T-FIM: Transparency in Federated Identity Management for Decentralized Trust and Forensics Investigation

被引:0
|
作者
Xu, Bowen [1 ,2 ]
Zhang, Zhijintong [3 ]
Sun, Aozhuo [1 ,2 ]
Guo, Juanjuan [4 ]
Wang, Zihan [5 ]
Li, Bingyu [3 ]
Dong, Jiankuo [6 ]
Jia, Shijie [1 ,2 ]
Song, Li [1 ,2 ]
机构
[1] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100045, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 101408, Peoples R China
[3] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[4] China Acad Informat & Commun Technol, Cloud Comp & Big Data Res Inst, Beijing 100191, Peoples R China
[5] Coordinat Ctr China, Natl Comp Network Emergency Response Tech Team, Beijing 100029, Peoples R China
[6] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210003, Peoples R China
基金
中国国家自然科学基金;
关键词
federated identity management; transparency; privacy; digital forensics; DIGITAL FORENSICS; SECURE;
D O I
10.3390/electronics12173591
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Federated Identity Management (FIM) has gained significant adoption as a means to simplify user authentication and service authorization across diverse domains. It serves as a centralized authentication and authorization method, enabling users to access various applications or resources using credentials issued by a universally trusted identity provider (IdP). However, recent security incidents indicate that the reliability of credentials issued by IdP is not absolute in practice. If the IdP fails, it can persistently access any application that trusts it as any user. This poses a significant security threat to the entire system. Furthermore, with the increasing adoption of FIM across diverse scenarios, there is a growing demand for the development of an identity management system that can effectively support digital forensics investigations into malicious user behavior. In this work, we introduce transparency to federated identity management, proposing T-FIM to supervise unconditional trust. T-FIM employs privacy-preserving logs to record all IdP-issued tokens, ensuring that only the true owner can access the exact token. We utilize identity-based encryption (IBE), but not just as a black box, encrypting tokens before they are publicly recorded. In addition, we propose a decentralized private key generator (DPKG) to provide IBE private keys for users, avoiding the introduction of a new centralized trust node. T-FIM also presents a novel approach to digital forensics that enables forensic investigators to collect evidence in a privacy-preserving manner with the cooperation of the DPKG. We conduct a comprehensive analysis of the correctness, security, and privacy aspects of T-FIM. To demonstrate the practical feasibility of T-FIM, we evaluated the additional overhead through experimental evaluations. Additionally, we compared its performance with other similar schemes to provide a comprehensive understanding of its capabilities and advantages.
引用
收藏
页数:21
相关论文
共 16 条
  • [1] Federated Identity Management (FIM): Challenges and Opportunities
    Malik, Ali Ahmad
    Anwar, Hirra
    Shibli, Muhammad Awais
    [J]. 2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 75 - 82
  • [2] An Authentication Trust Metric for Federated Identity Management Systems
    Gomi, Hidehito
    [J]. SECURITY AND TRUST MANAGEMENT, 2011, 6710 : 116 - 131
  • [3] Mathematical Modelling of Trust Issues in Federated Identity Management
    Ferdous, Md Sadek
    Norman, Gethin
    Josang, Audun
    Poet, Ron
    [J]. TRUST MANAGEMENT IX, 2015, 454 : 13 - 29
  • [4] Decentralized Identity and Trust Management Framework for Internet of Things
    Luecking, Markus
    Fries, Christian
    Lamberti, Robin
    Stork, Wilhelm
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (IEEE ICBC), 2020,
  • [5] Authentication Trust Metric and Assessment for Federated Identity Management Systems
    Gomi, Hidehito
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01) : 29 - 37
  • [6] A New Dynamic Trust Model for "On Cloud" Federated Identity Management
    Bendiab, Keltoum
    Shiaeles, Stavros
    Boucherkha, Samia
    [J]. 2018 9TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2018,
  • [7] Federated Authorization over Access to Personal Data for Decentralized Identity Management
    Hardjono, Thomas
    [J]. IEEE Communications Standards Magazine, 2019, 3 (04): : 32 - 38
  • [8] ETIS - Efficient Trust and Identity Management System for Federated Service Providers
    Bhonsle, Makarand V.
    Poolsappasit, Nayot
    Madria, Sanjay K.
    [J]. 2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2013, : 219 - 226
  • [9] IoT: A Decentralized Trust Management System Using Blockchain-Empowered Federated Learning
    Bi, Lirui
    Muazu, Tasiu
    Samuel, Omaji
    [J]. SUSTAINABILITY, 2023, 15 (01)
  • [10] A Federated Identity Management System with Centralized Trust and Unified Single Sign-On
    Jiang, Jian
    Duan, Haixin
    Lin, Tao
    Qin, Fenglin
    Zhang, Hong
    [J]. 2011 6TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2011, : 785 - 789