Abstract
Today, user attributes are managed at centralized identity providers. However, two centralized identity providers dominate digital identity and access management on the web. This is increasingly becoming a privacy problem in times of mass surveillance and data mining for targeted advertisement. Existing systems for attribute sharing or credential presentation either rely on a trusted third party service or require the presentation to be online and synchronous. In this paper we propose a concept that allows the user to manage and share his attributes asynchronously with a requesting party using a secure, decentralized name system.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
http://www.gigya.com/blog/the-landscape-of-customer-identity-q2-2015/, accessed 2016/02/20.
- 2.
https://nameid.org, accessed 2016/02/20.
- 3.
https://namecoin.info/, accessed 2016/02/23.
- 4.
- 5.
- 6.
References
Brown, D.: Standards for efficient cryptography, sec 1: elliptic curve cryptography. Released Stan. Version 1, 2 (2009)
Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 21–30. ACM (2002)
French data protection authority. Decision no. 2016–007 of January 26, 2016 issuing formal notice to FACEBOOK INC. and FACEBOOK IRELAND, January 2016
Gola, P., Schomerus, R., Klug, C.: BDSG-: Bundesdatenschutzgesetz: Kommentar. Beck, Mnchen, 8. berarbeitete und ergnzte auflage edition (2005)
Hardjono, T.: User-managed access (uma) profile of oauth 2.0, December 2015. https://docs.kantarainitiative.org/uma/draft-uma-core.html
Jones, M., Bradley, J., Sakimura, N.: Json web token (jwt). RFC 7519, RFC Editor, May 2015. http://www.rfc-editor.org/rfc/rfc7519.txt
Jones, M., Hardt, D.: The oauth 2.0 authorization framework: Bearer token usage. RFC 6750, RFC Editor, October 2012. http://www.rfc-editor.org/rfc/rfc6750.txt
Lowe, G.: Casper: A compiler for the analysis of security protocols. J. Comput. Secur. 6(1,2), 53–84 (1998)
Rivest, R.L., Lampson, B.: Sdsi-a simple distributed security infrastructure. In: Crypto (1996)
Sakimura, N., Bradley, J., Jones, M., de Medeiros, B., Mortimore, C.: OpenID Connect Core 1.0 incorporating errata set 1. Technical report, November 2014
Wachs, M., Schanzenbach, M., Grothoff, C.: A censorship-resistant, privacy-enhancing and fully decentralized name system. In: Gritzalis, D., Kiayias, A., Askoxylakis, I. (eds.) CANS 2014. LNCS, vol. 8813, pp. 127–142. Springer, Heidelberg (2014)
Wachs, M., Schanzenbach, M., Grothoff, C.: On the feasibility of a censorship resistant decentralized name system. In: Danger, J.-L., Debbabi, M., Marion, J.-Y., Garcia-Alfaro, J., Heywood, N.Z. (eds.) FPS 2013. LNCS, vol. 8352, pp. 19–30. Springer, Heidelberg (2014)
Acknowledgment
This work has been partially funded in the project PARADISE by the German Federal Ministry of Education and Research under the reference 16KIS0422.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
A Appendix - Casper Sources
A Appendix - Casper Sources
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Schanzenbach, M., Banse, C. (2016). Managing and Presenting User Attributes over a Decentralized Secure Name System. In: Livraga, G., Torra, V., Aldini, A., Martinelli, F., Suri, N. (eds) Data Privacy Management and Security Assurance. DPM QASA 2016 2016. Lecture Notes in Computer Science(), vol 9963. Springer, Cham. https://doi.org/10.1007/978-3-319-47072-6_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-47072-6_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47071-9
Online ISBN: 978-3-319-47072-6
eBook Packages: Computer ScienceComputer Science (R0)