Position Statement. Blockchain based Identity Management

Similar documents
BT EDUCATION & LOCAL GOVERNMENT. Strategic Sourcing. Transforming Procurement in Local Government

How To Use Bbt (Bbt) For Business

BT IP Exchange helps mobile operators accelerate VoLTE deployment

BT Contact Centre Efficiency Quick Start Service

BT Managed Mobility Expenses. Complete visibility and control to reduce your mobile communication costs

BT Versatility Quick Reference

BT Advise Connect. Delivering intelligent network capability around the globe. BT Connect IQ Quick Start. BT Advise

Quick Reference User Guide

The butterfly effect. How smart technology is set to completely transform utilities

BT Unified Trading communication. The Future Delivered

Moving to a new dimension of networks. Connect IQ: evaluator

WHOLESALE SIP TRUNKING

IP Voice Reseller. Deliver the VoIP services your customers demand without costly infrastructure investment or increased management complexity.

BT Unified Trading collaboration

IP OffIce SIMPLe, POWeRfUL communications for YOUR ORGANISATION

V-IP Featurephone Quick Reference User Guide. Introduction to your V-IP Featurephone

BT Trace. Supply chains that flow

Service Schedule for BT Business Lite Web Hosting and Business Lite powered by Microsoft Office 365

People-Focused Access Management. Software Consulting Support Services

Connecting things. Creating possibilities. A point of view

BT Calling Features User Guide. Make more of your phone

Hospitality Solutions

A Changing Commission: How it affects you - Issue 1

Video Managed Services

EXPERTISE AN INNOVATIVE PROGRAMME ENABLING YOU TO LEVERAGE BT S CISCO RELATIONSHIP AND TO STIMULATE REVENUE

BT Cloud Phone for your business. A guide to our IP Phones portfolio.

Connect Intelligence. Performance intelligence for your application delivery chain. BT Connect Networks that think

Microsoft Exchange Online from BT. Service Description (Shared Platform)

Security by Design WHITE PAPER

BT Assure Threat Intelligence

BT Hosted IPT (VoIP)

BT Payments and Transactions Professional Services Package for Merchant Acquiring

BT MeetMe video. User guide. BT Conferencing Version: 1.0

Customer Guide. BT Business - BT SIP Trunks. BT SIP Trunks: Firewall and LAN Guide. Issued by: BT Business Date Issue: v1.

BT Low Latency Management for Financial Markets

Get the message wherever you are Call Minder User Guide

Make more of your phone

BT Calling Features User Guide. Make more of your phone

BT CLOUD VOICE. CUSTOMER ADMINISTRATOR GUIDE.

Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson

Identity and Access Management Services. G-Cloud 7

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

BT Managed Services. Taking care of business, so you can take care of business

VPN Technologies: Definitions and Requirements

WEB 2.0 AND SECURITY

Communication Choices

BT Field Force Automation. Transforming the performance of your mobile workforce

INTRODUCTION TO YOUR BT MICRO... 2 WELCOME... 2 BT MICRO FEATUREPHONE... 2 HOW TO USE YOUR BT MICRO FEATURE PHONE... 3

BT Business Broadband

BT customer complaints code

1 Plug one extender near your router 2 Plug one extender near your device 3 Connect your device

Secure Use of the New NHS Network (N3): Good Practice Guidelines

ETHERNET CONNECT. CONNECT YOUR BUSINESS WITH A FLEXIBLE, HIGH-PERFORMANCE NETWORK THAT S BUILT FOR RELIABILITY.

IT Enterprise Services

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

NCSU SSO. Case Study

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Turn Your Business Vision into Reality with Microsoft Dynamics NAV. icepts Technology Group, Inc. Dynamics NAV Gold ERP Partner

Blockchain and Smart Contracts Joe Guagliardo

Overview TECHIS Carry out security testing activities

Strategy and Tactics to Achieve Effective IT Governance

ARTL PKI. Certificate Policy PKI Disclosure Statement

N3 Customer Handbook. N3 programme

ENZO UNIFIED SOLVES THE CHALLENGES OF REAL-TIME DATA INTEGRATION

Outsourcing customer contact

BT Business Partner Sales (BPS) Brand Guidelines for Partners

Transcription:

