A FLEXIBLE AND SECURE ACCESS CONTROL SCHEME USING SOCIAL BEHAVIOR IN REAL WORLD

Authors

  • DEBASISH CHAKRABORTY Research Institute of Electrical Communication, Tohoku University 2-1-1 Katahira, Aoba-ku, Sendai 980-8577, Japan
  • SATOSHI OGAWA Research Institute of Electrical Communication, Tohoku University 2-1-1 Katahira, Aoba-ku, Sendai 980-8577, Japan
  • GEN KITAGATA Research Institute of Electrical Communication, Tohoku University 2-1-1 Katahira, Aoba-ku, Sendai 980-8577, Japan
  • ATUSHI TAKEDA Tohoku Bunka Gakuen University 6-45-16 Kunimi, Sendai 981-8551, Japan
  • KAZUO HASHIMOTO Graduate School of Information Sciences, Tohoku University 6-3-09 Aramaki-Aza-Aoba, Aoba-ku, Sendai, 980-8579, Japan
  • NORIO SHIRATORI Research Institute of Electrical Communication, Tohoku University 2-1-1 Katahira, Aoba-ku, Sendai 980-8577, Japan

Keywords:

access control, socialware, symbiotic computing, collaborative work

Abstract

A social network is viewed as a set of people or organizations connected by a set of social relationships, such as friendship or common interests. In the past people would rely on the friends or close associates for information. Today, they search in the web for such information and opinion. And access control to resources is one of the most important technologies for supporting human activities in the digital space, where confidentiality and secure data handling are two most important issues for any such social network users. To realize this control two schemes were proposed: RBAC (Role-Based Access Control) [1] and TRBAC (Temporal Role-Based Access Control) [2] by adding time constraints and role dependencies to RBAC. However, these methods are not effective for temporal activities because of high maintenance costs and inadequacy in safeness. In this paper, we focus on a flexible and secure access control in the real space, by using relations with users and situations, and propose a novel access control which is effective for temporal activities. We evaluate our proposed scheme by implementing a prototype system which shows the effectiveness of this method.

 

Downloads

Download data is not yet available.

References

R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, “Role-Based Access Control Model”,

Computer, vol. 29, no. 2, pp. 38-47, 1996.

E. Bertino, P.A. Bonatti, and E. Ferrari, “TRBAC: A Temporal Role-Based Access Control

Model”, ACM Trans. Information and System Security, vol. 4, no. 3, pp. 191-233, Aug. 2001.

Tetsuo Kinoshita, Susumo Konno, Gen Kitagata, Takahiro Uchiya, Hideki Hara, “Symbiotic Sys-

tem: Co-existence and Mutual Respect of Human, Society, Environment, and Information System,

Forward: Socialware”, IPSJ, Vol.47, No.8, pp.817-824, 2006.

Mohsen Jamali, Hassan Abolhassani, “Different Aspects of Social Network Analysis”, Proceedings

of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence, Dec. 2006, pp. 66-72.

Filipe Beato, Karkulf Kohlweiss, and Karel Wouters, “Enforcing Access Control in Social Network

Sites”, The 9th Privacy Enhancing Technologies (PETA 2009), Aug. 5-7, 2009. Seattle, WA, USA.

Amin Tootoonchian, Kiran K. Gollu, Stefan Saroiu, Yashar Ganjali, Alec Wolman, “Lockr: Social

Access Control for Web 2.0”, WOSN’08, Seattle, Washington, USA, August 18, 2008.

S.E.Chang, M.S.H. Heng, “An Empirical Study on Voice Enabled Web Applications”, IEEE Per-

vasive Computing, IEEE, Jul.-Sept. 2006, pp. 76-81.

J.A.Q. Ruiz, J.R.M. Sanchez, “Design of a VoiceXML Gateway”, Proc. 2003 4th Mexican Inter-

national Conference on Computer Science, IEEE CS, Sept. 2003, pp. 49-53.

Stan Kurkovsky, David Strimple, Eric Nuzzi, Kerry Verdecchia, “Mobile Voice Access in Social

Networking Systems”, 5th International Conference on Information Technology - New Generations,

Las Vegas, Nevada, April 7-9, 2008.

Masahiro Nagao, Glenn Mansfield Keeni, Masahiro Ishigaki, Atsushi Togashi, Shoichi Noguchi, “A

Secure Distributed Database System with Time-series Data and Social-Relation Based Information

Access Control”, IEICE Technical Report, Vol.107, No.6, pp.55-60,2007.

S. Fujita, H. Hara, K. Sugawara, T. Kinoshita, and N. Shiratori, “Agent-based design model of

adaptive distributed systems”, The International Journal of Artificial Intelligence, Neural Net-

works and Complex Problem-Solving Technologies, Vol. 9, No. 1, pp. 57-70, 1998.

Takahiro Uchiya, Takahide Maemura, Kenji Sugawara, Tetsuo Kinoshita, “Interactive Design En-

vironment for Agent-Based System”, Transaction of the Institute of Electronics, Information and

Communication Engineers. D-I, Vol.J88-D-I, No.9, pp. 1344-1355.

Downloads

Published

2010-01-29

How to Cite

CHAKRABORTY, D. ., OGAWA, S. ., KITAGATA, G., TAKEDA, A. ., HASHIMOTO, K. ., & SHIRATORI, N. . (2010). A FLEXIBLE AND SECURE ACCESS CONTROL SCHEME USING SOCIAL BEHAVIOR IN REAL WORLD. Journal of Mobile Multimedia, 6(2), 145–157. Retrieved from https://journals.riverpublishers.com/index.php/JMM/article/view/4769

Issue

Section

Articles