Mobile Partial Identity Management: The Non-repudiable Minimal Mobile Identity Model

被引:0
|
作者
Samadani, Mohammad Hasan [1 ]
Shajari, Mehdi [1 ]
机构
[1] Amir Kabir Univ Technol, Comp Engn & Informat Technol Dept, Tehran, Iran
来源
关键词
Identification; Security; Privacy; Non-Repudiation; Mobile Identity; Minimal Identity; Non-Repudiable Minimal Mobile Identity Model; NRMI;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the personal nature of a mobile device, it is seen as a suitable medium for storing personal information and credentials. As a result, the mobile device becomes the owner's identity-on-the-move. There are many situations in which a mobile user must offer a partial set of his identity to be able to use a service. However, only a minimal set of attributes is required by an Identity Verifier to identify a person or to correctly establish the person's role, position or status should be used. Furthermore, the verifier must be sure that the user cannot repudiate his identity later, and the offered identity is valid. In this paper, we proposed, developed and analyzed a mobile partial identity management model that the mobile user can generate his non-repudiable minimal set of his identity. The user can be sure that the verifier cannot obtain any other identity attributes, and the verifier can be sure that this identity profile is valid and the user cannot repudiate it later. The presented model, the NRMI model, is a secure and efficient mobile partial identity management. It can be used in several scenarios and use cases as well as step-by-step identification scenarios and managing identity social groups.
引用
收藏
页码:439 / 449
页数:11
相关论文
共 50 条
  • [41] Mobile Identity As Social Economic Enabler
    Do Van Thanh
    Ngu Phuc Huy
    Khuong, Loc H.
    [J]. 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 134 - 139
  • [42] MOBILE REPORTING IN THE ASPECT OF PROFESSIONAL IDENTITY
    Berezhnaia, Marina
    [J]. EUROPEAN JOURNAL OF SCIENCE AND THEOLOGY, 2015, 11 (01) : 175 - 184
  • [43] Better user protection with mobile identity
    Do Van Thanh
    Jonvik, Tore
    Jorstad, Ivar
    Do Van Thuan
    [J]. 2013 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2013,
  • [44] Stealthy Mobile Phone Identity Catcher
    Xu, Changqing
    Yang, Fan
    Teng, Jin
    Jiang, Sumxin
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (03) : 494 - 501
  • [45] Mobile Identity as a tool to develop society
    Thanh Van Do
    Feng, Boning
    Swafford, Clark
    Van Thuan Do
    Khuong, Loc H.
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [46] URBAN IDENTITY IN THE AGE OF THE MOBILE PHONE
    Barlas, Adnan
    Senturk, Meltem
    [J]. METU JOURNAL OF THE FACULTY OF ARCHITECTURE, 2011, 28 (01) : 109 - 129
  • [47] Implementing Identity Provider on Mobile Phone
    Abe, Tsuyoshi
    Itoh, Hiroki
    Takahashi, Kenji
    [J]. DIM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL IDENTITY MANAGEMENT, 2007, : 46 - 52
  • [48] A new definition of homomorphic signature for identity management in mobile cloud computing
    Wang, Zhiwei
    Sur, Guozi
    Chen, Danwei
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) : 546 - 553
  • [50] Choice of Suitable Identity and Access Management Standards for Mobile Computing and Communication
    Naik, Nitin
    Jenkins, Paul
    Newell, David
    [J]. PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT 2017), 2017,