TY - GEN
T1 - Privacy preserving personalized access control service at third service provider
AU - Tian, Xiuxia
AU - Sha, Chaofeng
AU - Wang, Xiaoling
AU - Zhou, Aoying
PY - 2011
Y1 - 2011
N2 - With the convenient connection to network, more and more individual information including sensitive information, such as contact list in Mobile Phone or PDA, can be delegated to the professional third service provider to manage and maintain. The benefit of this paradigm is, on one hand to avoid the sensitive information leakage when individual devices failed or lost, on the other hand to make only the authorized users access and share the delegated information online anytime and anywhere. However, in this paradigm the critical problems to be resolved are to guarantee both the privacy of delegated individual information and the privacy of authorized users, and what is more important to afford the owners of communication devices to have high level of control and power to create their own particular access control policies. In this paper, we present an approach to implement the personalized access control at third service provider in a privacy preserving way. Our approach implements the critical problems above in this paradigm by using selective encryption, blind signature and the combination of role based access control and discretionary access control.
AB - With the convenient connection to network, more and more individual information including sensitive information, such as contact list in Mobile Phone or PDA, can be delegated to the professional third service provider to manage and maintain. The benefit of this paradigm is, on one hand to avoid the sensitive information leakage when individual devices failed or lost, on the other hand to make only the authorized users access and share the delegated information online anytime and anywhere. However, in this paradigm the critical problems to be resolved are to guarantee both the privacy of delegated individual information and the privacy of authorized users, and what is more important to afford the owners of communication devices to have high level of control and power to create their own particular access control policies. In this paper, we present an approach to implement the personalized access control at third service provider in a privacy preserving way. Our approach implements the critical problems above in this paradigm by using selective encryption, blind signature and the combination of role based access control and discretionary access control.
KW - Blind signature
KW - Personalized access control
KW - Privacy preserving
KW - Selective encryption
UR - https://www.scopus.com/pages/publications/80053161947
U2 - 10.1109/ICWS.2011.46
DO - 10.1109/ICWS.2011.46
M3 - 会议稿件
AN - SCOPUS:80053161947
SN - 9780769544632
T3 - Proceedings - 2011 IEEE 9th International Conference on Web Services, ICWS 2011
SP - 694
EP - 695
BT - Proceedings - 2011 IEEE 9th International Conference on Web Services, ICWS 2011
PB - IEEE Computer Society
T2 - 2011 IEEE 9th International Conference on Web Services, ICWS 2011
Y2 - 4 July 2011 through 9 July 2011
ER -