A Delegation Solution for Universal Identity Management in SOA

被引:23
|
作者
Zhang, Yang [1 ]
Chen, Jun-Liang [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Privacy concerns of service-oriented solutions; identity management; privacy governance methods and tools; privacy management in data dissemination; service-oriented architecture; SIGNATURES; SECURITY;
D O I
10.1109/TSC.2010.9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The relationship-focused and credential-focused identity managements are both user-centric notions in Service-oriented architecture (SOA). For composite services, pure user-centric identity management is inefficient because each subservice may authenticate and authorize users and users need participate in every identity provisioning transaction. If the above two paradigms are unified into the universal identity management where identity information and privileges are delegatable, user centricity will be more feasible in SOA. The credential-focused system is a good starting point for constructing a universal identity management system. However, how to implement a practical delegation scheme is still a challenge although there are some delegatable anonymous credential schemes that were theoretically constructed. This paper aims to propose a practical delegation solution for universal identity management. For this, a pseudonym-based signature scheme is first designed where pseudonyms are self-generated and unlinkable for realizing user's privacy. Next, a proxy signature is presented with the pseudonyms as public keys where delegation can be achieved through certificate chains. Finally, the security of our scheme is analyzed and proved in the random oracle model.
引用
收藏
页码:70 / 81
页数:12
相关论文
共 50 条
  • [1] Privacy with delegation of rights by identity management
    Wohlgemuth, Sven
    Mueller, Guenter
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 175 - 190
  • [2] An Identity and Access Management approach for SOA
    Katsikogiannis, Georgios
    Mitropoulos, Sarandis
    Douligeris, Christos
    2016 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT), 2016, : 126 - 131
  • [3] Providing Secured Access Delegation in Identity Management Systems
    Shehu, Abubakar-Sadiq
    Pinto, Antonio
    Correia, Manuel E.
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 638 - 644
  • [4] SOA Approach - Identity and Access Management for the Risk Management Platform
    Petrovska, Jovana
    Memeti, Agon
    Imeri, Florinda
    2019 8TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2019, : 812 - 815
  • [5] Building SOA based solution for a workforce management
    Chhabra, Pawan
    Karamongikar, Sandeep
    Owusu, Gilbert
    Doddavula, Shyam
    2006 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2006, : 513 - 513
  • [6] Identity Management: Is an Identity Card the Solution for Australia?
    Jackson, Margaret
    Ligertwood, Julian
    PROMETHEUS, 2006, 24 (04) : 379 - 387
  • [7] D-FOAF: Distributed identity management with access rights delegation
    Kruk, Sebastian Ryszard
    Grzonkowski, Slawomir
    Gzella, Adam
    Woroniecki, Tomasz
    Choi, Hee-Chul
    SEMANTIC WEB - ASWC 2006, PROCEEDINGS, 2006, 4185 : 140 - 154
  • [8] Identity based delegation network
    Chow, SSM
    Lui, RWC
    Hui, LCK
    Yiu, SM
    PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 99 - 115
  • [9] Management by delegation
    Lewis, BJ
    JOURNAL OF MANAGEMENT IN ENGINEERING, 2000, 16 (02) : 21 - 21
  • [10] Management by delegation
    不详
    JOURNAL OF MANAGEMENT IN ENGINEERING, 1997, 13 (04) : 13 - 13