Digital Identity Management



Similar documents
Biometric Recognition s Role in Identity Management

Privacy-preserving Digital Identity Management for Cloud Computing

NSF Workshop on Big Data Security and Privacy

User Authentication Guidance for IT Systems

Information Security Basic Concepts

Glossary of Key Terms

RealMe. Technology Solution Overview. Version 1.0 Final September Authors: Mick Clarke & Steffen Sorensen

Securing Adobe PDFs. Adobe - Certified Document Services Registration Authority (RA) Training. Enterprise Security. ID Verification Services

Privacy in Cloud Computing Through Identity Management

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

Dynamic Query Updation for User Authentication in cloud Environment

Knowledge Based Authentication (KBA) Metrics

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

Enhancing Web Application Security

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

An Efficient Windows Cardspace identity Management Technique in Cloud Computing

Secure cloud access system using JAR ABSTRACT:

Apache Milagro (incubating) An Introduction ApacheCon North America

White Paper: Multi-Factor Authentication Platform

CHAPTER 1 INTRODUCTION

CS 356 Lecture 28 Internet Authentication. Spring 2013

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

HSIN R3 User Accounts: Manual Identity Proofing Process

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

esign Online Digital Signature Service

VoteID 2011 Internet Voting System with Cast as Intended Verification

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010

How To Create Trust Online

Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association. SAFE-BioPharma Association

Alternative authentication what does it really provide?

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

Multi-Factor Authentication Core User Policy and Procedures

FIDO Trust Requirements

Biometric Authentication using Online Signature

Monitoring Data Integrity while using TPA in Cloud Environment

Arkansas Department of Information Systems Arkansas Department of Finance and Administration

5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES

CS 758: Cryptography / Network Security

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT

ZQL. a cryptographic compiler for processing private data. George Danezis. Joint work with Cédric Fournet, Markulf Kohlweiss, Zhengqin Luo

Designing federated identity management architectures for addressing the recent attacks against online financial transactions.

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

When you are prompted to enroll, you will be asked to enter a Security Phrase and select/answer three different Challenge Questions.

API-Security Gateway Dirk Krafzig

2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec

Authentication Scenarios India. Ramachandran

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

Contents. The Genesis of i-pin. The Concept of i-pin & Integrated IDM. The Trust Foundation of i-pin. The Function of i-pin. The Future of i-pin

Out-Of-Band Authentication Using a Real-time, Multi-factor Service Model

NIST E-Authentication Guidance SP and Biometrics

Identity: The Key to the Future of Healthcare

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

Two Factor Zero Knowledge Proof Authentication System

How To Ensure Correctness Of Data In The Cloud

PostSignum CA Certification Policy applicable to qualified personal certificates

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Chapter 23. Database Security. Security Issues. Database Security

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Chapter 1: Introduction

Applying Cryptography as a Service to Mobile Applications

Authentication Tokens

Public Key Cryptography in Practice. c Eli Biham - May 3, Public Key Cryptography in Practice (13)

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o. Presented by: Smitha Sundareswaran Chi Tsong Su

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

Digital identity: Toward more convenient, more secure online authentication

Introduction to Computer Security

Secure Authentication and Session. State Management for Web Services

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Identity, Credential, and Access Management. Open Solutions for Open Government

Paillier Threshold Encryption Toolbox

Welcome to the ODE Secure Web Portal User Guide

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

Brainloop Cloud Security

Authentication Application

Evaluation of different Open Source Identity management Systems

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Transcription:

Digital Identity Management Techniques and Policies E. Bertino CS Department and ECE School CERIAS Purdue University bertino@cs.purdue.edu

Digital Identity Management What is DI? Digital identity (DI) can be defined as the digital representation of the information known about a specific individual or organization Such information is set of claims made by one subject about itself or another subject Our definition includes both the notion of nyms identifiers used by users to carry on interactions with systems and identity attributes properties characterizing the users Claim: An assertion of the truth of something, typically one which is disputed or in doubt An identifier Knowledge of a secret Personally identifying information Membership in a given group (e.g. people under 16) 2

Drivers for Dependable and Flexible DI Technology The private sector The public sector The citizens 3

The goals of the VeryId project To develop flexible, multiple and dependable digital identity (FMDDI) technology To study the implication of its use To develop appropriate educational vehicles to teach people its use ----------------------------------- The project is funded by the USA National Science Foundation under the CyberTrust programme 4

Some initial results Protocols for the strong verification of identity attributes in federations Integration of biometrics Policies for the management of identity federations Authentication policies and services Identity provenance and quality Outreach activities 5

Identity Theft IDENTITY THEFT is the use of personally identifying information belonging to one individual by another individual for financial or personal gain. 6

Threat of Identity Theft: Attack Vectors Technical Physical Social Engineering Pharming, Network Sniffing, Database Attacks, Password Cracking Dumpster Diving, Trusted Insiders, Theft and Loss Phishing, Legal Identity Sources 7

Main idea behind verification of identity attributes: multi-factor verification To require additional identity information (like mother maiden name or SSN) as proof to qualify to be the owner of the identity attribute being used (like credit card number) Example Real Life Scenario: Requirement for additional proofs of identity I will use my credit card to pay To use your credit card please show your drivers license and an additional photo id for verification of your identity 8

