OFELIA - A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management

被引:0
|
作者
Augusto, Alexandre B. [1 ]
Correia, Manuel Eduardo [1 ]
机构
[1] Univ Porto, Fac Sci, Dept Comp Sci, Ctr Res Adv Comp Syst CRACS INESC LA, P-4100 Oporto, Portugal
关键词
Secure Digital Identity management; User centricity; Mobile Identity Wallet; XMPP; OpenID Connect; Attribute aggregation; Access control;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Personal mobile devices with real practical computational power and Internet connectivity are currently widespread throughout all levels of society. This is so much so that the most popular of these devices, the smart phone, in all its varied ubiquitous manifestations is nowadays the de facto personal mobile computing platform, be it for civil or even military applications. In parallel with these developments, Internet application providers like Google and Facebook are developing and deploying an ever increasing set of personal services that are being aggregated and structured over personal user accounts were an ever increasing set of personal private sensitive attributes is being massively aggregated. In this paper we describe OFELIA (Open Federated Environment for Leveraging of Identity and Authorization), a framework for user centric identity management that provides an identity/authorization versatile infrastructure that does not depend upon the massive aggregation of users identity attributes to offer a versatile set of identity services. In OFELIA personal attributes are distributed among and protected by several otherwise unrelated AAs (Attribute Authorities). Only the user mobile device knows how to aggregate these scattered AAs identity attributes back into some useful identifiable entity identity. Moreover by recurring to an IdB (Identity Broker), acting as a privacy enhancing blind caching-proxy, in OFELIA the identity attributes location in the Internet is hidden from the RP/SP (Relying Party, Service Provider) that wants to have temporary access to the users personal data. The mobile device thus becomes the means by which the user can asynchronously exercise discretionary access control over their most sensitive dynamic identity attributes in a simple but highly transparent way.
引用
收藏
页码:61 / 74
页数:14
相关论文
共 50 条
  • [1] User-Centric Identity Management Based on Secure Elements
    Boeger, Davi
    Barreto, Luciano
    Fraga, Joni
    Urien, Pascal
    Aissaoui, Hassane
    Santos, Andre
    Pujolle, Guy
    [J]. 2014 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2014,
  • [2] User-centric identity management in open mobile environments
    Hoffmann, M
    [J]. PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING, 2005, 780 : 99 - 104
  • [3] A new user-centric identity management infrastructure for federated systems
    Poursalidis, Vassilis
    Nikolaou, Christos
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 11 - 20
  • [4] Portable user-centric identity management
    Ahn, Gail-Joon
    Ko, Moo Nam
    Shehab, Mohamed
    [J]. PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 573 - +
  • [5] User-centric Identity Management in heterogeneous Federations
    Rieger, Sebastian
    [J]. 2009 FOURTH INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES, 2009, : 527 - 532
  • [6] A USER-CENTRIC APPROACH FOR FEDERATED IDENTITY MANAGEMENT
    Bergadano, Francesco
    Accornero, Renato
    Lucisano, Giovanna
    Rispoli, Daniele
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2013, 5 (01): : 3 - 18
  • [7] OpenID as an Approach for User-centric Identity Management
    Bitzer, Stefan
    Klein, Marco
    Schumann, Matthias
    [J]. AMCIS 2010 PROCEEDINGS, 2010,
  • [8] Trust management for user-centric identity management on the internet
    Choi, Daeseon
    Jin, Seung-Hun
    Yoon, Hyunsoo
    [J]. 2007 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2007, : 367 - +
  • [9] User-centric privacy management for federated identity management
    Ahn, Gail-Joon
    Ko, Moonam
    [J]. 2007 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2008, : 187 - 195
  • [10] User-centric identity management using trusted modules
    Vossaert, J.
    Lapon, J.
    De Decker, B.
    Naessens, V.
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (7-8) : 1592 - 1605