An Identity-matching Process to Strengthen Trust in Federated-identity Architectures

被引:1
作者
Marillonnet, Paul [1 ,2 ]
Ates, Mikael [1 ]
Laurent, Maryline [2 ]
Kaaniche, Nesrine [3 ]
机构
[1] Entrouvert, Paris, France
[2] Inst Polytech Paris, Telecom SudParis, SAMOVAR, Paris, France
[3] Univ Sheffield, Dept Comp Sci, Secur Adv Syst, Sheffield, S Yorkshire, England
来源
PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1 | 2020年
关键词
Identity Matching; Federated-identity Architecture; Identity Management; Citizen-relationship Management; Trust Enforcement;
D O I
10.5220/0009828401420154
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To smoothly counteract privilege escalation in federated-identity architectures, the cross-checking of asserted Personally Identifiable Information (PII) among different sources is highly recommended and advisable. Identity matching is thus a key component for supporting the automated PII cross-checking process. This paper proposes an efficient identity-matching solution, adapted to a chosen User-Relationship Management (URM) platform, relying on a French Territorial Collectivities and Public Administrations (TCPA) use case. The originality of the paper is threefold. (1) It presents an original solution to identity-matching issues raised by a concrete use case from the Territorial Collectivities and the Public Administration (TCPA), formalizing concepts such as information completeness, PII normalization and Levenshtein-distance matrix generation. (2) Implementation guidelines are given to deploy the solution on an operational Publik platform. (3) A precise security analysis is provided, relying on an original attacker model.
引用
收藏
页码:142 / 154
页数:13
相关论文
共 18 条
[1]  
[Anonymous], 1966, Soviet Physics Doklady
[2]  
Bugiel S., 2012, P NETW DISTR SYST SE, V17, P19
[3]  
Camenisch J., 2007, FEDERATED IDENTITY M, P213
[4]  
Davis M., 2001, UNICODE NORMALIZATIO
[5]   openPDS: Protecting the Privacy of Metadata through SafeAnswers [J].
de Montjoye, Yves-Alexandre ;
Shmueli, Erez ;
Wang, Samuel S. ;
Pentland, Alex Sandy .
PLOS ONE, 2014, 9 (07)
[6]  
Fielding R.T., 2000, ARCHITECTURAL STYLES, Patent No. AAI9980887
[7]  
Hardt D., 2012, OAUTH 2 0 AUTHORIZAT
[8]   PKI and digital certification infrastructure [J].
Hunt, R .
NINTH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, PROCEEDINGS, 2001, :234-239
[9]  
Krawczyk H, 2013, LECT NOTES COMPUT SC, V8042, P429, DOI 10.1007/978-3-642-40041-4_24
[10]  
Mortier R., 2016, P 2016 ACM WORKSHOP, P49, DOI [10.1145/3010079.3010082, DOI 10.1145/3010079.3010082]