Enhancing Public Digital Identity System (SPID) to Prevent Information Leakage
نویسندگان
چکیده
Public Digital Identity System (SPID) is the Italian government framework compliant with the EU eIDAS regulatory environment, aimed at implementing electronic identification and trust services in e-government and business applications. According to this federated identity management framework, digital identities are issued, upon application of the interested party, by digital identity providers. This way, users authenticate to service providers, which are public or private organizations providing a service to authorized users, provided that they adhere to SPID. A drawback that could limit the real diffusion of this framework is that, despite the fact that identity and service providers might be competitor private companies, SPID authentication results in information leakage about customers of identity providers. To overcome this potential limitation, in this paper, we propose a modification of SPID to allow user authentication by preserving the anonymity of the identity provider that grants the authentication credentials. This way, information leakage about customers of identity providers is fully prevented.
منابع مشابه
A Visualization System for Analyzing Information Leakage
Information leakage is a growing public concern. This paper describes a visualization system for tracing leaks involving confidential information. In particular, the system enables administrators to determine which hosts have confidential documents and the means by which confidential information is transmitted, received and duplicated. The visualization system is scalable to large organizations...
متن کاملInformation Disclosure in Identity Management
User Controlled Identity Management Systems have the goal to hinder the linkability between the different digital identities of a user. We perform a theoretical and an experimental study of the following information leakage problem: given a consistent view on the actions of a strong identity management system (e.g. Idemix ) where k users pseudonymously issue and show some credentials, do these ...
متن کاملInformation Disclosure in Identity Management
User Controlled Identity Management Systems have the goal to hinder the linkability between the different digital identities of a user. We perform a theoretical and an experimental study of the following information leakage problem: given a consistent view on the actions of a strong identity management system (e.g. Idemix ) where k users pseudonymously issue and show some credentials, do these ...
متن کاملA Leakage-Resilient Spatial Encryption Scheme
A scheme is said leakage resilient if it remains secure even when an adversary is able to learn partial information about some secret values used throughout the lifetime of the system. This recent area appeared because of the need to develop schemes that resist to sidechannel attacks, such as power-consumption, fault or time analyses. Today, there exist a few encryption schemes that implement t...
متن کاملA trustworthy and privacy-enhancing registration process for social network services
The increasing popularity of social network services (SNS), being used by millions of people everyday, has arisen some security and privacy issues. While users must be free to choose which amount of personal information they provide, SNS providers should get more involved to guarantee that their services are correctly exploited. This leads us to propose a more secure but still privacy-enhancing...
متن کامل