User-Centric Privacy for Identity Federations Based on a Recommendation System

被引:1
作者
Villaran, Carlos [1 ]
Beltran, Marta [1 ]
机构
[1] Univ Rey Juan Carlos, ETSII, Dept Comp, C Tulipan S-N, Mostoles 28933, Spain
关键词
identity infrastructures; federated identity management; privacy; recommendation system;
D O I
10.3390/electronics11081238
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Specifications such as SAML, OAuth, OpenID Connect and Mobile Connect are essential for solving identification, authentication and authorisation in contexts such as mobile apps, social networks, e-commerce, cloud computing or the Internet of Things. However, end-users relying on identity providers to access resources, applications or services lose control over the Personally Identifiable Information (PII) they share with the different providers composing identity federations. This work proposes a user-centric approach based on a recommendation system to support users in making privacy decisions such as selecting service providers or choosing their privacy settings. The proposed Privacy Advisor gives end-users privacy protection by providing personalised recommendations without compromising the identity federations' functionalities or requiring any changes in their underlying specifications. A proof of concept of the proposed recommendation system is presented to validate and evaluate its utility and feasibility.
引用
收藏
页数:18
相关论文
共 45 条
[1]  
Ahn Gail-Joon., 2005, Digital Identity Management, P28
[2]  
Al Hassanieh L, 2018, 2018 IEEE MIDDLE EAST AND NORTH AFRICA COMMUNICATIONS CONFERENCE (MENACOMM), P165
[3]   Enhancing the privacy risk awareness of teenagers in online social networks through soft-paternalism mechanisms [J].
Alemany, J. ;
del Val, E. ;
Alberola, J. ;
Garcia-Fornes, A. .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2019, 129 :27-40
[4]  
Andow B, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P985
[5]  
[Anonymous], 2013, INT J SECUR 1 TRUST, DOI DOI 10.5121/IJSPTM.2013.2402
[6]  
Asghar MuhammadEhtisham., 2018, P 28 INT TEL NETW AP, P1, DOI [DOI 10.1109/ATNAC.2018.8615224, DOI 10.1109/ICC.2018.8422732]
[7]  
Barakat, 2021, ACM T INTERNET TECHN
[8]   Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources [J].
Barth, Susanne ;
de Jong, Menno D. T. ;
Junger, Marianne ;
Hartel, Pieter H. ;
Roppelt, Janina C. .
TELEMATICS AND INFORMATICS, 2019, 41 :55-69
[9]   Design and Implementation of a CBR-based Privacy Agent [J].
Bernsmed, Karin ;
Tondel, Inger Anne ;
Nyre, Asmund Ahlmann .
2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, :317-326
[10]  
Chairani M., 2019, ARXIV191105798