A Movie Streaming Application & ABC4Trust as Services in the Cloud. Dr. Anja Lehmann



Similar documents
Credential-based access control extensions to XACML

ABC4Trust on Smart Cards Pascal Paillier CryptoExperts Summit Event, Brussels Jan 20, 2015

Network-based Access Control

Public Key Infrastructure

NOK NOK LABS AUTHENTICATION & OTT SERVICES

Authentication: Password Madness

2-FACTOR AUTHENTICATION WITH

Service Description. 3SKey. Connectivity

D6.2 Necessary hardware and software package for the school pilot deployment

The University Course Evaluation pilot

Business Banking Customer Login Experience for Enhanced Login Security

Scalable Authentication

D7.1 Application Description for Students

What s it all about? SAFE-BioPharma Association

Can We Reconstruct How Identity is Managed on the Internet?

Digital Identity Management

Single Sign On. SSO & ID Management for Web and Mobile Applications

Introduction to SAML

ABC4Trust Pilot Requirements and Review

Credential-Based Access Control Extensions to XACML

BYE BYE PASSWORDS. The Future of Online Identity. Hans Zandbelt Sr. Technical Architect. CTO Office - Ping Identity

Cloud-based Identity and Access Control for Diagnostic Imaging Systems

Livezilla How to Install on Shared Hosting By: Jon Manning

Lecture VII : Public Key Infrastructure (PKI)

Adding Stronger Authentication to your Portal and Cloud Apps

SAML AS AN SSO STANDARD FOR CUSTOMER IDENTITY MANAGEMENT. How to Create a Frictionless, Secure Customer Identity Management Strategy

PRIVACY, SECURITY AND THE VOLLY SERVICE

Outline. IRMA Math. Background about IRMA. Mathematical basis of IRMA. What is authentication? Nijmegen s contribution.

Agenda. How to configure

Yannis Stamatiou, Computer Technology Institute (CTI) & Press Diophantus. CYBER SECURITY & PRIVACY EU FORUM 2013, Brussels, April, 2013

Account Activation. Guide

D7.2 Necessary hardware and software package for the student pilot deployment

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

A trusted identity management system is not only essential for ensuring your customers safety and confidence.

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia Pedro Borges

Apache Milagro (incubating) An Introduction ApacheCon North America

Agent and Broker Participation in the Federally-facilitated Marketplace (FFM): An Overview for States

OneLogin Integration User Guide

Digital Credentials CLAIM YOUR BADGE!

PRIME. Privacy and Identity Management for Everyone/Europe. Thomas Gross (IBM Research) with a PRIME hat on.

Executive Summary P 1. ActivIdentity

Taylor & Francis Online Mobile FAQs

360 Online authentication

Unified Access for Enterprise Users

Whitepaper on identity solutions for mobile devices

CS 6393 Lecture 7. Privacy. Prof. Ravi Sandhu Executive Director and Endowed Chair. March 8,

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365

Entrust IdentityGuard Comprehensive

My Private Cloud. Project Objectives

Identity Management. Critical Systems Laboratory

ADFS for. LogMeIn and join.me authentication

Secure Your Enterprise with Usher Mobile Identity

EMV-TT. Now available on Android. White Paper by

McAfee Cloud Identity Manager

nexus Hybrid Access Gateway

Guide to building a secure and trusted BYOID environment

The Top 5 Federated Single Sign-On Scenarios

HOW MICROSOFT AZURE AD USERS CAN EMPLOY SSO

managing SSO with shared credentials

Building Secure Applications. James Tedrick

McAfee Cloud Identity Manager

ACCESSING MICROSOFT OFFICE 365 FREE STUDENT RESOURCES

No additional requirements to use the PIV I card for physical facility access have been identified.

Guide for Securing With WISeKey CertifyID Personal Digital Certificate (Personal eid)

Entrust Managed Services PKI Administrator Guide

The Password Problem Will Only Get Worse

SAFE Digital Signatures in PDF

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Understanding Your Customer Journey by Extending Adobe Analytics with Big Data

IT Exam Training online / Bootcamp

Enhancing Web Application Security

API-Security Gateway Dirk Krafzig

Ray Chance President Browsercraft, LLC

SINGLE & SAME SIGN-ON ASPECTS

IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam.

