS) using RDF (as a universal healthcare exchange language). Each repository defines an ontology (in OWL format) of all the concepts that can be searched for in a user’s query. OWL defines classes as a generic concept of individuals (e.g., Patient) and data type properties to link individuals of those classes to their data values (e.g., hasDisease). PharmGKB repository, for example, can be identified by the set of data type properties (drug, disease, gene, etc.) defined on the set of classes (Dosage, Drug, DrugGeneAssociations, etc.). To query instances in those repositories, a user submit different queries through SPARQL endpoints dedicated for each service. In each query, he can can ask for different data type properties by which those instances are identified. Several privacy issues may arise in such environments. First, transforming such data sets into semantic data makes data linkage easier and machine processable. Second, dynamic composition of different data items (retrieved through participating Web services) may be misused by adversaries to reveal sensitive information, which was not deemed as such by the data owner at the time of data collection. For instance, a Clinical service may store the data items (Age, Gender,..., patientStatus), a Genomic service may store (Age, Gender, ...,Gene, SNP) ), and a Demographic service may store (Age, Gender, ..., Employer, Address). Atomically, these data items may not reveal personally identifiable information, but linking those items may lead to unintended breach of privacy. Thus, the patient’s consent that is statically defined in a privacy policy may not be enough for data disclosure. These issues call for a privacy management solution that is, dynamic, contextsensitive, and semantic-based. Several researchers have provided enhancements to the performance of XACML PEP, such as efficiency, scalability, and adaptation [1], [2], [3], [4], [5], but few works provided enhancements to the PEP accuracy by enhancing the context handler. This work focus on enhancing the XACML PEP component accuracy by adding dynamic context handling. Few researchers have looked into dynamic policy evaluation as opposed to static policies [6]. Others have proposed context-aware privacy management systems [7], [8], [9], [10]. Our work is different from previous approaches for dynamic privacy management in that it does not dynamically update the original policy definitions, but implicitly incorporate context into rule evaluation. They also regulate rather than prevent the data access.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MobiDyC: Private Mobile-based Health Data Sharing through Dynamic Context Handling

With the adoption of mobile healthcare applications and the success of cloud service models, we propose a privacy management framework for mobile health care applications with support for dynamic privacy management of health data sharing. Our solution extends the XACML policy language by incorporating user access context into the privacy policy rule enforcement. We provide an implementation of ...

متن کامل

Can Access Control be Extended to Deal with Data Handling in Privacy Scenarios?

In this position paper, we claim that access control policy languages can be extended to address data handling. Indeed, matching users’ privacy preferences and services’ privacy policies as well as enforcing what services can do with collected data rely on authorization queries and obligations, which exist in some access control languages. We present results from extending SecPAL to address dat...

متن کامل

Extending XACML Authorisation Model to Support Policy Obligations Handling in Distributed Applications

The paper summarises the recent and on-going developments and discussions in the Grid security community to built interoperable and scalable AuthZ infrastructure for distributed applications. The paper provides a short overview of the XACML policy format and policy obligations definition in the XACML specification. The paper analyses the basic use cases for obligations in computer Grids and on-...

متن کامل

Designing Fast and Scalable Policy Evaluation Engines

Most prior research on policies has focused on correctness. While correctness is an important issue, the adoption of policybased computing may be limited if the resulting systems are not implemented efficiently and thus perform poorly. To increase the effectiveness and adoption of policy-based computing, in this paper, we propose fast policy evaluation algorithms that can be adapted to support ...

متن کامل

Resolving Policy Conflicts - Integrating Policies from Multiple Authors

In this paper we show that the static conflict resolution strategy of XACML is not always sufficient to satisfy the policy needs of an organisation where multiple parties provide their own individual policies. Different conflict resolution strategies are often required for different situations. Thus combining one or more sets of policies into a single XACML ‘super policy’ that is evaluated by a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015