A system architecture for subject-centric data sharing

Mohammad Jabed Morshed Chowdhury, Alan Colman, Jun Han, Muhammad Ashad Kabir

Research output: Book chapter/Published conference paperConference paperpeer-review

1 Citation (Scopus)

Abstract

With the rapid growth of online social networks, the mindset of the people about sharing of their personal information has changed significantly. Individuals (data subjects) are more willing to share their personal information with others. However, contemporary data sharing mechanisms often do not capture the individual's fine-grained data sharing requirements. Furthermore, data subjects have to use diverse access control mechanisms available for each different data custodian to control its dissemination, which often lead to data and privacy leakage. To overcome these limitations, we present a novel system architecture puts the data subject in charge of selectively assigning access rights to resources using a centralized authorization manager. We have also implemented a prototype to show how the proposed subject-centric and privacy-preserving data sharing framework works.
Original languageEnglish
Title of host publicationProceedings of the Australasian Computer Science Week Multiconference
Subtitle of host publicationAustralasian Information Security Conference (AISC 2018)
PublisherAssociation for Computing Machinery (ACM)
Pages1-10
Number of pages10
ISBN (Electronic)9781450354363
DOIs
Publication statusPublished - 2018
Event2018 Australasian Information Security Conference (AISC) - Brisbane, Australia
Duration: 30 Jan 201802 Feb 2018
https://web.archive.org/web/20201207054036/https://www.csse.canterbury.ac.nz/conferences/aisc2018/ (Conference website)
https://web.archive.org/web/20190125111717/http://www.csse.canterbury.ac.nz/conferences/aisc2018/program.html (program)

Conference

Conference2018 Australasian Information Security Conference (AISC)
CountryAustralia
CityBrisbane
Period30/01/1802/02/18
OtherAustralasian Information Security Conference (AISC 2018) will be held as part of the Australasian Computer Science Week (ACSW 2018, http://acsw.org.au), which represents the largest annual gathering of computer scientists and researchers in Australasia. This conference aims at promoting research on all aspects of cyber security and cryptography and increasing communication between academic and industrial researchers working in this area. AISC 2018 welcomes not only computer scientists and researchers, but also educators, students, technicians, practitioners and industry from across the world. We encourage contributions from different fields such as system security, network security, cyber security, cryptology and etc.
Internet address

Fingerprint Dive into the research topics of 'A system architecture for subject-centric data sharing'. Together they form a unique fingerprint.

Cite this