User-Centric Privacy for Identity Federations Based on a Recommendation System

نویسندگان

چکیده

Specifications such as SAML, OAuth, OpenID Connect and Mobile are essential for solving identification, authentication authorisation in contexts mobile apps, social networks, e-commerce, cloud computing or the Internet of Things. However, end-users relying on identity providers to access resources, applications services lose control over Personally Identifiable Information (PII) they share with different composing federations. This work proposes a user-centric approach based recommendation system support users making privacy decisions selecting service choosing their settings. The proposed Privacy Advisor gives protection by providing personalised recommendations without compromising federations’ functionalities requiring any changes underlying specifications. A proof concept is presented validate evaluate its utility feasibility.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Self-service Privacy: User-Centric Privacy for Network-Centric Identity

User privacy has become a hot topic within the identity management arena. However, the field still lacks comprehensive frameworks even though most identity management solutions include built-in privacy features. This study explores how best to set up a single control point for users to manage privacy policies for their personal information, which may be distributed (scattered) across a set of n...

متن کامل

Using XACML for Privacy Control in SAML-Based Identity Federations

With Federated Identity Management (FIM) protocols, service providers can request user attributes, such as the billing address, from the user’s identity provider. Access to this information is managed using so-called Attribute Release Policies (ARPs). In this paper, we first analyze various shortcomings of existing ARP implementations; then, we demonstrate that the eXtensible Access Control Mar...

متن کامل

A Smart Card Based Solution for User-Centric Identity Management

This paper presents a prototype of a previously proposed user-centric identity management system using trusted modules. The trusted module, implemented using a smart card, can retrieve user attributes from identity providers and offer them to service providers, after authentication. This paper allows an evaluation of the practical feasibility of the identity management architecture and provides...

متن کامل

Designing Privacy for You : A User Centric Approach For Privacy

Privacy directly concerns the user as the data owner (datasubject) and hence privacy in systems should be implemented in a manner which concerns the user (user-centered). There are many concepts and guidelines that support development of privacy and embedding privacy into systems. However, none of them approaches privacy in a usercentered manner. Through this research we propose a framework tha...

متن کامل

User Centric Identity Management

Identity management is traditionally seen from the service providers’ point of view, meaning that it is an activity undertaken by the service provider to manage service user identities. Traditional identity management systems are designed to be cost effective and scalable primarily for the service providers, but not necessarily for the users, which often results in poor usability. Users are, fo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2022

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics11081238