Skip to main content

Privacy-ABCs to Leverage Identity Management as a Service

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8450))

Abstract

Along with the rapid growth in adoption of cloud services, there have been developments towards a new emerging concept, called Identity Management as a Service. As the internal IT systems were not designed for externals, the IT solutions from the cloud can solve the challenges of connecting the enterprises to the outer world and consequently, bring all the benefits of the cloud-based services to them.

However, the other side of the coin of moving towards outsourcing identity infrastructure is a set of privacy and security challenges that cannot be neglected. In this paper, we propose an architectural model based on Privacy Preserving Attribute-based Credentials, and show how we can benefit from the advantages of Privacy-ABCs to help the concept of Identity Management as a Service, and address the privacy concerns that it raises.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The NIST Definition of Cloud Computing, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf

  2. Harms, R., Yamartino, M.: The economics of the Cloud, http://www.microsoft.com/en-us/news/presskits/cloud/docs/the-economics-of-the-cloud.pdf

  3. The adoption of cloud-based services, http://www.ca.com/es/media/files/industryanalystreports/the-adoption-of-cloud-based-services-increasing-confidence-through-effective-security.pdf

  4. Office 365, http://www.office365.com/

  5. Google Apps, http://www.google.com/apps

  6. The future of cloud computing, 3rd annual survey (2013), http://www.northbridge.com/2013-cloud-computing-survey

  7. Gopalakrishnan, A.: Cloud computing identity management. SETLabs briefings 7(7), 45–54 (2009)

    Google Scholar 

  8. Digital identities and the open business, http://www.ca.com/cn//media/files/industryresearch/quocirca-digital-identities.pdf

  9. Alliance, C.: Security guidance for critical areas of focus in cloud computing v3. 0. Cloud Security Alliance (2011)

    Google Scholar 

  10. Nunez, D., Agudo, I., Lopez, J.: Integrating openid with proxy re-encryption to enhance privacy in cloud-based identity services. In: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 241–248 (2012)

    Google Scholar 

  11. Brodkin, J.: Gartner: Seven cloud-computing security risks (2008)

    Google Scholar 

  12. Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), pp. 693–702 (2010)

    Google Scholar 

  13. Takabi, H., Joshi, J., Ahn, G.-J.: Security and privacy challenges in cloud computing environments. IEEE Security Privacy 8(6), 24–31 (2010)

    Article  Google Scholar 

  14. Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Ben Othmane, L., Lilien, L.: An entity-centric approach for privacy and identity management in cloud computing. In: 2010 29th IEEE Symposium on Reliable Distributed Systems, pp. 177–183. IEEE (2010)

    Google Scholar 

  15. Architecture serving complex Identity Infrastructures, http://www.trustindigitallife.eu/actor/tdl-publications.html

  16. Chow, S., He, Y.-J., Hui, L., Yiu, S.: Spice simple privacy-preserving identity-management for cloud environment. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 526–543. Springer, Heidelberg (2012), http://dx.doi.org/10.1007/978-3-642-31284-7_31

    Chapter  Google Scholar 

  17. Bertino, E., Paci, F., Ferrini, R., Shang, N.: Privacy-preserving digital identity management for cloud computing. IEEE Data Eng. Bull. 32(1), 21–27 (2009)

    Google Scholar 

  18. Sabouri, A., Krontiris, I., Rannenberg, K.: Attribute-based credentials for trust (ABC4Trust). In: Fischer-Hübner, S., Katsikas, S., Quirchmayr, G. (eds.) TrustBus 2012. LNCS, vol. 7449, pp. 218–219. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  19. Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84–90 (1981)

    Article  Google Scholar 

  20. Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable proofs and delegatable anonymous credentials. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 108–125. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  21. Brands, S.A.: Rethinking public key infrastructures and digital certificates: building in privacy. MIT Press (2000)

    Google Scholar 

  22. Camenisch, J.L., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  23. Camenisch, J.L., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56–72. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  24. Camenisch, J., Dubovitskaya, M., Lehmann, A., Neven, G., Paquin, C., Preiss, F.-S.: Concepts and languages for privacy-preserving attribute-based authentication (2013)

    Google Scholar 

  25. Microsoft U-Prove, http://www.microsoft.com/uprove

  26. Identity Mixer, http://idemix.wordpress.com/

  27. D2.1 Architecture for Attribute-based Credential Technologies Version 1, https://abc4trust.eu/download/ABC4Trust-D2.1-Architecture-V1.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Sabouri, A., Bjones, R. (2014). Privacy-ABCs to Leverage Identity Management as a Service. In: Preneel, B., Ikonomou, D. (eds) Privacy Technologies and Policy. APF 2014. Lecture Notes in Computer Science, vol 8450. Springer, Cham. https://doi.org/10.1007/978-3-319-06749-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06749-0_10

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06748-3

  • Online ISBN: 978-3-319-06749-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics