CERIAS Tech Report 2005-48 ESTABLISHING AND PROTECTING DIGITAL IDENTITY IN FEDERATION SYSTEMS
نویسندگان
چکیده
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have built trust among each other and enable sharing of user identity information amongst themselves. We first propose a flexible approach to establish a single sign-on (SSO) ID in the federation. Then we show how a user can leverage this SSO ID to establish certified and un-certified user identity attributes without the dependence on PKI for user authentication. This makes the process more usable and privacy preserving. Our major contribution in this paper is a novel solution for protection against identity theft of these identity attributes. We provide protocols based on cryptographic techniques, namely zero knowledge proofs and distributed hash tables. We show how we can preserve privacy of the user identity without jeopardizing security. We formally prove correctness and provide complexity results for our protocols. The complexity results show that our approach is efficient. In the paper we also show that the protocol is robust enough even in case semi-trusted “honest-yet curious” service providers thus preventing against insider threat. In our analysis we give the desired properties of the cryptographic tools used and identify open problems. We believe that the approach represents a precursor to new and innovative cryptographic techniques which can provide solutions for the security and privacy problems in federated identity management. ∗The work reported in this paper has been partially sponsored by NSF under the ITR Project 0428554 ”The Design and Use of Digital Identities” and by the sponsors of CERIAS.
منابع مشابه
Establishing a Privacy-Aware Collaborative eLearning Environment
Supporting privacy in eLearning becomes a commonly admitted important issue when designing according infrastructures. This is motivated by a higher awareness of the users with respect to protecting their personal data. In particular, eLearning comprises many scenarios that clearly spell out risks to the users’ privacy, such as communicating identifying data during classes. Nevertheless, current...
متن کاملOn the Limitations of Digital Watermarks: A Cautionary Note
The technology of digital watermarking has quickly become a respected concept for the solution of the copyright protection problems in the emerging global digital network. Content creators and vendors are increasingly aware of the pressing issues involved in protecting their intellectual property rights – which are crucial in establishing viable
متن کاملProtecting IMSI and User Privacy in 5G Networks
In recent years, many cases of compromising users’ privacy in telecom networks have been reported. Stories of “fake” base stations capable of tracking users and collecting their personal data without users’ knowledge have emerged. The current way of protecting privacy does not provide any protection against an active attacker on the air-interface, claiming to be a legitimate network that has lo...
متن کاملA Unified Scheme for Resource Protection in Automated Trust Negotiation
Automated trust negotiation is an approach to establishing trust between strangers through iterative disclosure of digital credentials. In automated trust negotiation, access control policies play a key role in protecting resources from unauthorized access. Unlike in traditional trust management systems, the access control policy for a resource is usually unknown to the party requesting access ...
متن کاملOn Broadcast Encryption with Random Key Pre-distribution Schemes
Broadcast encryption (BE) deals with the problem of establishing a secret, shared by g = G − r privileged nodes, among a set G nodes. Specifically, a set of r revoked nodes are denied access to the secret. Many schemes to address this problem, based on key pre-distribution schemes (KPS), have been proposed in the literature. Most state-ofthe-art methods employ tree-based techniques. However, ra...
متن کامل