Skip to main content

A Privacy Risk Analysis of Identity Federation Topologies in Single Sign-On (SSO) Web Domain

  • Conference paper
  • First Online:
Distributed Computing and Artificial Intelligence, Special Sessions I, 20th International Conference (DCAI 2023)

Abstract

Single Sign-On (SSO) allows users to authenticate once and gain access to different web services. Thus, users do not need to provide their credential information again. Three main entities are involved in the SSO: the user, Identity Provider (IdP), and Service Provider (SP) or Relying Party (RP). These entities are linked through different relationships under various IdP-SP association models, mainly decentralized, explicit, federated, and bridge. Utilizing SSO under these models or their overlapping in a specific context raises various privacy risks for all entities involved. This paper identifies a set of privacy requirements and outlines the privacy risks for the involved entities in simple SSO scenario and topologies. With regard to topology, it is vital to consider a combination of different association models with respect to privacy requirements. To address the common privacy risks with a focus on user identities, attributes, and changing behavior, the present study proposes a fuzzification system to infer the user’s privacy risk during both the authentication and access processes under semi-honest and malicious models. Analyzing privacy risks is crucial in ensuring the web cloud environment’s security as it helps reduce the likelihood of attacks and identify potential vulnerabilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alaca, F., Oorschot, P.C.V.: Comparative analysis and framework evaluating web single sign-on systems. ACM Comput. Surv. (CSUR) 53(5), 1–34 (2020)

    Article  Google Scholar 

  2. Anthonysamy, P., Rashid, A., Chitchyan, R.: Privacy requirements: present & future. In: 2017 IEEE/ACM 39th International Conference on Software Engineering: Software Engineering in Society Track (ICSE-SEIS), pp. 13–22. IEEE (2017)

    Google Scholar 

  3. Arias-Cabarcos, P., Almenárez-Mendoza, F., Marín-López, A., Díaz-Sánchez, D., Sánchez-Guerrero, R.: A metric-based approach to assess risk for “on cloud’’ federated identity management. J. Netw. Syst. Manag. 20, 513–533 (2012)

    Article  Google Scholar 

  4. Atlam, H.F., Azad, M.A., Alassafi, M.O., Alshdadi, A.A., Alenezi, A.: Risk-based access control model: a systematic literature review. Future Internet 12(6), 103 (2020)

    Article  Google Scholar 

  5. Azimi, S.R., Nikraz, H., Yazdani-Chamzini, A.: Landslide risk assessment by using a new combination model based on a fuzzy inference system method. KSCE J. Civ. Eng. 22, 4263–4271 (2018)

    Article  Google Scholar 

  6. Boehm, B.W.: Software risk management: principles and practices. IEEE Softw. 8(1), 32–41 (1991)

    Article  Google Scholar 

  7. Brown, A.J.: “Should I stay or should I leave?”: exploring (dis) continued Facebook use after the Cambridge analytica scandal. Soc. Media+ Soc. 6(1), 2056305120913884 (2020)

    Google Scholar 

  8. Grüner, A., Mühle, A., Gayvoronskaya, T., Meinel, C.: A comparative analysis of trust requirements in decentralized identity management. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds.) AINA 2019. AISC, vol. 926, pp. 200–213. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-15032-7_18

    Chapter  Google Scholar 

  9. Hazay, C., Lindell, Y.: A note on the relation between the definitions of security for semi-honest and malicious adversaries. Cryptology ePrint Archive (2010)

    Google Scholar 

  10. Kumar, R., Bhatia, M.: A systematic review of the security in cloud computing: data integrity, confidentiality and availability. In: 2020 IEEE International Conference on Computing, Power and Communication Technologies (GUCON), pp. 334–337. IEEE (2020)

    Google Scholar 

Download references

Acknowledgments

We acknowledge the support of the Natural Sciences and Engineering Research Council of Canada (NSERC [funding reference number 03181]).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Reem Al-Saidi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Al-Saidi, R., Kobti, Z. (2023). A Privacy Risk Analysis of Identity Federation Topologies in Single Sign-On (SSO) Web Domain. In: Mehmood, R., et al. Distributed Computing and Artificial Intelligence, Special Sessions I, 20th International Conference. DCAI 2023. Lecture Notes in Networks and Systems, vol 741. Springer, Cham. https://doi.org/10.1007/978-3-031-38318-2_37

Download citation

Publish with us

Policies and ethics