Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

IFIP Annual Conference on Data and Applications Security and Privacy

DBSec 2007: Data and Applications Security XXI pp 61–76Cite as

  1. Home
  2. Data and Applications Security XXI
  3. Conference paper
Efficient Security Policy Enforcement in a Location Based Service Environment

Efficient Security Policy Enforcement in a Location Based Service Environment

  • Vijayalakshmi Atluri1 &
  • Heechang Shin1 
  • Conference paper
  • 1144 Accesses

  • 9 Citations

Part of the Lecture Notes in Computer Science book series (LNISA,volume 4602)

Abstract

Location based services, one of the promising markets of mobile commerce, aims at delivering point of need personalized information. Often, these services to be delivered are based on the prior knowledge of the profiles of mobile customers and security and privacy policies dictated by them. These policies may specify revealing the sensitive information of mobile customers (e.g., age, salary) selectively to specific merchants in return of receiving certain benefits (e.g., coupons, special discounts, etc.). As a result, the security policies in such an environment are characterized by spatial and temporal attributes of the mobile customers (location and time), as well as their profile attributes. The focus of this paper is to efficiently enforce such policies. In this regard, we propose a unified structure that is capable of indexing mobile customer (mobile object) locations and their profiles, and the authorizations stating their security and privacy policies.

Keywords

  • Mobile User
  • Index Structure
  • Security Policy
  • User Request
  • Mobile Object

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This work is supported in part by the National Science Foundation under grant IIS-0242415 and Rutgers Business School.

Chapter PDF

Download to read the full chapter text

References

  1. Youssef, M., Adam, N.R., Atluri, V.: Preserving Mobile Customer Privacy: An Access Control System for Moving Objects and Customer Information. In: 6th International Conference on Mobile Data Management. LNCS, Springer, Heidelberg (2005)

    Google Scholar 

  2. Wolfson, O., Xu, B., Chamberlain, S., Jiang, L.: Moving objects databases: Issues and solutions. In: Rafanelli, M., Jarke, M. (eds.) Proceedings of 10th International Conference on Scientic and Statistical Database Management, Capri, Italy, July 1-3, pp. 111–122. IEEE Computer Society Press, Los Alamitos (1998)

    Google Scholar 

  3. Moreira, J., Ribeiro, C., Abdessalem, T.: Query operations for moving objects database systems. In: Proceedings of the eighth ACM international symposium on Advances in geographic information systems, pp. 108–114. ACM Press, New York (2000)

    Google Scholar 

  4. Atluri, V., Guo, Q.: Unied index for mobile object data and authorizations. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 80–97. Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  5. Atluri, V., Shin, H.: Efficient enforcement of security polices based on the tracking of mobile users. In: DBSec, pp. 237–251 (2006)

    Google Scholar 

  6. Saltenis, S., Jensen, C.S., Leutenegger, S.T., Lopez, M.A.: Indexing the positions of continuously moving objects. In: SIGMOD Conference, pp. 331–342 (2000)

    Google Scholar 

  7. Atluri, V., Adam, N.R., Youssef, M.: Towards a unied index scheme for mobile data and customer proles in a location-based service environment. In: Workshop on Next Generation Geospatial Information (NG2I 2003) (2003)

    Google Scholar 

  8. Atluri, V., Chun, S.A.: An authorization model for geospatial data. IEEE Trans. Dependable Sec. Comput. 1(4), 238–254 (2004)

    CrossRef  Google Scholar 

  9. Gazetteer, U.S.: http://www.census.gov/cgi-bin/gazetteer

  10. Oracle corporation data sheet - oracle spatial option and oracle locator: Location features in oracle database 10g. Technical report, Oracle (2004), http://www.oracle.com/

  11. Atluri, V.: Mobile commerce. In: The Handbook of Computer Networks, Distributed Networks, Network Planning, Control, Management and Applications, Part 3: Computer Network Popular Applications, vol. III, John Wiley & Sons Inc, Chichester (2007) (page to appear)

    Google Scholar 

  12. Mobile Commerce (M-Commerce) & Micropayment Strategies. Technical report, Juniper Research (2004), http://www.juniperresearch.com/

  13. Venkatesh, V., Ramesh, V., Massey, A.P.: Understanding usability in mobile commerce. Commun. ACM 46(12), 53–56 (2003)

    CrossRef  Google Scholar 

  14. Dougherty, J., Kohavi, R., Sahami, M.: Supervised and unsupervised discretization of continuous features. In: International Conference on Machine Learning, pp. 194–202 (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. MSIS Department and CIMIC, Rutgers University, USA

    Vijayalakshmi Atluri & Heechang Shin

Authors
  1. Vijayalakshmi Atluri
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Heechang Shin
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Steve Barker Gail-Joon Ahn

Rights and permissions

Reprints and Permissions

Copyright information

© 2007 IFIP International Federation for Information Processing

About this paper

Cite this paper

Atluri, V., Shin, H. (2007). Efficient Security Policy Enforcement in a Location Based Service Environment. In: Barker, S., Ahn, GJ. (eds) Data and Applications Security XXI. DBSec 2007. Lecture Notes in Computer Science, vol 4602. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73538-0_5

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-540-73538-0_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73533-5

  • Online ISBN: 978-3-540-73538-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature