CA-RBAC: Context Aware RBAC Scheme in Ubiquitous Computing Environments

نویسندگان

  • Junghwan Choi
  • Hyun-Su Jang
  • Young Ik Eom
چکیده

Role based access control (RBAC) assigns access permissions to a role rather than a user. This simplifies access control management by simply assigning appropriate roles to users and by modifying the permissions of the roles. With the advent of ubiquitous computing, many kinds of services, especially personalized services to give convenience to users, have been introduced. Among them, providing proper access permissions to users based on the current context has become an important issue because their status and access privilege should be dynamically changed. Previously, various access control methods utilizing context awareness have been proposed; however, their constraint description methods, used to assign a role to a user, are quite complex and not enough to express detailed context. Also, they do not fully cover the various situations that can be occurred in ubiquitous computing environments. In this paper, we propose an access control scheme, combining RBAC with context awareness, to give proper privilege to users based on their current context in ubiquitous computing environments. Our scheme defines the constraints for assigning a role and modifying the permissions of each role, enabling more detailed descriptions. We also provide various access control algorithms to support diverse situations which occur in ubiquitous computing environments.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

uT-RBAC: Ubiquitous Role-Based Access Control Model

In ubiquitous environment that users access resource anytime and anywhere, access control model should consider user’s location information. The proposed uT-RBAC includes the location information for user’s least privilege. It also supports time related information, which enables the access control model to accommodate various ubiquitous environments. The proposed uT-RBAC can be dynamically app...

متن کامل

A Design of Onto-ACM(Ontology based Access Control Model) in Cloud Computing Environments

There are a lot of security issues in cloud computing service environments such as virtualization, distributed big data processing, serviceability, traffic-handling, application security, access control, authentication, cryptography and etc. Especially, data access using various resources needs authentication and access control model for integrated management and control in cloud computing envi...

متن کامل

Modelling context-aware RBAC models for mobile business processes

In a mobile computing environment, distributed business processes are executed in varying contexts. Context-aware access control mechanisms help to protect sensitive data and services in mobile application scenarios. Context constraints are a means to consider context information in access control decisions. In this paper, we integrate context constraints with process-related role-based access ...

متن کامل

A Comparison of Collaborative Access Control Models

Collaborative environments need access control to data and resources to increase working cooperation efficiently yet effectively. Several approaches are proposed and multiple access control models are recommended in this domain. In this paper, four Role-Based Access Control (RBAC) based collaborative models are selected for analysis and comparison. The standard RBAC model, Team-based Access Con...

متن کامل

Data security in location-aware applications: an approach based on RBAC

Data security in a mobile context is a critical issue. Over the last few years a new category of location-based services, the Enterprise LBS (ELBS), has emerged focusing on the demands of mobility in organisations. These applications pose challenging requirements, including the need of selective access to ELBS based on the position of mobile users and spatially bounded organisational roles. To ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Inf. Sci. Eng.

دوره 26  شماره 

صفحات  -

تاریخ انتشار 2010