Abstract
Managing digital identity documents with a proper privacy protection is of pivotal importance to construct trustworthy Internet. As far as the amount of digital identities is expanding at an accelerating rate, content-centric model provides administration capabilities of data transfer. We propose an innovative approach and implementation of privacy-aware Content-Centric Internetworking (CCN)-based of federated digital identity. Privacy requirements related to identity are translated with user-centric federated digital identity parlance into a set of eleven rules. CCN has been enforced by respecting a set of rules, designing a data packet and creating an identity contract. We provide an implementation of privacy-aware CCN data packet that is bound to XML-based digital identity document. We explain that the forwarding engine verifies the validity of digital identity document transmission on the basis of identity contract terms. Three use cases are presented to detail the proposed approach with the corresponding UML sequence diagrams.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Blefari-Melazzi, N., et al. (eds.): Trustworthy Internet (2011)
Joshi, R.: Data-Centric Architecture: A Model for the Era of Big Data (2011)
Palfrey, J., Gasser, U.: Born Digital: Understanding the first generation of digital natives. Basic Books (2008)
Benantar, M.: Access Control Systems: Security, Identity Management and Trust Models. Springer Science + Business Media (2006)
Ben Ayed, G., Sifi, S., Becha Kaanich, M.: Towards Building Weak Links between Persistent Digital Identity Documents: MetaEngine and Distance to Make Identity Less Visible. In: Ariwa, E., El-Qawasmeh, E. (eds.) DEIS 2011. CCIS, vol. 194, pp. 676–690. Springer, Heidelberg (2011)
U. Nations. The Universal Declaration of Human Rights (1948)
The Office of the United Nations High Commissioner for Human Rights. International Covenant on Civil and Political Rights (1966)
European Union. The Charter of Fundamental Rights of the European Union (2000)
Center for Democracy & Technology. Privacy Principles for Identity in the Digital Age (2007)
Organization for Economic Co-operation and Development (OECD). Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (1980)
Organization for Economic Co-operation and Development (OECD). At Crossroads: Personhood and Digital Identity in the Information Society. The Working Paper series of the OECD Directorate for Science, Technology and Industry (2008)
Ben Ayed, G., Ghernaouti-Hélie, S.: Privacy Requirements Specification for Digital Identity Management Systems Implementation: Towards a digital society of privacy. In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE (2011)
Organisation for Economic Co-operation and Development. The Role of Digital Identity Management in the Internet Economy: A primer for policy makers (2009)
Norfolk, D.: The Data-Centric World, ed: Bloor (2011)
Meyer, D., et al.: Report from the IAB Workshop on Routing and Addressing (RFC 4984) (2007)
Clark, D., et al.: Addressing Reality: An architectural response to real world demands on the evolving internet. In: ACM SIGCOMM Conference - Workshop on Future Directions in Network Architecture, FDNA 2003, Germany (2003)
Handley, M., Greenhalgh, A.: Steps Towards a Dos-Resistant Internet Architecture. In: ACM SIGCOMM Conference - Workshop on Future Directions in Network Architecture, FDNA 2003, USA (2004)
Jacobson, V.: If a Clean Slate is the Solution What Was the Problem. In: Stanford Clean Slate Seminar (2006)
Koponen, T., et al.: A Data-Oriented (and beyond) Network Architecture. In: 2007 ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Kyoto, Japan (2007)
Jokela, P., et al.: LIPSIN: Line Speeds Publish/Subscribe Inter-Networking. In: ACM SIGCOMM Conference on Data Communication, USA (2009)
Ahlgren, B., et al.: 4WARD EU FP7 Project (Deliverable D-6.2 v2.0) (2010)
Stoica, I., et al.: CHORD: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications. In: 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, USA (2001)
Jacobson, V., et al.: Networking Named Content. In: The 5th International Conference on Emerging Networking Experiments and Technologies, ACM CoNEXT 2009, pp. 1–12 (2009)
Elabidi, A., et al.: Towards Hiding Federated Digital Identity: Stop-Dissemination Mechanism in Content-Centric Networking. In: The 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, Australia (2011)
Arianfar, S., et al.: On Preserving Privacy in Content-Oriented Networks. In: ACM SIGCOMM Workshop on Information-Centric Networking, ICN 2011, Toronto, Ontario, Canada (2011)
PARC (Xeros). CCNx Project (relase 0.3.0) (2010)
Shadbolt, N., Berners-Lee, T.: Web Science Emerges Scientific Amercican Magazine, 76–81 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Abidi, A., Ayed, G.B., Kamoun, F. (2012). Towards Constructing a Trustworthy Internet: Privacy-Aware Transfer of Digital Identity Document in Content Centric Internetworking. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-34135-9_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34134-2
Online ISBN: 978-3-642-34135-9
eBook Packages: Computer ScienceComputer Science (R0)