首页 | 官方网站   微博 | 高级检索  
     

面向客户端上下文隐私保护的可信分散式访问控制
引用本文:韩伟力,高珺,陈辰. 面向客户端上下文隐私保护的可信分散式访问控制[J]. 计算机辅助设计与图形学学报, 2009, 21(11)
作者姓名:韩伟力  高珺  陈辰
作者单位:复旦大学软件学院,上海,201203;Department of Computer Science, Purdue University, West Lafayette, IN 47907 USA;复旦大学软件学院,上海,201203
基金项目:国家自然科学基金,国家"九七三"重点基础研究发展计划项目 
摘    要:隐私保护问题是当前访问控制研究领域的一个热点问题.为此提出一种可信分散式访问控制机制,以实现面向客户端上下文隐私保护的访问控制.可信分散式访问控制中包含了私有可信引用监视器和主引用监视器.私有可信引用监视器在安装了可信计算环境的客户端运行,用于评估客户端的访问控制请求,签署临时访问控制凭证;主引用监视器在服务端运行,用于评估临时访问控制凭证,决定客户端的访问是否被授权.由于具体的客户端上下文数据不会发送到服务器端,因此应用可信分散式访问控制,实现如简单位置相关的基于角色的访问控制,可以在客户端上下文相关的访问控制中很好地保护客户端的上下文数据隐私;此外,由于在该机制中客户端上下文是在客户端获取和处理的,因此可信分散式访问控制也可以减轻服务器端获取访问端的上下文的负担.安全性分析和性能实验表明,文中的访问控制机制可以有效地保护客户端上下文数据隐私.

关 键 词:可信分散式访问控制  隐私保护  可信计算

Trusted Decentralized Access Control for Client-Context Privacy Preservation
Han Weili,Gao Jun,Chen Chen. Trusted Decentralized Access Control for Client-Context Privacy Preservation[J]. Journal of Computer-Aided Design & Computer Graphics, 2009, 21(11)
Authors:Han Weili  Gao Jun  Chen Chen
Abstract:Privacy preservation is a hotspot in the access control research field.This paper proposes a novel access control mechanism,named trusted decentralized access control(TDAC).TDAC includes two reference monitors:private trusted reference monitor and master reference monitor.The former leverages trusted computing technologies at the client side,credibly evaluates access control requests and signs temporary access control credentials.The latter runs at the server side.evaluates the access control requests according to temporary access control credentials only.TDAC can solve the issue of privacy preservation in client-context aware access control,because no locaI private context data except for temporary access control credentials leak from the client side to the server side during the access control evaluation.In addition.TDAC can reduce the burden of a server to fetch subject-context data.The paper also proposes an architecture to implement TDAC for client-context aware access control,and applies TDAC to simple location aware role based access control.Finally,the security analysis and the performance evaluation show that TDAC can effectively implement privacy preservation.
Keywords:trusted decentralized access control  privacy preservation  trusted computing
本文献已被 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号