Multi-Determiner Protection of Private Data in Pervasive Computing Environments
نویسندگان
چکیده
* This research was partially supported by ITRC, # 500/8478 Summary Protection of private data is one of the most challenging issues threatening the success of Pervasive Computing (PC). Regarding the principles of privacy and the vision of pervasive computing, one of the most troublesome problems is how to provide people's control of their data while not distract them to a great extent. A suitable approach for protecting people's private data in PC environments should consider the intention of all influential entities (data determiners), and invisibly gain their consent by applying their desired preferences. In extension of the current approaches which consider a single set of preference rules for a private data item when deciding about its disclosure, we propose dealing with different preferences of all involved determiners in a distributed manner. In this paper we investigate possible determiners of private data and propose a set of required metadata as well as a multi-determiner protection procedure to protect private data with regard to the preferences of its determiners. Moreover, we propose the DELEGATION behavior as a determiner's response to a request instead of ACCEPT or REJECT. We demonstrate the efficiency of the suggested procedure and present a prototype implementation of a multideterminer architecture to realize the protection procedure.
منابع مشابه
A context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملImproving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner
Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...
متن کاملImproving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner
Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...
متن کاملData Security and Privacy Protection in Pervasive Computing Environments
The integration of advanced wireless technology and Internet tends to increase connections of computing devices. Because Pervasive Computing environments make people get accustomed to computing, they naturally forget the fact that they are using computers. Furthermore, smart devices around offer them services such as user location information, user situation, and user data maintenance/managemen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007