Establishing and protecting digital identity in federation systems

被引:26
作者
Bhargav-Spantzel, Abhilasha [1 ]
Squicciarini, Anna
Bertino, Elisa
机构
[1] Purdue Univ, CERIAS, W Lafayette, IN 47907 USA
关键词
Identity management; single sign-on; federation; identity theft; zero knowledge proof; distributed hash tables; revocation;
D O I
10.3233/JCS-2006-14303
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have built trust among each other and enable sharing of user identity information amongst themselves. Our solution supports a step by step approach according to which an individual can first establish a digital identity followed by a secure and protected use of such identity. We first introduce a flexible approach to establish a single sign-on (SSO) ID in a federation. Then we show how a user can leverage this SSO ID to establish certified and uncertified user identity attributes without the dependence on PKI for user authentication. This makes the process more usable and enhances privacy. The major contribution of this paper is a novel solution for protection against identity theft of these identity attributes. Our approach is based on the use of zero-knowledge proof protocols and distributed hash tables. Revocation mechanisms of the identity attributes are also developed. We illustrate how current revocation techniques can benefit from the underlying federation framework and the use of distributed hash tables. Finally, we formally prove correctness and provide complexity results for our protocols. The complexity results show that our approach is efficient. In the paper we also show that the protocol is robust enough even in the case of semi-trusted "honest-yet curious" service providers, thus preventing against insider threat. We believe that the approach represents a precursor to new and innovative cryptographic techniques which can provide solutions for the security and privacy problems in federated identity management.
引用
收藏
页码:269 / 300
页数:32
相关论文
共 39 条
[1]   Prudent engineering practice for cryptographic protocols [J].
Abadi, M ;
Needham, R .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (01) :6-15
[2]  
Abelson H., 1998, DIGITAL IDENTI UNPUB
[3]  
Adida B., 2005, P DIMACS WORKSH THEF
[4]  
Almuhammadi S, 2004, CEC 2004: IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY, PROCEEDINGS, P299
[5]  
Bellare M., 1993, P ACM CCS, V93, P62, DOI DOI 10.1145/168588.168596
[6]   Trust-X:: A peer-to-peer framework for trust establishment [J].
Bertino, E ;
Ferrari, E ;
Squicciarini, AC .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (07) :827-842
[7]  
Bhargav-Spantzel A., 2005, REV IEEE SECURITY PR
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]  
Burk H., 1990, Computers & Security, V9, P715, DOI 10.1016/0167-4048(90)90114-9
[10]  
Camenisch J, 2001, LECT NOTES COMPUT SC, V2045, P93