Towards Privacy-preserving Attribute Aggregation in Federated eID Systems
نویسندگان
چکیده
In: S. España, M. Ivanović, M. Savić (eds.): Proceedings of the CAiSE’16 Forum at the 28th International Conference on Advanced Information Systems Engineering, Ljubljana, Slovenia, 13-17.6.2016, published at http://ceur-ws.org Abstract. During the past years, achieving interoperability, i.e. creating identity federations, between different eID systems has gained relevance. A key problem of identity federations is the missing harmonization between different attribute providers (APs). In closed eID systems, ontologies allow a higher degree of automation in the process of aligning and aggregating attributes from different APs. This approach does not work for identity federations, as each eID system uses its own ontology to represent attributes. Moreover, providing attributes to intermediate entities required to align and aggregate attributes potentially violates privacy rules. To tackle these problems, we propose the use of combined ontology alignment approaches and locality-sensitive hashing (LSH) functions. We assess existing implementations of these concepts by means of criteria that are specific for identity federations. Obtained results show that suitable implementations of these concepts exist and that they can be used to achieve interoperability between eID systems on attribute level.
منابع مشابه
Employing Ontology-Alignment and Locality-Sensitive Hashing to Improve Attribute Interoperability in Federated eID Systems
Achieving interoperability, i.e. creating identity federations between different Electronic identities (eID) systems, has gained relevance throughout the past years. A serious problem of identity federations is the missing harmonization between various attribute providers (APs). In closed eID systems, ontologies allow a higher degree of automation in the process of aligning and aggregating attr...
متن کاملSecure & privacy-preserving eID systems with Attribute-based credentials
National electronic identification (eID) systems aim to provide universal, unique and reliable identification and authentication mechanisms to the citizens. Many countries in Europe have already introduced or are about to introduce electronic ID cards to their citizens. The increasing number of eID infrastructures and initiatives have been taken to scale the eID systems to support both eGovernm...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملIncorporating Leveled Homomorphic Encryption-based Private Information Retrieval in Federated eID Schemes to Enhance User Privacy
Numerous services are being offered over the Internet and require identification of users as in face-to-face interactions. To simplify the authentication procedure and reduce the need to manage multiple credentials to access services, Electronic Identification (eID) schemes have been introduced. eID schemes commonly involve many service providers (SPs) which provide services, such as online sho...
متن کاملDefending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering
Nowadays, increasing needs for information sharing arise due to extensive collaborations among organizations. Organizations desire to provide data access to their collaborators while preserving full control over the data and comprehensive privacy of their users. A number of information systems have been developed to provide efficient and secure information sharing. However, most of the solution...
متن کامل