Mobile Partial Identity Management: The Non-repudiable Minimal Mobile Identity Model

被引:0
|
作者
Samadani, Mohammad Hasan [1 ]
Shajari, Mehdi [1 ]
机构
[1] Amir Kabir Univ Technol, Comp Engn & Informat Technol Dept, Tehran, Iran
来源
关键词
Identification; Security; Privacy; Non-Repudiation; Mobile Identity; Minimal Identity; Non-Repudiable Minimal Mobile Identity Model; NRMI;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the personal nature of a mobile device, it is seen as a suitable medium for storing personal information and credentials. As a result, the mobile device becomes the owner's identity-on-the-move. There are many situations in which a mobile user must offer a partial set of his identity to be able to use a service. However, only a minimal set of attributes is required by an Identity Verifier to identify a person or to correctly establish the person's role, position or status should be used. Furthermore, the verifier must be sure that the user cannot repudiate his identity later, and the offered identity is valid. In this paper, we proposed, developed and analyzed a mobile partial identity management model that the mobile user can generate his non-repudiable minimal set of his identity. The user can be sure that the verifier cannot obtain any other identity attributes, and the verifier can be sure that this identity profile is valid and the user cannot repudiate it later. The presented model, the NRMI model, is a secure and efficient mobile partial identity management. It can be used in several scenarios and use cases as well as step-by-step identification scenarios and managing identity social groups.
引用
收藏
页码:439 / 449
页数:11
相关论文
共 50 条
  • [1] Identity-based non-repudiable dynamic provable data possession in cloud storage
    Wang, Feng
    Xu, Li
    Wang, Huaqun
    Chen, Zhide
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 : 521 - 533
  • [2] An open mobile identity tool:: An architecture for mobile identity management
    Hypponen, Konstantin
    [J]. PUBLIC KEY INFRASTRUCTURE, 2008, 5057 : 207 - 222
  • [3] Mobile Identity Management
    Hoepman, Jaap-Henk
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 253 - 253
  • [4] Mobile Identity Management Revisited
    Tatli, Emin Islam
    Lucks, Stefan
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 244 : 125 - 137
  • [5] Mobile identity management: An enacted view
    Roussos, G
    Peterson, D
    Patel, U
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE, 2003, 8 (01) : 81 - 100
  • [6] A DNN Fingerprint for Non-Repudiable Model Ownership Identification and Piracy Detection
    Zheng, Yue
    Wang, Si
    Chang, Chip-Hong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2977 - 2989
  • [7] Mobile Identity Management (mID): A solution to management crisis
    Banwet, DK
    Saxena, A
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS, AND INFORMATICS, VOL XVI, PROCEEDINGS, 2004, : 392 - 395
  • [8] Secure Identity Management In Mobile Cloud Computing
    Suguna, M.
    Shalinie, S. Mercy
    Anusia, R.
    Deepti, S.
    [J]. 2017 INTERNATIONAL CONFERENCE ON NEXTGEN ELECTRONIC TECHNOLOGIES: SILICON TO SOFTWARE (ICNETS2), 2017, : 42 - 45
  • [9] Untraceable Identity Management Framework for Mobile Access
    Kao, Min-Chih
    Yeh, Yi-Shiung
    Wang, Chuan-Chi
    [J]. ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, PROCEEDINGS, 2008, : 614 - +
  • [10] Management of Identity and Credentials in Mobile Cloud Environment
    Jana, Debasish
    Bandyopadhyay, Debasis
    [J]. 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS (ICACSIS), 2013, : 113 - 118