Privacy preserving personalized access control service at third service provider

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the convenient connection to network, more and more individual information including sensitive information, such as contact list in Mobile Phone or PDA, can be delegated to the professional third service provider to manage and maintain. The benefit of this paradigm is, on one hand to avoid the sensitive information leakage when individual devices failed or lost, on the other hand to make only the authorized users access and share the delegated information online anytime and anywhere. However, in this paradigm the critical problems to be resolved are to guarantee both the privacy of delegated individual information and the privacy of authorized users, and what is more important to afford the owners of communication devices to have high level of control and power to create their own particular access control policies. In this paper, we present an approach to implement the personalized access control at third service provider in a privacy preserving way. Our approach implements the critical problems above in this paradigm by using selective encryption, blind signature and the combination of role based access control and discretionary access control.

Original languageEnglish
Title of host publicationProceedings - 2011 IEEE 9th International Conference on Web Services, ICWS 2011
PublisherIEEE Computer Society
Pages694-695
Number of pages2
ISBN (Print)9780769544632
DOIs
StatePublished - 2011
Event2011 IEEE 9th International Conference on Web Services, ICWS 2011 - Washington, United States
Duration: 4 Jul 20119 Jul 2011

Publication series

NameProceedings - 2011 IEEE 9th International Conference on Web Services, ICWS 2011

Conference

Conference2011 IEEE 9th International Conference on Web Services, ICWS 2011
Country/TerritoryUnited States
CityWashington
Period4/07/119/07/11

Keywords

  • Blind signature
  • Personalized access control
  • Privacy preserving
  • Selective encryption

Fingerprint

Dive into the research topics of 'Privacy preserving personalized access control service at third service provider'. Together they form a unique fingerprint.

Cite this