Browse > Article

Abstraction Based Context Data Access Control Framework  

Kim, Yun-Sam (Dept. of Computer Science and Engineering, Chungnam National University)
Cho, Eun-Sun (Dept. of Computer Science and Engineering, Chungnam National University)
Cho, We-Duke (Center of excellence for Ubiquitous System, Ajou University)
Publication Information
Abstract
As Ubiquitous systems are developed, the number of context data which are dealt with systems also grow rapidly. In these data, some are vary important in privacy view. As these data are given to users or services of systems, probability of excess exposing of data is exist. To solve this problem, many systems use access control method like RBAC. But even this method can avoid unauthenticated access, can not prevent excess exposing of authenticated access. To prevent this exposing of context data, this paper suggests context data access control framework which abstracts context data when system gives these data to users or services. Using negotiation protocol and context data abstraction technique using RDF, our framework prevents excess exposing important data. This happens protecting privacy and keeping service continuity.
Keywords
상황정보;추상화;접근제어;협상;정보보호;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Y.S. Kim, E.S. Cho and W.D. Cho, "Context Data Abstraction Framework using RDF", in Proc. of the 4th International Conference on Ubiquitous Information Management and Communication (ICUMIC 2010), January, 2010.
2 P3P: The Platform for Privacy Preferences. http://www.w3.org/P3P/
3 서경원, "웹기반을 이용한 비만 학생의 운동프로그램 가발에 관한 연구", 충북대학교 석사논문, 2005년 2월
4 M. Ctacey and C. McGregor, "Temporal abstraction in intelligent clinical data analysis: A survey", Artifical intelligence in Medicine, 39, pp. 1-24, 2007.   DOI   ScienceOn
5 E.S. Cho, Y.S. Kim, M.P. Hong and W.D. Cho, "Fine-Grained View-based Access Control for RDF Cloaking", in Proc. of IEEE Ninth International Conference on Computer and Information Technology, 2009/
6 김현우, 변성호, 박희정, 이승환, 정유석, 조위덕, "유비쿼터스 지능공간에서 멀티모달센서를 이용한 향상된 u-헬스케어 서비스 구현에 대한 연구", 전자공학회논문지, 제46권 CI편, 제 2호, 2009년 3월.   과학기술학회마을
7 Extensible Markup Language (XML), http://www.w3.org/XML/
8 Resource Description Framework (RDF), http://www.w3.org/RDF/
9 A. Machanavajjhala, J. Gehrke, D. Kifer and M. Venkitasubramaniam, "l-diversity: Privacy beyond k-anonymity", in Proc. of 22nd International Conference of Data Engineering, page. 24, 2006
10 Latanya Sweeney, "Achieving k-Anonymity Privacy Protection using Generalization and Suppression", International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), pp. 557-570, 2002.   DOI   ScienceOn
11 R. S. Sandhu, D.F. Ferraiolo and D.R. Kyhn, "The Nist Model for Role Based Access Control: Toward a Unified Standard", in Proc. of 5th ACM Workshop on Role Based Access Control, pp. 47-63, 2000.
12 N. Li, T. Ki and S. Venkitasubramaniam, "t-closeness: Privacy Beyound k-Anonymity and l-Diversity", in Proc. of IEEE International Conference on Data Engineering, 2007.
13 R. Wishart, K. Henricksen, and J. Indulska, " Context Obfuscation for Privacy via Ontological Descriptions", in Proc. of the International Workshop on Location and Context-Awareness 2005, pp. 276-288, 2006.
14 I.T. Emin, "Context Data Model for Privacy", Prime Standardization Workshop, 2006.
15 P. Samarati, "Protecting Respondent's Identities in Microdata Release", IEEE Transactions on Knowledge and Data Engineering, vol. 13, pp. 1010-1027, 2001.   DOI   ScienceOn
16 R. S. Sandu, E. J. Coyne, H.L. Feinstein, and C. E. Youman, "Role-based access control models", IEEE computer, 29(2): pp. 38-47, 1996.   DOI   ScienceOn
17 Roshan K. Thomas, "Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments". in Proc. of the second ACM workshop on Role-based access control, pp. 13-19, 1997.
18 조은선, 민영목, "상황인식 시스템 모델링을 위한 정형화 프레임워크", 전자공학회논문지, 제 46권 CI편, 제2호, 2009년 3월.   과학기술학회마을
19 Fahad T. Alotaiby and J. X. Chen, "A Model for Team-based Access Control (TAMC 2004)", in Proc. of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004.