Multi-Factor without Privacy Loss Zero knowledge proof (ZKP) is an interactive method to prove the possession of a secret without actually revealing it. Our aggregated ZKP scheme is used to prove the knowledge of multiple strong identifiers efficiently and reliably without the need to provide them in clear 9

Attribute types Single Sign On ID Uncertified Attributes Attributes Secured from Identity Theft (SIT) Certified Attributes 10

Two main phases of our solution Enrollment or Registration Here the user commits his strong identifiers to be used later as proofs of identity. These are the SIT attributes. Usage Before revealing the actual value of a SIT attribute one has to verify the commitments of other SIT attributes as proofs of identity. 11

Functional View of the System Policy Registration Identity Records Storage Policy Usage Usage Usage Audit Log Audit Log 12

Identity Management System Entities Identity Providers Issue identities Relying Parties Require identities Subjects Individuals and other entities about whom claims are made 13

Example Registrar or Identity Provider Request to register CCN,SSN Establish proofs of identity for CCN,SSN Tag SSN tag CCN tag Alice@SP1 Committed Registration Value Procedure C1 In Person C2 Online Request for Service Require CCN with proof of knowledge of SSN Verify commitments for the proof Service Provider Registration Phase Usage Phase CCN Service 14

Example Alice Registrar: Reg1 Service Provider : SP-Shop 15

Proving aggregated signature on committed values To prove the knowledge of multiple identifiers. 16

Integrating the zero-knowledge proof into the verification To prove the knowledge of secret commitments. 17

Zero-knowledge proof the aggregated signature To prove the possession of signature. 18

Efficiency Analysis Our signatures on commitments are short and the storage complexity is smaller than the ones computed with existing techniques [Camenisch et. Al. 04] Our approach is more flexible in that whenever n messages are committed for a user, the user is able to prove 2 n -1 many combinations of them which does not appear possible in the existing schemes Comparison of the number of exponentiations for proving t factors 19

Multi-factor Authentication using Aggregated Proof of knowledge Key Contributions: New cryptographic primitive which provides methodologies for privacy preserving multifactor authentication. Computational efficiency - Reduces the proofs of several factors, that would require several Zero knowledge proofs of knowledge (ZKPK), to one that uses only one ZKPK. Storage efficiency- Provides a flexible solution with minimal storage requirements. 20

How to detect duplicates in a Federation? Put the strong identifiers in a hash table and look for collisions Problem: How can thousands of hosts cooperatively maintain a large hash table in a completely decentralized fashion? One solution: Distributed Hash Tables.010.1010.000.1100.0011.1101.0010.011.111.100.1011 21

What are the main advantages of our solution? The actual values of the registered attributes used as proofs for multi-factor authentication and privacy is secured using ZKP. Assurance of valid information in a federation. We allow a flexible approach to authentication and a novel lazy validation approach to information in the federation. 22

Combination with Biometric Authentication Registration w = s random r w Secure Sketch Module ZKP Module Biometric commitment Client 2 Factor Authentication Registrar 23

Combination with Biometric Authentication (cont.) Verification at usage w = s Recover Module Client r w ZKP Module challenge proofs Service Provider 24

Policies for Identity Management in Federations We have developed a comprehensive set of assertions which is specifically relevant in the context of federations. Our assertions provide an intuitive approach to model federation activities and make access control decisions based on a large variety of information, including past access history. We analyze the history of the behavior of entities and events with the help of an assertion audit log and query processing, and also provide a simple approach to specify policies. 25

Policy for Managing Identities Managing identities have a lot of aspects. Therefore following is a taxonomy of policies in a federated identity management system. Health Information Services Authorization Policies Service Provision Policies Privacy Policies Pharmacy Nora Health Information Authorizer User Resources Preferences Policies Federation Agreement Policies Alice 26

Assertion Based Policy Language for Federations Service Provider Side Policy Types Resource authorization, Service provision & service provider privacy policies Architectural Components Policy manager Policy Base Access Control Monitor Attribute and Credential Manager Language & Models Assertion based language for Federations Policy Formulation Grammar Relational Model for Assertions Local DBMS for SP & Middleware interface Assertions Audit log database SP ASSERT LOG Integrity Checks based on attribute invariants and query processing Identity Informat ion flow Control WS Interface User Side Policy Types Resource authorization, & privacy preferences policies Architectural Components Policy manager User Profile User Interface Policy Base 27

Assertions All actions taken by SP s and users for authorization can be described through assertions. Each assertion is defined in terms of: The main interacting entities A time-stamp Other related information. The assertions capture the dynamic events occurring in the federation in a step by step, constructive approach. 28

Operational approach We propose to use a log of the actions executed by the entities in the federation; The log is a relational table, ASSERT _LOG defined according to the notion of relation of the relational data model. Checks for the log consistency are encoded using SQL-like queries. The log can be used to reason about the flow of identity information of the users. 29

Conclusion Identity Management and Theft Protection are areas of growing concern and active work. Identity Management system has potential to provide a secure and collaborative environment. We provide a solution to the problem of Identity Theft with the help of privacy preserving multi-factor authentication. 30

Thank You! Questions? Elisa Bertino bertino@cerias.purdue.edu 31