Subject-Wise Policy Based Access Control Mechanism for Protection of Personal Information

Author(s):  
Hyung-Jin Mun ◽  
Nam-Kyoung Um ◽  
Ning Sun ◽  
Yong-Zhen Li ◽  
Sang-ho Lee
Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3041
Author(s):  
Shizra Sultan ◽  
Christian D. Jensen

The amount of data generated in today’s world has a fair share of personal information about individuals that helps data owners and data processors in providing them with personalized services. Different legal and regulatory obligations apply to all data owners collecting personal information, specifying they use it only for the agreed-upon purposes and in a transparent way to preserve privacy. However, it is difficult to achieve this in large-scale and distributed infrastructures as data is continuously changing its form, such as through aggregation with other sources or the generation of new transformed resources, resulting often in the loss or misinterpretation of the collection purpose. In order to preserve the authorized collection purposes, we propose data is added as a part of immutable and append-only resource metadata (provenance), to be retrieved by an access control mechanism when required for data-usage verification. This not only ensures purpose limitation in large-scale infrastructures but also provides transparency for individuals and auditing authorities to track how personal information is used.


2013 ◽  
Vol 385-386 ◽  
pp. 1705-1707
Author(s):  
Tzer Long Chen ◽  
Yu Fang Chung ◽  
Jian Mao Hong ◽  
Jeng Hong Jhong ◽  
Chin Sheng Chen ◽  
...  

It is important to notice that the access control mechanism has been widely applied in various areas, such as on-line video systems, wireless network, and electronic documents. We propose an access control mechanism which is constructed based on two mathematical fundamentals: Lagrange interpolation and ElGamal algorithm. We conduct performance analysis to compare the efficiency of our proposed scheme with that of several related published schemes in both key generation phase and key derivation phase. Our new scheme is proven to be more efficient. It is shown, as expected, a more efficient scheme provides relatively less security and a more secure scheme is relatively less efficient for private keys of the same size.


Sign in / Sign up

Export Citation Format

Share Document