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle

Electronic Payments Part 1

Important Information

General tips for increasing the security of using First Investment Bank's internet banking

How to Extend Identity Security to Your APIs

WHITE PAPER Usher Mobile Identity Platform

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

Entrust Managed Services PKI

MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation

Electronic Prescribing System (EPCS)

Cloud Services ADM. Agent Deployment Guide

Mobile Device as a Platform for Assured Identity for the Federal Workforce

Lecture 10 - Authentication

ADFS Integration Guidelines

An Identity Management Survey. on Cloud Computing

Digital Identity Management

Department of Defense PKI Use Case/Experiences

Identity, Credential, and Access Management. Open Solutions for Open Government

GLOBAL TELECOM INVOLVEMENT in the I D E N T I T Y E C O S YS T E M. July 2013

Key Features. PSX Mobile Marketing is focused on flexibility and ease-of-use for our Businesses/Merchants, Wi-Fi Hosting Sites and mobile users.

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Adobe PDF for electronic records

Transcription:

A Movie Streaming Application & ABC4Trust as Services in the Cloud Dr. Anja Lehmann IBM Research Zurich A research project funded by the European Commission s 7th Framework Programme.

Lessons learned from the pilots... Lessons learned from the pilots Privacy-ABCs hard to deploy Demos are private hard to try out Smart card integration somewhat slow New demo Public demo Verifier and Issuer as cloud services New smart card prototyp and optimized integration 2 Dr. Anja Lehmann IBM Research Zurich

Alice wants to watch a movie I wish to see Alice in Wonderland Alice Movie Streaming Service 3 Dr. Anja Lehmann IBM Research Zurich

Alice wants to watch a movie Sure, if you have subscription & are older than 12 Alice Movie Streaming Service 4 Dr. Anja Lehmann IBM Research Zurich

Watching the movie with the traditional solution OK, here's my eid my subscription Alice Movie Streaming Service 5 Dr. Anja Lehmann IBM Research Zurich

Watching the movie with the traditional solution Aha, you are Alice Doe born on Dec 12, 1998 7 Waterdrive CH 8003 Zurich Single Expires Aug 4, 2018 Alice Mplex Customer #1029347 Premium Subscription Expires Jan 13, 2016 Movie Streaming Service 6 Dr. Anja Lehmann IBM Research Zurich

Watching the movie with the traditional solution This is a privacy and security problem! identity theft profiling discrimination Alice Aha, you are Alice Doe born on Dec 12, 1998 7 Waterdrive CH 8003 Zurich Single Expires Aug 4, 2018 Mplex Customer #1029347 Premium Subscription Expires Jan 13, 2016 Movie Streaming Service 7 Dr. Anja Lehmann IBM Research Zurich

Watching the movie with the traditional solution With OpenID and similar solutions, e.g., log-in with Facebook ok, I'm Alice@facebook.com Alice Movie Streaming Service 8 Dr. Anja Lehmann IBM Research Zurich

Watching the movie with the traditional solution With OpenID and similar solutions, e.g., log-in with Facebook Aha, Alice is watching a 12+ movie Alice Movie Streaming Service 9 Dr. Anja Lehmann IBM Research Zurich

Watching the movie with the traditional solution With OpenID and similar solutions, e.g., log-in with Facebook Aha, Alice is watching a 12+ movie Aha, you are Alice@facebook.com born on Dec 12, 1998 Alice's friends are... Alice's public profile is Mplex Customer #1029347 Premium Subscription Expires Jan 13, 2016 Alice Movie Streaming Service 10 Dr. Anja Lehmann IBM Research Zurich

Privacy-ABCs solve this. When Alice authenticates to the Movie Streaming Service with Privacy-ABCs, all the service learns is that Alice and no more. has a subscription & is older than 12 Sure, if you have subscription & are older than 12 Movie Streaming Service 11 Dr. Anja Lehmann IBM Research Zurich

Privacy-protecting authentication with Privacy-ABCs Like PKI but does not send credential minimal attribute disclosure Alice valid subscription eid with age 12 Privacy-ABC eid & voucher Movie Streaming Service 12 Dr. Anja Lehmann IBM Research Zurich

Privacy-protecting authentication with Privacy-ABCs Like PKI but does not send credential minimal attribute disclosure Aha, you have subscription & are older than 12...enjoy the movie! Alice Privacy-ABC presentation token Movie Streaming Service 13 Dr. Anja Lehmann IBM Research Zurich

Let's watch a movie then! 14 Dr. Anja Lehmann IBM Research Zurich

ABC4Trust and the cloud helping Issuers and Service Provider to use Privacy-ABCs 15 Dr. Anja Lehmann IBM Research Zurich

