Federated Identity Management Systems: a Privacy-Based Characterization

Federated Identity Management Systems: a Privacy-Based Characterization

IDENTITY MANAGEMENT SYSTEMS Federated Identity Management Systems: A Privacy-Based Characterization Eleanor Birrell and Fred B. Schneider | Cornell University Identity management systems store attributes associated with users and employ these attributes to facilitate authorization. A privacy-driven taxonomy of design choices found in these systems can help technical experts consulting on public policy relating to identity management. eople use the Internet to manage finances, access implements mechanisms that let users control attribute P employer resources, shop, and communicate. Each release and mechanisms that issue authentication asser- activity involves interacting with a service provider. tions—statements about user attributes. Upon receiv- Such interactions typically require that each user have a ing an authorization request from software executing digital identity. For the most part, each service provider on a user’s behalf, a service provider decides whether stores and manages such identities, which are used to to authorize the user on the basis of the accompanying improve the user’s experience, increase the service pro- authentication assertions. vider’s profits, and defend against certain attacks. Existing work on identity management focuses pri- Prior to the introduction of identity management marily on individual systems, each of which focuses on systems, many believed that practices concerning online one of three general types of functionality: identities were problematic because ■ Single sign-on. These systems issue authentication ■ each service provider maintains a set of user identi- assertions to multiple service providers after a sin- ties, so users have many identities (at least one for gle user authentication. Examples include Passport, each service provider with which they interact), OpenID (http://openid.net), Shibboleth (http:// which becomes a management burden and creates shibboleth.net), and Facebook Single Sign-On. potential points of failure; and ■ Federated identity. These systems manage multiple dis- ■ users aren’t given control over their attributes’ dissemi- tinct identities for a single user and issue authentica- nation, leading to privacy violations and identity theft. tion assertions on the basis of any of these identities. Examples include Project Liberty (http://project Over the past 15 years, identity management sys- liberty.org), Higgins (www.eclipse.org/higgins), tems evolved with the goal of addressing these prob- PRIME (www.prime-project.eu), CardSpace, and lems, although actual mitigation of security concerns Client-Side Federation.2 has been limited by the sparse deployment of such ■ Anonymous credentials. These systems provide authen- systems. Identity management systems enhance secu- tication assertions that don’t reveal the user’s identity rity and convenience by introducing a new party—an to a service provider. Examples include Idemix,3,4 identity provider—that must be trusted to perform cer- U-Prove, and P-IMS.5,6 tain functions. User authentication and identity man- agement are delegated to this identity provider, which In this article, we identify key design choices intrinsic 36 September/October 2013 Copublished by the IEEE Computer and Reliability Societies 1540-7993/13/$31.00 © 2013 IEEE Table 1. Existing identity management systems’ design choices. Passport Liberty Idemix Shibboleth Higgins PRIME OpenID CardSpace U-Prove CS- Federation P-IMS Facebook SSO Interactive ■ ■ ■ ■ ■ Undetectability Active client ■ ■ ■ ■ Credential ■ ■ ■ ■ Centralized ■ ■ Identities Federated ■ ■ Decentralized ■ ■ ■ ■ ■ ■ ■ ■ Identity/ Pseudonymous ■ ■ ■ ? ■ ■ ? ■ ? action Anonymous ■ ■ ? ■ ■ ? ■ ■ Unlinkability Authorization ■ ■ ? ? ? ? ■ ■ ■ ■ Actions request Issue/use ■ ■ ■ ? ■ ? ■ ■ Instance ? ■ ■ ■ ? ■ ■ ■ ■ ■ Intentional Policy ■ ? ■ ■ ? Deniable ■ ■ ■ ■ ? ■ ■ ? ■ Forwarding Obligations ? ■ ? Confidentiality Actions ■ ■ ■ ? ■ ? ■ ■ ■ ■ Inference Attributes ■ ■ ■ ■ ? ■ ? ■ ■ ■ ■ to existing identity management systems. We focus on impact on identity management system design; how- connections between the design choices identified in ever, other factors affect both the implementation and current systems and discuss the impact of these choices success of an identity management system. For example, on system functionality. We adopt a privacy-driven economic incentives and user-interface design might approach, which centers on three privacy properties: 7,8 trump privacy concerns for some systems. Still, privacy principles constitute an interesting lens through which ■ undetectability—concealing user actions, to view the motivating principles that inform identity ■ unlinkability—concealing correlations between com- management system design, because policymakers and