Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Access control over uncertain data

Published: 01 August 2008 Publication History

Abstract

Access control is the problem of regulating access to secret information based on certain context information. In traditional applications, context information is known exactly, permitting a simple allow/deny semantics. In this paper, we look at access control when the context is itself uncertain. Our motivating application is RFID data management, in which the location of objects and people, and the associations between them is often uncertain to the system, yet access to private data is strictly defined in terms of these locations and associations.
We formalize a natural semantics for access control that allows the release of partial information in the presence of uncertainty and describe an algorithm that uses a provably optimal perturbation function to enforce these semantics. To specify access control policies in practice, we describe UCAL, a new access control language for uncertain data. We then describe an output perturbation algorithm to implement access control policies described by UCAL. We carry out a set of experiments that demonstrate the feasibility of our approach and confirm its superiority over other possible approaches such as thresholding or sampling.

References

[1]
http://rfid.cs.washington.edu/.
[2]
M. Abadi. Logic in access control. In LICS, 2003.
[3]
S. Abiteboul and O. Duschka. Complexity of answering queries using materialized views. In PODS, 1998.
[4]
P. Balbiani. Acces control with uncertain surveillance. In International Conference on Web Intelligence, 2005.
[5]
A. R. Beresford and F. Stajano. Location privacy in pervasive computing. In IEEE Pervasive Computing, 2003.
[6]
N. N. Dalvi and D. Suciu. Efficient query evaluation on probabilistic databases. VLDB J, 2007.
[7]
O. M. Duschka and M. R. Genesereth. Answering recursive queries using views. In PODS, 1997.
[8]
C. Dwork. Differential privacy. In ICALP, 2006.
[9]
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Proceedings of Theory of Cryptography. Springer, 2006.
[10]
A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In PODS, 2003.
[11]
S. R. Jeffery, M. N. Garofalakis, and M. J. Franklin. Adaptive cleaning for RFID data streams. In VLDB, 2006.
[12]
B. Lampson. Protection. In Proceedings of the 5th Annual Princeton Conference on Information Sciences and Systems.
[13]
A. Motro. An access authorization model for relational databases based on algebraic manipulation of view definitions. In IEEE Data Engineering, 1989.
[14]
V. Rastogi, S. Hong, and D. Suciu. The boundary between privacy and utility in data publishing. In VLDB, 2007. ACM.
[15]
V. Rastogi, D. Suciu, and E. Welbourne. Access control over uncertain data. In Technical Report, 2008.
[16]
C. Re, J. Letchner, M. Balazinska, and D. Suciu. Event queries on corrleated probabilistic streams. In SIGMOD, 2008.
[17]
C. Re and D. Suciu. Materialized views in probabilistic databases: for information exchange and query optimization. In VLDB, 2007.
[18]
S. Rizvi, A. O. Mendelzon, S. Sudarshan, and P. Roy. Extending query rewriting techniques for fine-grained access control. In SIGMOD. ACM, 2004.
[19]
A. Rosenthal and E. Sciore. Abstracting and refining authorization in sql. In Secure Data Management, 2004.
[20]
P. Sen and A. Deshpande. Representing and querying correlated tuples in probabilistic databases. In ICDE. IEEE, 2007.
[21]
Q. Wang, T. Yu, N. Li, J. Lobo, E. Bertino, K. Irwin, and J.-W. Byun. On the correctness criteria of fine-grained access control in relational databases. In VLDB, 2007.

Cited By

View all
  • (2014)MarkItProceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication10.1145/2638728.2641707(1289-1295)Online publication date: 13-Sep-2014
  • (2010)Inheriting access control rules from large relational databases to materialized views automaticallyProceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part III10.5555/1885450.1885505(426-437)Online publication date: 8-Sep-2010
  • (2010)Effectively and efficiently selecting access control rules on materialized views over relational databasesProceedings of the Fourteenth International Database Engineering & Applications Symposium10.1145/1866480.1866512(225-235)Online publication date: 16-Aug-2010
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Proceedings of the VLDB Endowment
Proceedings of the VLDB Endowment  Volume 1, Issue 1
August 2008
1216 pages

Publisher

VLDB Endowment

Publication History

Published: 01 August 2008
Published in PVLDB Volume 1, Issue 1

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 18 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2014)MarkItProceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication10.1145/2638728.2641707(1289-1295)Online publication date: 13-Sep-2014
  • (2010)Inheriting access control rules from large relational databases to materialized views automaticallyProceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part III10.5555/1885450.1885505(426-437)Online publication date: 8-Sep-2010
  • (2010)Effectively and efficiently selecting access control rules on materialized views over relational databasesProceedings of the Fourteenth International Database Engineering & Applications Symposium10.1145/1866480.1866512(225-235)Online publication date: 16-Aug-2010
  • (2009)Evaluating probability threshold k-nearest-neighbor queries over uncertain dataProceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology10.1145/1516360.1516438(672-683)Online publication date: 24-Mar-2009

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media