Skip to main content

Towards Constructing a Trustworthy Internet: Privacy-Aware Transfer of Digital Identity Document in Content Centric Internetworking

  • Conference paper
Recent Trends in Computer Networks and Distributed Systems Security (SNDS 2012)

Abstract

Managing digital identity documents with a proper privacy protection is of pivotal importance to construct trustworthy Internet. As far as the amount of digital identities is expanding at an accelerating rate, content-centric model provides administration capabilities of data transfer. We propose an innovative approach and implementation of privacy-aware Content-Centric Internetworking (CCN)-based of federated digital identity. Privacy requirements related to identity are translated with user-centric federated digital identity parlance into a set of eleven rules. CCN has been enforced by respecting a set of rules, designing a data packet and creating an identity contract. We provide an implementation of privacy-aware CCN data packet that is bound to XML-based digital identity document. We explain that the forwarding engine verifies the validity of digital identity document transmission on the basis of identity contract terms. Three use cases are presented to detail the proposed approach with the corresponding UML sequence diagrams.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blefari-Melazzi, N., et al. (eds.): Trustworthy Internet (2011)

    Google Scholar 

  2. Joshi, R.: Data-Centric Architecture: A Model for the Era of Big Data (2011)

    Google Scholar 

  3. Palfrey, J., Gasser, U.: Born Digital: Understanding the first generation of digital natives. Basic Books (2008)

    Google Scholar 

  4. Benantar, M.: Access Control Systems: Security, Identity Management and Trust Models. Springer Science + Business Media (2006)

    Google Scholar 

  5. Ben Ayed, G., Sifi, S., Becha Kaanich, M.: Towards Building Weak Links between Persistent Digital Identity Documents: MetaEngine and Distance to Make Identity Less Visible. In: Ariwa, E., El-Qawasmeh, E. (eds.) DEIS 2011. CCIS, vol. 194, pp. 676–690. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  6. U. Nations. The Universal Declaration of Human Rights (1948)

    Google Scholar 

  7. The Office of the United Nations High Commissioner for Human Rights. International Covenant on Civil and Political Rights (1966)

    Google Scholar 

  8. European Union. The Charter of Fundamental Rights of the European Union (2000)

    Google Scholar 

  9. Center for Democracy & Technology. Privacy Principles for Identity in the Digital Age (2007)

    Google Scholar 

  10. Organization for Economic Co-operation and Development (OECD). Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (1980)

    Google Scholar 

  11. Organization for Economic Co-operation and Development (OECD). At Crossroads: Personhood and Digital Identity in the Information Society. The Working Paper series of the OECD Directorate for Science, Technology and Industry (2008)

    Google Scholar 

  12. Ben Ayed, G., Ghernaouti-Hélie, S.: Privacy Requirements Specification for Digital Identity Management Systems Implementation: Towards a digital society of privacy. In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE (2011)

    Google Scholar 

  13. Organisation for Economic Co-operation and Development. The Role of Digital Identity Management in the Internet Economy: A primer for policy makers (2009)

    Google Scholar 

  14. Norfolk, D.: The Data-Centric World, ed: Bloor (2011)

    Google Scholar 

  15. Meyer, D., et al.: Report from the IAB Workshop on Routing and Addressing (RFC 4984) (2007)

    Google Scholar 

  16. Clark, D., et al.: Addressing Reality: An architectural response to real world demands on the evolving internet. In: ACM SIGCOMM Conference - Workshop on Future Directions in Network Architecture, FDNA 2003, Germany (2003)

    Google Scholar 

  17. Handley, M., Greenhalgh, A.: Steps Towards a Dos-Resistant Internet Architecture. In: ACM SIGCOMM Conference - Workshop on Future Directions in Network Architecture, FDNA 2003, USA (2004)

    Google Scholar 

  18. Jacobson, V.: If a Clean Slate is the Solution What Was the Problem. In: Stanford Clean Slate Seminar (2006)

    Google Scholar 

  19. Koponen, T., et al.: A Data-Oriented (and beyond) Network Architecture. In: 2007 ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Kyoto, Japan (2007)

    Google Scholar 

  20. Jokela, P., et al.: LIPSIN: Line Speeds Publish/Subscribe Inter-Networking. In: ACM SIGCOMM Conference on Data Communication, USA (2009)

    Google Scholar 

  21. Ahlgren, B., et al.: 4WARD EU FP7 Project (Deliverable D-6.2 v2.0) (2010)

    Google Scholar 

  22. Stoica, I., et al.: CHORD: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications. In: 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, USA (2001)

    Google Scholar 

  23. Jacobson, V., et al.: Networking Named Content. In: The 5th International Conference on Emerging Networking Experiments and Technologies, ACM CoNEXT 2009, pp. 1–12 (2009)

    Google Scholar 

  24. Elabidi, A., et al.: Towards Hiding Federated Digital Identity: Stop-Dissemination Mechanism in Content-Centric Networking. In: The 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, Australia (2011)

    Google Scholar 

  25. Arianfar, S., et al.: On Preserving Privacy in Content-Oriented Networks. In: ACM SIGCOMM Workshop on Information-Centric Networking, ICN 2011, Toronto, Ontario, Canada (2011)

    Google Scholar 

  26. PARC (Xeros). CCNx Project (relase 0.3.0) (2010)

    Google Scholar 

  27. Shadbolt, N., Berners-Lee, T.: Web Science Emerges Scientific Amercican Magazine, 76–81 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Abidi, A., Ayed, G.B., Kamoun, F. (2012). Towards Constructing a Trustworthy Internet: Privacy-Aware Transfer of Digital Identity Document in Content Centric Internetworking. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34135-9_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34134-2

  • Online ISBN: 978-3-642-34135-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics