Avoiding Privacy Violations Caused by Context-Sensitive Services

U. Hengartner, P. Steenkiste
Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06)  
The increasing availability of information about people's context makes it possible to deploy context-sensitive services, where access to resources provided or managed by a service is limited depending on a person's context. For example, a location-based service can require Alice to be at a particular location in order to let her use a printer or learn her friends' location. However, constraining access to a resource based on confidential information about a person's context can result in
more » ... y violations. For instance, if access is constrained based on Bob's location, granting or rejecting access will provide information about Bob's location and can violate Bob's privacy. We introduce an access-control algorithm that avoids privacy violations caused by context-sensitive services. Our algorithm exploits the concept of access-rights graphs, which represent all the information that needs to be collected in order to make a context-sensitive access decision. Moreover, we introduce hidden constraints, which keep some of this information secret and thus allow for more flexible access control. We present a distributed, certificate-based access-control architecture for contextsensitive services that avoids privacy violations, two sample implementations, and a performance evaluation.
doi:10.1109/percom.2006.11 dblp:conf/percom/HengartnerS06 fatcat:fqicxixwerfmpaoulkea2vsvwm