Towards Privacy-Preserving and User-Centric Identity Management as a Service

Pritam Dash, Christof Rabensteiner, Felix Hörandner, Simon Roth

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

Identification, authentication and the exchange of users’ identity information are key factors
in protecting access to online services. Especially cost-effectiveness is a considerable incentive to
move identity management models into the public cloud. As cloud environments are not fully trusted,
the users’ sensitive attributes must not be stored or transmitted in plain, while it still has to be possible
to share them. One approach is to employ proxy re-encryption, which enables the identity provider to
transform a user’s encrypted attributes into ciphertext for an authorized service provider. However,
for adoption, the user’s perspective must not be neglected. In this paper, we propose a user-friendly
and user-centric identity management solution that employs cryptographic mechanisms to protect the
users’ privacy and keep them in control of the data sharing process. We integrate proxy re-encryption
into the widely-adopted OpenID Connect protocol to achieve end-to-end confidentiality. To make this
concept user-friendly, we introduce a mobile app that handles the involved cryptographic operations
which rely on keys securely stored in a trusted execution environment.
Original languageEnglish
Title of host publicationOpen Identity Summit 2017
PublisherGesellschaft für Informatik e.V.
ISBN (Print)978-3-88579-671-8
Publication statusPublished - 2017

Keywords

  • Identity Management
  • OpenID Connect
  • Trusted Execution Environment
  • Cloud computing
  • Mobile application
  • proxy re-encryption

Fingerprint

Dive into the research topics of 'Towards Privacy-Preserving and User-Centric Identity Management as a Service'. Together they form a unique fingerprint.

Cite this