Spatiotemporal access control enforcement under uncertain location estimates

Heechang Shin, Vijayalakshmi Atluri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Abstract

In a mobile environment, user's physical location plays an important role in determining access to resources. However, because current moving object databases do not keep the exact location of the moving objects, but rather maintain their approximate location for reasons of minimizing the updates, the access request evaluation cannot always guarantee the intended access control policy requirements. This may be risky to the system's security, especially for the highly sensitive resources. In this paper, we introduce an authorization model that takes the uncertainty of location measures into consideration for specifying and evaluating access control policies. An access request is granted only if the confidence level of the location predicate exceeds the predefined uncertainty threshold level specified in the policy. However, this access request evaluation is computationally expensive as it requires to evaluate a location predicate condition and may also require evaluating the entire moving object database. For reducing the cost of evaluation, in this paper, we compute lower and upper bounds (R min and R max ) on the region that minimize the region to be evaluated thereby allowing unneeded moving objects to be discarded from evaluation. We show how R min and R max can be computed and maintained, and provide algorithms to process access requests.

Original languageEnglish (US)
Title of host publicationData and Applications Security XXIII - 23rd Annual IFIP WG 11.3 Working Conference, Proceedings
Pages159-174
Number of pages16
DOIs
StatePublished - 2009
Event23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security - Montreal, QC, Canada
Duration: Jul 12 2009Jul 15 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5645 LNCS

Other

Other23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Country/TerritoryCanada
CityMontreal, QC
Period7/12/097/15/09

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Spatiotemporal access control enforcement under uncertain location estimates'. Together they form a unique fingerprint.

Cite this