binations of actions and identities (for example, un- users often voice privacy concerns. traceability), and ■ confidentiality—enabling users’ control over dissemi- System Components nation of their attributes. Although we identify and discuss high-level design choices informally rather than conduct a formal treat- Undetectability, unlinkability, and confidentiality ment, a good place to start is with careful definitions for are related properties—all concern which parties have the components and actors of concern. These defini- access to particular data. However, these properties tions are standard.9 depend on orthogonal design choices and thus are best The parties in an identity management system are considered independently. The three properties define users, service providers, and identity providers. For a privacy-focused design space that informs choices convenience, we treat each party as monolithic, even intrinsic to building and deploying identity manage- though it could be implemented by a distributed system. ment systems. Table 1 shows a chart depicting various design choices that impact these properties, listing what Users choices existing systems have made. (For more informa- Each user (sometimes called a subject or principal) is tion on the characterizations of identity management, associated with a person. A user U is characterized by an see the related sidebar.) identity—a collection of attributes that represent prop- We focus primarily on these privacy properties’ erties about U. www.computer.org/security 37 IDENTITY MANAGEMENT SYSTEMS Other Characterizations of Identity Management n an effort to understand the failures (and limited successes) of privacy properties. I preceding identity management systems, Kim Cameron proposed User Control and Consent and Minimal Disclosure for seven laws of identity that he claims are essential for successful identity a Constrained Use are what we have termed confidentiality management systems.1 properties. In articulating these laws, Cameron argues that users should control attribute dissemination. In particular, ■ User Control and Consent: An identity management system must identity management systems should provide users with infor- obtain a user’s consent to reveal information that identifies the user. mation, such as an attribute-use policy, that enables them to ■ Minimal Disclosure for a Constrained Use: An identity management make informed decisions about attribute dissemination. With system that discloses less identifying information and imposes more the second law, Cameron also argues for mechanisms that limits on its use is preferred. disseminate coarser versions of attributes and for mechanisms ■ Justifiable Parties: An identity management system must be designed that restrict attribute use (for example, obligations), although so that identifying information is disclosed only to parties having a his work doesn’t include examples of any such mechanisms. necessary and justifiable need. Justifiable Parties is an argument that users should be aware ■ Directed Identity: An identity management system must support global of the parties with which they interact or share information, identifiers for use by public entities and local identifiers for use by and that information disclosure should be limited to necessary private entities. parties. This rule implies that user actions should be undetect- ■ Pluralism of Operators and Technologies: An identity management able (for example, as supported by a credential-based system), system must support interoperability of multiple identity technologies because identity providers don’t need to obtain information run by different identity providers. about authorization requests. In practice, an active-client sys- ■ Human Integration: An identity management system must employ un- tem in which the context of a user action is unobservable would ambiguous human-machine communication mechanisms that prevent suffice to address the privacy concerns that motivate this law. identity-based attacks (for instance, phishing and impersonation). Directed Identity is concerned with linking user actions ■ Consistent Experience across Contexts: An identity management system across multiple service providers. Cameron argues in favor must provide a simple, consistent experience to users while supporting of local pseudonyms over the use of universal pseudonyms. multiple operators and technologies. But as given, Directed Identity precludes the possibility of an anonymous authorization system, although such systems are In terms of the landscape we sketch in the main text, many of Cameron’s consistent with the underlying motivations. laws advocate for particular design choices associated with the various Pluralism of Operators and Technologies precludes central-

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    13 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us