ABC4Trust and the cloud request resource application layer Credential Wallet Browser/ Application presentation policy presentation token Application Access Control Engine policy layer User ABC Engine policy credential matcher storage Verifier ABC Engine policy token matcher storage evidence generation orchestration credential mgr evidence verification orchestration token mgr crypto layer Crypto Engine (e.g. Idemix) Sig Enc Com ZKP Crypto Engine (e.g. Idemix) Sig Enc Com ZKP all running in the cloud as a service 16 Dr. Anja Lehmann IBM Research Zurich

ABC4Trust and the cloud request resource application layer Credential Wallet Browser/ Application presentation policy presentation token Application Access Control Engine policy layer User ABC Engine policy credential matcher storage Verifier ABC Engine policy token matcher storage evidence generation orchestration credential mgr evidence verification orchestration token mgr crypto layer Crypto Engine (e.g. Idemix) Sig Enc Com ZKP Crypto Engine (e.g. Idemix) Sig Enc Com ZKP all running in the cloud as a service 17 Dr. Anja Lehmann IBM Research Zurich

Benefits of running ABC4Trust services in the cloud Cloud services reduce the complexity for Issuer and Verifier No complex installation and configuration of the ABC4Trust components No maintenance Cloud offers tools to simplify service integration, e.g.: Issuer: Interface to LDAP etc. credential specs can be derived automatically Service Provider: Integration tools for access control, MySQL, preconfigured PKI Issuance as a Service Verification as a Service 18 Dr. Anja Lehmann IBM Research Zurich

Benefits of running ABC4Trust services in the cloud Relying on cloud/web services is already common deployment model Use of external service for authorization is common practice (e.g. Facebook login) simple integration/migration Small business often rely on cloud infrastructure anyway Issuer and Verifier could run their own cloud Issuance as a Service Verification as a Service 19 Dr. Anja Lehmann IBM Research Zurich

Drawbacks of running ABC4Trust services in the cloud Cloud provider learn user attributes during issuance and verification But Privacy-ABCs already help to minimize the revealed information (less PII) No need for single provider as in OpenID/Facebook Multiple issuance/verification services reduce trust requirements Issuance as a Service Verification as a Service 20 Dr. Anja Lehmann IBM Research Zurich

ABC4Trust and the cloud request resource application layer Credential Wallet Browser/ Application presentation policy presentation token Application Access Control Engine policy layer User ABC Engine policy credential matcher storage Verifier ABC Engine policy token matcher storage evidence generation orchestration credential mgr evidence verification orchestration token mgr crypto layer Crypto Engine (e.g. Idemix) Sig Enc Com ZKP Crypto Engine (e.g. Idemix) Sig Enc Com ZKP all running in the cloud as a service 21 Dr. Anja Lehmann IBM Research Zurich

ABC4Trust and the cloud request resource application layer Credential Wallet Browser/ Application presentation policy presentation token Application Access Control Engine policy layer User ABC Engine policy credential matcher storage Verifier ABC Engine policy token matcher storage evidence generation orchestration credential mgr evidence verification orchestration token mgr crypto layer Crypto Engine (e.g. Idemix) Sig Enc Com ZKP Crypto Engine (e.g. Idemix) Sig Enc Com ZKP web-based user wallet all running in the cloud as a service 22 Dr. Anja Lehmann IBM Research Zurich

Web-based user wallet Benefits: No dedicated software needed access via Browser Credentials can be used from multiple devices User has choice of whom to trust no need for single entity as in OpenID Drawbacks: User has to trust the wallet provider with all data Verifier has to trust wallet provider to properly protect credential access Wallet on user device (e.g. phone) still preferable! Issuance as a Service User Wallet Verification as a Service 23 Dr. Anja Lehmann IBM Research Zurich

Summary Cloud is just a deployment model that makes integration easier helps to get Privacy-ABCs started and privacy & security is better than with currently used mechanisms Demo: idemixdemo.zurich.ibm.com Twitter Chat 28 January at 16:00 CET (Data Privacy Day) How: You just need a Twitter handle and use #identitymixer What: Live discussion & exciting news about Identity Mixer email Anja Lehmann: anj@zurich.ibm.com Jan Camenisch: jca@zurich.ibm.com Links www.zurich.ibm.com/idemix www.abc4trust.eu 24 Dr. Anja Lehmann IBM Research Zurich