Position Statement Blockchain based Identity Management May 31 st 2016

Contents Page 1 Personal Background 3 2 Directions in Blockchain Based Identity Management Solutions 3 3 Aim and Objectives Error! Bookmark not defined. 4 References 4 Page 2 of 5

1 Personal Background Géry Ducatel: Principal Researcher in BT, Research & Innovation, Security Futures Practice. I have been involved in designing of a vision for the Blockchain for the last two years. The team has set out a programme around Blockchain and I lead on the Identity Management implications. In parallel to Blockchain I am involved in designing Identity as a Service for cloud deployment application services. Prior to that I have been involved in deploying Federated Identity management systems with BT Cloud Compute integrated into a solution retailed by BT Global Services. Our BT Research and Innovation team has patented in excess of 10 patents related to blockchain including Identity Management, Blockchain attack detection, or Blockchain driven service optimisation. 2 Directions in Blockchain Based Identity Management Solutions Research and Technology is looking to implement complete Identity Management solutions relying on Blockchain identity. BT Research and Innovation has laid out a vision for Blockchain based service exploitation where users are empowered entities able to control and manage service consumption whilst enforcing privacy controls. Blockchain and Identity is gaining popularity, early examples have been described in Bitauth[3] is a solution for a decentralised authentication system which is based on SIN [4], a System Identification Number is a form of identity based on a cryptographic key pair. Blockstack, is another example of Blockchain based identity database. Blockchain base identification [5] has interesting privacy control management capabilities, however, its rigid implementation does not make it attractive to organisational scenarios. Using blockchain for application provisioning provide many benefits from a point of view of process simplification. The Blockchain provides one operational component that advantageously replaces complex functions including: User Management, Billing, auditability. Whilst organisations need to extend and diversify their network and compute capabilities outside of their intranets, they also need to centralise functionalities such as access management in order to protect business continuity. This implies that the identity of the organisation overrides that of the employee using the system. Legacy user management has challenges such as user permission creep. Users are granted too much access in order to simplify the task of system administrators. This over-exposure has security and management cost implications [1]. In relation to billing and also budget control, some existing solutions have demonstrated the ability to ring fence blockchain transaction [2]. Historically, Blockchain authentication has been based on Public Key Infrastructure which is an effective way of identifying a user without having to maintain an Identity and Access Management solution. However, this does not allow organisation to easily control what users are allowed to do on a blockchain based service management. 3 Topics to Cover in Order to be Effective The research is currently looking at bringing benefits from Blockchain based Identity Management solutions and integrate them with organisational processes. Challenge/Opportunities with Identity solutions include: - How to use smart contract to help organisations manage access to Blockchain solutions. - How to apply Blockchain transaction policies and how to enforce them Page 3 of 5

- How to revoke Blockchain access once authorised The research into Identity Management is looking at interoperability between Blockchain and other Identity and Access Management solutions in order to satisfy organisational access to Blockchain services. Important milestones in this approach include the ability to apply and enforce blockchain usage policies. This will allow organisations to provision, de-provision, and delegate services. Having organisation wide policies will facilitate and will demonstrate an alternative to complex billing platforms. At an individual level, Blockchain based protocol can also be expanded to complement the management of Personally Identifiable Information in collaboration with existing Identity Management solutions. 4 References [1] Adallom (2014) Cloud Usage Risk Report, [2] Assia, Y., Buterin, V., m liorhakilior, Rosenfeld M., Colored Coins whitepaper, https://docs.google.com/document/d/1ankp_cvztcmlizw4dvsw6m8q2jc0li zrtluowu2z1be/edit#heading=h.wxrvzqj8997r (retrieved 24/04/15) [3] Martindale, E. (2014) BitAuth, for Decentralized Authentication https://github.com/bitpay/bitauth (retrieved 22/05/15) [4] Garzik, J (2014) SIN: Fully decentralized, anonymous, secure identity https://en.bitcoin.it/wiki/identity_protocol_v1 (retrieved 22/05/15) [5] Blockstack docs (2016) https://blockstack.org/docs (retrieved 31/05/16) Page 4 of 5

Offices worldwide British Telecommunications plc 2014 Registered office: 81 Newgate Street, London EC1A 7AJ Registered in England No: 1800000