A Framework for Composition and Enforcement of Privacy-Aware and Context-Driven Authorization Mechanism for Multimedia Big Data

被引:31
作者
Samuel, Arjmand [1 ]
Sarfraz, Muhammad I. [2 ]
Haseeb, Hammad [2 ]
Basalamah, Saleh [3 ]
Ghafoor, Arif [2 ]
机构
[1] Microsoft Res, Redmond, WA 98052 USA
[2] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47906 USA
[3] Umm Al Qura Univ, KACST GIS Technol Innovat Ctr, Mecca 24381, Saudi Arabia
基金
美国国家科学基金会;
关键词
Access control; context; data privacy; formal verification; multimedia databases; SPATIOTEMPORAL VEHICLE TRACKING; MODEL; MANAGEMENT; SECURITY;
D O I
10.1109/TMM.2015.2458299
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of multimedia big data for dissemination and sharing of massive amounts of information raises important security and privacy concerns. One such concern is the composition and enforcement of privacy policies in order to securely manage access of multimedia big data. Several researchers have pointed out that for proper enforcement of privacy policies, the privacy requirements should be captured in access control systems. In this paper, we propose a hybrid approach where privacy requirements are captured in an access control system and present a framework for composition and enforcement of privacy policies. The focus is to allow a user, not a system or security administrator to compose conflict free policies for their online multimedia data. An additional requirement is that such a policy be context-aware. We also present a methodology for verifying the privacy policy in order to ensure correctness and logical consistency. The verification process is also used to ensure that sensitive security requirements are not violated when privacy rules are enforced. A prototype, named Intelligent Privacy Manager (iPM), has been implemented for sharing of multimedia big data in a secure and private manner.
引用
收藏
页码:1484 / 1494
页数:11
相关论文
共 33 条
[1]  
[Anonymous], 2005, 7 OASIS
[2]   A privacy-aware access control system [J].
Ardagna, C. ;
Cremonini, M. ;
di Vimercati, S. ;
Samarati, P. .
JOURNAL OF COMPUTER SECURITY, 2008, 16 (04) :369-397
[3]  
Ashley Paul., 2002, PROCEEDING ACM WORKS, P103, DOI DOI 10.1145/644527.644538
[4]   An authorization model for geospatial data [J].
Atluri, V ;
Chun, SA .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (04) :238-254
[5]  
Bertino Elisa., 2005, SACMAT 05, P29
[6]  
Bhatti R., 2005, ACM Transactions on Information and Systems Security, V8, P388, DOI 10.1145/1108906.1108909
[7]   Distributed access management in multimedia IDCs [J].
Bhatti, R ;
Shafiq, B ;
Shehab, M ;
Ghafoor, A .
COMPUTER, 2005, 38 (09) :60-+
[8]   X-FEDERATE: A policy engineering framework for federated access management [J].
Bhatti, Rafae ;
Bertino, Elisa ;
Ghafoor, Arif .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2006, 32 (05) :330-346
[9]  
Bowen J. P., 2001, Z FORMAL SPECIFICATI
[10]   Personal Health Records: New Means to Safely Handle Health Data? [J].
Carrion Senor, Inmaculada ;
Fernandez Aleman, Jose Luis ;
Toval, Ambrosio .
COMPUTER, 2012, 45 (11) :27-33