Advertisement

PO-SAAC: A Purpose-Oriented Situation-Aware Access Control Framework for Software Services

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8484)

Abstract

Situation-aware applications need to capture relevant context information and user intention or purpose, to provide situation-specific access to software services. As such, a situation-aware access control approach coupled with purpose-oriented information is of critical importance. Existing approaches are highly domain-specific and they control access to services depending on the specific types of context information without considering the purpose. To achieve situation-aware access control, in this paper we consider purpose-oriented situations rather than conventional situations (e.g., user’s state). We take situation to mean the states of the entities and the states of the relationships between entities that are relevant to the purpose of a resource access request. We propose a generic framework, P urpose- O riented S ituation- A ware A ccess C ontrol, that supports access control to software services based on the relevant situations. We develop a software prototype to demonstrate the practical applicability of the framework. In addition, we demonstrate the effectiveness of our framework through a healthcare case study. Experimental results demonstrate the satisfactory performance of our framework.

Keywords

Situation-aware access control Context information Purpose Situation reasoning Access control policy 

References

  1. 1.
    Dey, A.K.: Understanding and using context. Personal Ubiquitous Computing 5(1), 4–7 (2001)CrossRefGoogle Scholar
  2. 2.
    Weiser, M.: Some computer science issues in ubiquitous computing. Commun. ACM 36(7), 75–84 (1993)CrossRefGoogle Scholar
  3. 3.
    Byun, J.-W., Li, N.: Purpose based access control for privacy protection in relational database systems. The VLDB Journal 17(4), 603–619 (2008)CrossRefGoogle Scholar
  4. 4.
    Dimitropoulos, L.L.: Privacy and security solutions for interoperable health information exchange: nationwide summary. AHRQ Publication (2007)Google Scholar
  5. 5.
    Endsley, M.R.: Design and evaluation for situation awareness enhancement. In: Proceedings of the Human Factors Society 32nd Annual Meeting, Santa Monica, CA, USA, pp. 97–101 (1988)Google Scholar
  6. 6.
    Wang, X.H., Zhang, D.Q., Gu, T., Pung, H.K.: Ontology based context modeling and reasoning using owl. In: Proceedings of the Second PerCom Workshops, pp. 18–22 (2004)Google Scholar
  7. 7.
    Kokar, M.M., Endsley, M.R.: Situation awareness and cognitive modeling. IEEE Intelligent Systems 27(3), 91–96 (2012)CrossRefGoogle Scholar
  8. 8.
    Yau, S.S., Huang, D.: Development of situation-aware applications in services and cloud computing environments. International Journal of Software and Informatics 7(1), 21–39 (2013)Google Scholar
  9. 9.
    Kim, Y.G., Lim, J.: Dynamic activation of role on rbac for ubiquitous applications. In: Proceedings of the 2007 International Conference on Convergence Information Technology, pp. 1148–1153 (2007)Google Scholar
  10. 10.
    Yau, S.S., Liu, J.: A situation-aware access control based privacy-preserving service matchmaking approach for service-oriented architecture. In: ICWS, pp. 1056–1063 (2007)Google Scholar
  11. 11.
    Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29, 38–47 (1996)CrossRefGoogle Scholar
  12. 12.
    Bettini, C., Brdiczka, O., Henricksen, K., Indulska, J., Nicklas, D., Ranganathan, A., Riboni, D.: A survey of context modelling and reasoning techniques. Pervasive and Mobile Computing 6, 161–180 (2010)CrossRefGoogle Scholar
  13. 13.
    Riboni, D., Bettini, C.: Owl 2 modeling and reasoning with complex human activities. Pervasive and Mobile Computing 7, 379–395 (2011)CrossRefGoogle Scholar
  14. 14.
    Kayes, A.S.M., Han, J., Colman, A.: An ontology-based approach to context-aware access control for software services. In: Lin, X., Manolopoulos, Y., Srivastava, D., Huang, G. (eds.) WISE 2013, Part I. LNCS, vol. 8180, pp. 410–420. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  15. 15.
    ASCO: Health professionals (Jul 2013), http://www.abs.gov.au/
  16. 16.
    Yau, S.S., Karim, F., Wang, Y., Wang, B., Gupta, S.K.S.: Reconfigurable context-sensitive middleware for pervasive computing. IEEE Pervasive Computing 1(3), 33–40 (2002)CrossRefGoogle Scholar
  17. 17.
    Sun, L., Wang, H., Soar, J., Rong, C.: Purpose based access control for privacy protection in e-healthcare services. JSW 7(11), 2443–2449 (2012)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Swinburne University of TechnologyAustralia

Personalised recommendations