Skip to main content

A Practical Approach to Identity on Digital Ecosystems Using Claim Verification and Trust

  • Conference paper
Digital Ecosystems (OPAALS 2010)

Abstract

Central to the ethos of digital ecosystems (DEs) is that DEs should be distributed and have no central points of failure or control. This essentially mandates a decentralised system, which poses significant challenges for identity. Identity in decentralised environments must be treated very differently to identity in traditional environments, where centralised naming, authentication and authorisation can be assumed, and where identifiers can be considered global and absolute. In the absence of such guarantees we have expanded on the OPAALS identity model to produce a general implementation for the OPAALS DE that uses a combination of identity claim verification protocols and trust to give assurances in place of centralised servers. We outline how the components of this implementation function and give an illustrated workflow of how identity issues are solved on the OPAALS DE in practice.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. OpenSAML v2.0, https://spaces.internet2.edu/display/OpenSAML/Home

  2. Briscoe, G.: Digital Ecosystems. Ph.D. thesis, Imperial College London (2009)

    Google Scholar 

  3. Briscoe, G., De Wilde, P.: Digital Ecosystems: Evolving service-oriented architectures. In: Conference on Bio Inspired Models of Network, Information and Computing Systems. IEEE Press, Los Alamitos (2006), http://arxiv.org/abs/0712.4102

    Google Scholar 

  4. Cameron, K.: The laws of identity, http://www.identityblog.com/?p=354

  5. Damiani, E., di Vimercati, S.D.C., Samarati, P.: Managing multiple and depend¬able identities. IEEE Internet Computing 7(6), 29–37 (2003)

    Article  Google Scholar 

  6. Glasser, U., Vajihollahi, M.: Identity management architecture. In: IEEE International Conference on Intelligence and Security Informatics ISI 2008, pp. 137–144 (2008)

    Google Scholar 

  7. Halperin, R., Backhouse, J.: A roadmap for research on identity in the information society. Identity in the Information Society (2008)

    Google Scholar 

  8. Hansen, M., Berlich, P., Camenisch, J., Clau, S., Pfitzmann, A., Waidner, M.: Privacy-enhancing identity management. Information Security Technical Report 9(1), 35–44 (2004)

    Article  Google Scholar 

  9. Ion, M., Danzi, A., Koshutanski, H., Telesca, L.: A peer-to-peer multidimensional trust model for digital ecosystems. In: 2nd IEEE International Conference on Digital Ecosystems and Technologies, DEST 2008, pp. 461–469 (2008)

    Google Scholar 

  10. Jøsang, A.: Trust and reputation systems. In: Foundations of Security Analysis and Design IV (2007)

    Google Scholar 

  11. Jøsang, A., Fabre, J., Hay, B., Dalziel, J., Pope, S.: Trust requirements in identity management. In: Proceedings of the 2005 Australasian workshop on Grid computing and e-research, vol. 44, pp. 99–108. Australian Computer Society, Inc., Newcastle (2005)

    Google Scholar 

  12. Jøsang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Proceedings of the 29th Australasian Computer Science Conference, vol. 48, pp. 85–94. Australian Computer Society, Inc., Hobart (2006)

    Google Scholar 

  13. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007); emerging Issues in Collaborative Commerce

    Article  Google Scholar 

  14. Jøsang, A., Pope, S.: Semantic constraints for trust transitivity. In: Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling, vol. 43, pp. 59–68. Australian Computer Society, Inc., Newcastle (2005)

    Google Scholar 

  15. Jøsang, A., Pope, S.: User centric identity management. In: Asia Pacific Information Technology Security Conference, AusCERT2005, Australia, pp. 77–89 (2005)

    Google Scholar 

  16. Koshutanski, H., Ion, M., Telesca, L.: Distributed identity management model for digital ecosystems. In: The International Conference on Emerging Security Information, Systems, and Technologies, SecureWare 2007, pp. 132–138 (2007)

    Google Scholar 

  17. Maler, E., Reed, D.: The venn of identity - options and issues in federated identity management. IEEE Security & Privacy 6(2), 16–23 (2008)

    Article  Google Scholar 

  18. Maliki, T.E., Seigneur, J.: A survey of user-centric identity management technologies. In: The International Conference on Emerging Security Information, Systems, and Technologies, SecureWare 2007, pp. 12–17 (2007)

    Google Scholar 

  19. Marti, S., Garcia-Molina, H.: Taxonomy of trust: Categorizing P2P reputation systems. Computer Networks 50(4), 472–484 (2006) (management in Peer-to-Peer Systems), http://www.sciencedirect.com/science/article/B6VRG-4H0RYYJ-1/2/b6a612053c7546bd311548c2b642c541

    Article  MATH  Google Scholar 

  20. McGibney, J., Botvich, D.: Distributed dynamic protection of services on ad hoc and p2p networks. In: Medhi, D., Nogueira, J.M.S., Pfeifer, T., Wu, S.F. (eds.) IPOM 2007. LNCS, vol. 4786, pp. 33–43. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  21. McLaughlin, M., Malone, P., Jennings, B.: A model for identity in digital ecosystems. In: Proceedings of the 3rd International Conference on Digital Ecosystems and Technologies (DEST), IEEE, Waterford Institute of Technology, Waterford, Ireland (2009)

    Google Scholar 

  22. Mello, E.R.D., Moorsel, A.V., Silva, J.D.: Evaluation of P2P search algorithms for discovering trust paths. In: Wolter, K. (ed.) EPEW 2007. LNCS, vol. 4748, pp. 112–124. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  23. Nachira, F.: Towards a network of digital business ecosystems fostering the local development. Tech. rep., Bruxelles (September 2002)

    Google Scholar 

  24. Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity, and identity management a consolidated proposal for terminology. version 0.26 (2005)

    Google Scholar 

  25. Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artificial Intelligence Review 24(1), 33–60 (2005), http://dx.doi.org/10.1007/s10462-004-0041-5

    Article  MATH  Google Scholar 

  26. Weitzner, D.: Whose name is it, anyway? decentralized identity systems on the web. IEEE Internet Computing 11(4), 72–76 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

McLaughlin, M., Malone, P. (2010). A Practical Approach to Identity on Digital Ecosystems Using Claim Verification and Trust. In: Antonio Basile Colugnati, F., Lopes, L.C.R., Barretto, S.F.A. (eds) Digital Ecosystems. OPAALS 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 67. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14859-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14859-0_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14858-3

  • Online ISBN: 978-3-642-14859-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics