Abstract
Data privacy is one of the fundamental needs of the people. In a computing environment, there are various issues of data privacy protection in the enterprise. To enforce the automation of privacy policies and law, access control has been one of the most devoted subjects which to protect customers' data by preventing unauthorized access to the resources of the system. A fine-grained access control called Role-based access control (RBAC) model has been proposed to protect customer's data. However, relying on role only is insufficient and inefficient to protect data especially sensitive attributes, and this may cause risks of privacy disclosure to unauthorized and untrusted users. We present a finer-grained access control called Trust, Purpose, and Role-Based Access Control (TPRBAC) model to efficiently protect data particularly sensitive attributes. In the proposed model, purpose and role is applied to permit access to data, while trust is applied to control access to sensitive attributes. A prototype system is developed and tested, and the result shows sensitive attributes are protected. Experiments are also conducted to validate the proposed model, and the results show that the proposed work is efficient and improved privacy protection. Therefore, the proposed model solves the issue of insufficient and inefficient access control mechanism in protecting data especially sensitive attributes.
Metadata
| Item Type: | Book Section |
|---|---|
| Creators: | Creators Email / ID Num. Salji, Mohd Rafiz mohdrafiz@uitm.edu.my Udzir, Nur Izura izura@upm.edu.my Ninggal, Mohd Izuan Hafez mohdizuan@upm.edu.my Mohd. Sani, Nor Fazlida fazlida@upm.edu.my Ibrahim, Hamidah hamidah.ibrahim@upm.edu.my |
| Contributors: | Contribution Name Email / ID Num. Editor Abu, Roziya roziya307@uitm.edu.my Editor Sheikh Abdul Mutalib, Siti Khairunnisa nnisa@uitm.edu.my Editor Jamaludin, Juaini juaini@uitm.edu.my |
| Subjects: | T Technology > T Technology (General) > Technological change T Technology > T Technology (General) > Information technology. Information systems |
| Divisions: | Universiti Teknologi MARA, Kedah > Sg Petani Campus > Faculty of Information Management |
| Page Range: | pp. 25-26 |
| Keywords: | Trust, Purpose, Role, TBAC, PBAC, RBAC, Privacy, Sensitive attributes |
| Date: | 2019 |
| URI: | https://ir.uitm.edu.my/id/eprint/128881 |
