Abstract
Central to the ethos of digital ecosystems (DEs) is that DEs should be distributed and have no central points of failure or control. This essentially mandates a decentralised system, which poses significant challenges for identity. Identity in decentralised environments must be treated very differently to identity in traditional environments, where centralised naming, authentication and authorisation can be assumed, and where identifiers can be considered global and absolute. In the absence of such guarantees we have expanded on the OPAALS identity model to produce a general implementation for the OPAALS DE that uses a combination of identity claim verification protocols and trust to give assurances in place of centralised servers. We outline how the components of this implementation function and give an illustrated workflow of how identity issues are solved on the OPAALS DE in practice.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
OpenSAML v2.0, https://spaces.internet2.edu/display/OpenSAML/Home
Briscoe, G.: Digital Ecosystems. Ph.D. thesis, Imperial College London (2009)
Briscoe, G., De Wilde, P.: Digital Ecosystems: Evolving service-oriented architectures. In: Conference on Bio Inspired Models of Network, Information and Computing Systems. IEEE Press, Los Alamitos (2006), http://arxiv.org/abs/0712.4102
Cameron, K.: The laws of identity, http://www.identityblog.com/?p=354
Damiani, E., di Vimercati, S.D.C., Samarati, P.: Managing multiple and depend¬able identities. IEEE Internet Computing 7(6), 29–37 (2003)
Glasser, U., Vajihollahi, M.: Identity management architecture. In: IEEE International Conference on Intelligence and Security Informatics ISI 2008, pp. 137–144 (2008)
Halperin, R., Backhouse, J.: A roadmap for research on identity in the information society. Identity in the Information Society (2008)
Hansen, M., Berlich, P., Camenisch, J., Clau, S., Pfitzmann, A., Waidner, M.: Privacy-enhancing identity management. Information Security Technical Report 9(1), 35–44 (2004)
Ion, M., Danzi, A., Koshutanski, H., Telesca, L.: A peer-to-peer multidimensional trust model for digital ecosystems. In: 2nd IEEE International Conference on Digital Ecosystems and Technologies, DEST 2008, pp. 461–469 (2008)
Jøsang, A.: Trust and reputation systems. In: Foundations of Security Analysis and Design IV (2007)
Jøsang, A., Fabre, J., Hay, B., Dalziel, J., Pope, S.: Trust requirements in identity management. In: Proceedings of the 2005 Australasian workshop on Grid computing and e-research, vol. 44, pp. 99–108. Australian Computer Society, Inc., Newcastle (2005)
Jøsang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Proceedings of the 29th Australasian Computer Science Conference, vol. 48, pp. 85–94. Australian Computer Society, Inc., Hobart (2006)
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007); emerging Issues in Collaborative Commerce
Jøsang, A., Pope, S.: Semantic constraints for trust transitivity. In: Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling, vol. 43, pp. 59–68. Australian Computer Society, Inc., Newcastle (2005)
Jøsang, A., Pope, S.: User centric identity management. In: Asia Pacific Information Technology Security Conference, AusCERT2005, Australia, pp. 77–89 (2005)
Koshutanski, H., Ion, M., Telesca, L.: Distributed identity management model for digital ecosystems. In: The International Conference on Emerging Security Information, Systems, and Technologies, SecureWare 2007, pp. 132–138 (2007)
Maler, E., Reed, D.: The venn of identity - options and issues in federated identity management. IEEE Security & Privacy 6(2), 16–23 (2008)
Maliki, T.E., Seigneur, J.: A survey of user-centric identity management technologies. In: The International Conference on Emerging Security Information, Systems, and Technologies, SecureWare 2007, pp. 12–17 (2007)
Marti, S., Garcia-Molina, H.: Taxonomy of trust: Categorizing P2P reputation systems. Computer Networks 50(4), 472–484 (2006) (management in Peer-to-Peer Systems), http://www.sciencedirect.com/science/article/B6VRG-4H0RYYJ-1/2/b6a612053c7546bd311548c2b642c541
McGibney, J., Botvich, D.: Distributed dynamic protection of services on ad hoc and p2p networks. In: Medhi, D., Nogueira, J.M.S., Pfeifer, T., Wu, S.F. (eds.) IPOM 2007. LNCS, vol. 4786, pp. 33–43. Springer, Heidelberg (2007)
McLaughlin, M., Malone, P., Jennings, B.: A model for identity in digital ecosystems. In: Proceedings of the 3rd International Conference on Digital Ecosystems and Technologies (DEST), IEEE, Waterford Institute of Technology, Waterford, Ireland (2009)
Mello, E.R.D., Moorsel, A.V., Silva, J.D.: Evaluation of P2P search algorithms for discovering trust paths. In: Wolter, K. (ed.) EPEW 2007. LNCS, vol. 4748, pp. 112–124. Springer, Heidelberg (2007)
Nachira, F.: Towards a network of digital business ecosystems fostering the local development. Tech. rep., Bruxelles (September 2002)
Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity, and identity management a consolidated proposal for terminology. version 0.26 (2005)
Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artificial Intelligence Review 24(1), 33–60 (2005), http://dx.doi.org/10.1007/s10462-004-0041-5
Weitzner, D.: Whose name is it, anyway? decentralized identity systems on the web. IEEE Internet Computing 11(4), 72–76 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
McLaughlin, M., Malone, P. (2010). A Practical Approach to Identity on Digital Ecosystems Using Claim Verification and Trust. In: Antonio Basile Colugnati, F., Lopes, L.C.R., Barretto, S.F.A. (eds) Digital Ecosystems. OPAALS 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 67. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14859-0_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-14859-0_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14858-3
Online ISBN: 978-3-642-14859-0
eBook Packages: Computer ScienceComputer Science (R0)