Abstract
The ubiquity of low-cost GPS-enabled mobile devices and the proliferation of online social networks have enabled the collection of rich geo-social information that includes the whereabouts of the users and their social connections. This information can be used to provide a rich set of access control policies that ensure that resources are utilized securely. Existing literature focuses on providing access control systems that control the access solely based on either the location of the users or their social connections. In this paper, we argue that a number of real-world applications demand an access control model that effectively captures both the geographic as well as the social dimensions of the users in a given location. We propose, Geo-social-RBAC, a new role based access control model that allows the inclusion of geo-social constraints as part of the access control policy. Our model, besides capturing the locations of a user requesting access and her social connections, includes geo-social cardinality constraints that dictate how many people related by a particular social relation need to be present in the required locations at the time of an access. The model also allows specification of geo-social and location trace constraints that may be used to dictate if an access needs to be granted or denied.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Opengis simple features specification for sql, tech. report ogc 99-049. Technical report, OpenGIS Consortium (1999)
Baracaldo, N., Joshi, J.: An adaptive risk management and access control framework to mitigate insider threats. Computers & Security 39, 237–254 (2013)
Bertino, E., Catania, B., Damiani, M.L., Perlasca, P.: Geo-rbac: a spatially aware rbac. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, pp. 29–37. ACM (2005)
Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: A semantic web based framework for social network access control. In: Proc. of the 14th SACMAT, pp. 177–186. ACM (2009)
Chandran, S.M., Joshi, J.B.D.: LoT-RBAC: A location and time-based RBAC model. In: Ngu, A.H.H., Kitsuregawa, M., Neuhold, E.J., Chung, J.-Y., Sheng, Q.Z. (eds.) WISE 2005. LNCS, vol. 3806, pp. 361–375. Springer, Heidelberg (2005)
Covington, M.J., Long, W., Srinivasan, S., Dev, A.K., Ahamad, M., Abowd, G.D.: Securing context-aware applications using environment roles. In: Proc. of the 6th SACMAT, pp. 10–20. ACM (2001)
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4, 224–274 (2001)
Fong, P.W.: Relationship-based access control: protection model and policy language. In: Proc. of the First ACM Conference on Data and Application Security and Privacy, pp. 191–202. ACM (2011)
Gupta, A., Kirkpatrick, M.S., Bertino, E.: A formal proximity model for rbac systems. Computers & Security (2013)
Kirkpatrick, M.S., Damiani, M.L., Bertino, E.: Prox-rbac: a proximity-based spatially aware rbac. In: Proc. of the 19th ACM SIGSPATIAL Int. Conf. on Advances in Geographic Information Systems (2011)
Ray, I., Kumar, M., Yu, L.: LRBAC: A location-aware role-based access control model. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol. 4332, pp. 147–161. Springer, Heidelberg (2006)
Osborn, Q.M.S., Sandhu, R.: Configuring role-based access control to enforce mandatory and discretionary access control policies. In: ACM Transaction on Information and System Security (2000)
Sandhu, R.: Role activation hierarchies. In: Proceedings of 3rd ACM Workshop on Role-Based Access Control (1998)
Tarameshloo, E., Fong, P.: Access control models for geo-social computing systems. In: SACMAT (2014)
Thomas, R.K.: Team-based access control (tmac): a primitive for applying role-based access controls in collaborative environments. In: Proc. of the 2nd ACM Workshop on Role-Based Access Control (1997)
Toahchoodee, M., Ray, I., McConnell, R.M.: Using graph theory to represent a spatio-temporal role-based access control model. Int. Journal of Next-Generation Computing (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Baracaldo, N., Palanisamy, B., Joshi, J. (2014). Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework. In: Au, M.H., Carminati, B., Kuo, CC.J. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science, vol 8792. Springer, Cham. https://doi.org/10.1007/978-3-319-11698-3_39
Download citation
DOI: https://doi.org/10.1007/978-3-319-11698-3_39
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11697-6
Online ISBN: 978-3-319-11698-3
eBook Packages: Computer ScienceComputer Science (R0)