Physical Access Control for Captured RFID Data

  • Authors:
  • Travis Kriplean;Evan Welbourne;Nodira Khoussainova;Vibhor Rastogi;Magdalena Balazinska;Gaetano Borriello;Tadayoshi Kohno;Dan Suciu

  • Affiliations:
  • University of Washington;University of Washington;University of Washington;University of Washington;University of Washington;University of Washington;University of Washington;University of Washington

  • Venue:
  • IEEE Pervasive Computing
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

RFID security is a vibrant research area, and many protection mechanisms against unauthorized RFID cloning and reading attacks are emerging. However, little work has yet addressed the complementary issue of privacy for RFID data after it has been captured and stored by an authorized system. In this article, the authors discuss the problem of peer-to-peer privacy for personal RFID data. In this setting, they assume a system with trusted owners and administrators, and focus on ways to constrain peers' access to information about one another. An access control policy, called Physical Access Control, protects privacy by constraining the data a user can obtain from the system to those events that occurred when and where that user was physically present. PAC provides a high level of privacy. It also offers a database view that augments users' memory of places, objects, and people. PAC is a natural, intuitive access-control policy for peer-to-peer privacy. It enables many classes of applications while providing a good baseline trade-off between privacy and utility. This article is part of a special issue on security and privacy.