Skip to main content
Log in

Cross-domain identity and discovery framework for web calling services

  • Published:
Annals of Telecommunications Aims and scope Submit manuscript

Abstract

Cross-domain identity management remains a major challenge for potential WebRTC adopters. In order to provide a global web-based communication system, it is critical to locate the destination called party, map the identity to the user device, and provide mutual authentication for both caller and called party. In this paper, we present a novel identity management and user discovery framework that enables callers to search and locate users across service domains. The identity management is decoupled from the used calling service, allowing users to manage their profiles and credentials independently of the applications. The framework is designed to preserve privacy and exploit web technology to gain trust and contact list management.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. ReTHINK Project Website: https://rethink-project.eu

  2. Apache Lucene Project Website http://lucene.apache.org

References

  1. A Bergkvist, Burnett DC, Jennings C (2015) WebRTC 1.0: real-time communication between browsers, W3C Working Draft, 10 February

  2. Barnes R, Thomson M (2014) Browser-to-browser security assurances for WebRTC. IEEE Internet Comput 18(6):11–17

    Article  Google Scholar 

  3. E Bertin, S Cubaud, S Tuffin, N Crespi, V Beltran (2013) WebRTC, the day after: what’s next for conversational services? International Conference on Intelligence in Next Generation Networks (ICIN 2013)

  4. I Javed et al. (2016) Global identity and reachability framework for interoperable P2P communication services, 19th Conference on Innovations in Clouds, Internet and Networks (ICIN 2016)

  5. S Becot, E Bertin, J Crom, V Frey, S Tuffin (2015) Communication services in the Web era: how can Telco join the OTT hangout?, International Conference on Intelligence in Next Generation Networks (ICIN 2015)

  6. Lampropoulos K, Sanchez D, Almenares F, Weik P, Denazis S (2010) Introducing a cross federation identity solution for converged network environments, principles, systems and applications of IP Telecommunications (IPTComm ‘10). ACM, New York, pp 1–11

    Google Scholar 

  7. Beltran V (2016) Characterization of web single sign-on protocols. IEEE Commun Mag 54(7):24–30

    Article  Google Scholar 

  8. M Jones and D Hardt (2012) The OAuth 2.0 authorization framework: bearer token usage, IETF RFC6750

  9. N Sakimura, J Bradley, M Jones, B Medeiros, C Mortimore (2014) OpenID connect Core 1.0, The OpenID Foundation

  10. E Rescorla (2016) WebRTC security architecture, IETF internet draft, standards track

  11. Beltran V, Bertin E, Crespi N (2014) User identity for WebRTC services: a matter of trust. IEEE Internet Comput 18(6):18–25

    Article  Google Scholar 

  12. R Copeland (2009) Converging NGN wireline and mobile 3G networks with IMS. CRC Press, Talor & Francis Group, Boca Raton

    Google Scholar 

  13. L Li, W Chou, T Cai, Z Wang, Z Qiu Mirror presence: secure web identity resolution and call control for WebRTC, Proceedings of International Conference on Information Integration and Web-based Applications & Services (IIWAS 2013) ACM, New York, pp 523–532

  14. S Göndör, H Hebbo (2014) SONIC: Towards seamless interaction in heterogeneous distributed OSN ecosystems, IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Larnaca

  15. Cutillo L, Molva R, Strufe T (2009) Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Commun Mag 47(12):94–101

    Article  Google Scholar 

  16. A Bouabdallah Data models and interface specification of the framework, reTHINK project Deliverable. http://dx.doi.org/10.18153/RTH-645342-D2_2.

  17. M Jones, J Bradley, N Sakimura (2015) JSON Web Token (JWT), IETF Standard

  18. J-M Crom (2015) Management and security features specifications, reTHINK project Deliverable http://dx.doi.org/10.18153/RTH-645342-D4_1

  19. I Javed, K Toumi, N Crespi, A Mohammadinejad Br2Br: a vector-based trust framework for WebRTC calling services. IEEE IEEE International Conference on High Performance Computing and Communications (HPCC 2016), 12–14 December, Sydney, Australia

  20. J-M Crom Implementation of governance and identity management components, reTHINK Project Deliverable

  21. I Friese, R Copeland, S Göndör, F Beierle, A Küpper, R Pereir and J-M Crom (2017) Cross-domain discovery of communication peers. Identity mapping and discovery services (IMaDS), IEEE European Conference on Networks and Communications (EuCNC)

  22. S Göndör, F Beierle, S Sharhan, A Küpper (2016) Distributed and domain-independent identity management for user profiles in the SONIC Online Social Network Federation, International Conference on Computational Social Networks, Springer

  23. S Göndör, F Beierle, E Küçükbayraktar, H Hebbo, S Sherhan, A Küpper (2015) Towards migration of user profiles in the SONIC Online Social Network Federation, International Multi-Conference on Computing in the Global Information Technology (ICCGI)

  24. Alliance, Open Mobile (2013) Lightweight machine to machine technical specification. Technical Specification OMA-TS-LightweightM2M-V1

  25. Z Shelby (2012) Constrained RESTful environments (CoRE) link format, IETF standard

  26. R Copeland, K Corre, I Friese, S El Jaouhari (2016) Requirements for trust and privacy in WebRTC peer-to-peer Authentication IETF internet draft

  27. A Cooper et al. (2013) Privacy considerations for Internet protocols, IETF RFC 6973

  28. R Yavatkar, D Pendarakis, R Guerin (1999) A framework for policy-based admission control, IETF RFC 2753

  29. Damianou N, Dulay N, Lupu E, Sloman M (2001) The ponder policy specification language, policies for distributed systems and networks. Springer, Berlin, pp 18–38

    Book  Google Scholar 

  30. D Crockford (2006) JSON: the fat-free alternative to XML, XML 2006 Conference, Boston

  31. F Beierle, S Göndör, A Küpper (2015) Towards a three-tiered social graph in decentralized online social networks, Workshop on Hot Topics in Planet-scale mobile computing and online Social networking (HotPOST ‘15), ACM

  32. Alaggan M, Gambs S, Kermarrec A (2012) BLIP: non-interactive differentially-private similarity computation on bloom filters, symposium on self-stabilizing systems. Springer, Berlin

    Google Scholar 

Download references

Acknowledgements

This work has received funding from the European Union’s Horizon 2020 research and innovation program under grant agreement no. 645342, project reTHINK.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ibrahim Tariq Javed.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Javed, I.T., Copeland, R., Crespi, N. et al. Cross-domain identity and discovery framework for web calling services. Ann. Telecommun. 72, 459–468 (2017). https://doi.org/10.1007/s12243-017-0587-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-017-0587-2

Keywords

Navigation