Abstract
Identity management is an almost indispensable component of today’s organizations and companies, as it plays a key role in authentication and access control; however, at the same time, it is widely recognized as a costly and time-consuming task. The advent of cloud computing technologies, together with the promise of flexible, cheap and efficient provision of services, has provided the opportunity to externalize such a common process, shaping what has been called Identity Management as a Service (IDaaS). Nevertheless, as in the case of other cloud-based services, IDaaS brings with it great concerns regarding security and privacy, such as the loss of control over the outsourced data. In this paper, we analyze these concerns and propose BlindIdM, a model for privacy-preserving IDaaS with a focus on data privacy protection. In particular, we describe how a SAML-based system can be augmented to employ proxy re-encryption techniques for achieving data confidentiality with respect to the cloud provider, while preserving the ability to supply the identity service. This is an innovative contribution to both the privacy and identity management landscapes.
Similar content being viewed by others
Notes
The term blind is used here in an analogous way as in blind signature, which is a signature scheme that enables the signer to perform a signature without knowing the content of the underlying message.
Note that HIPAA is focused on the health care sector.
References
Hermans, J., Chung, M.: KPMG’s 2010 Cloud Computing Survey. Technical report, KPMG (2010)
Security guidance for critical areas of focus in cloud computing, version 3.0. Technical report, Cloud Security Alliance (2011)
Cisco global cloud networking survey. Technical report, Cisco (2012)
Heiser, J., Nicolett, M.: Assessing the Security Risks of Cloud Computing. Gartner Inc., Technical report (2008)
Top threats to cloud computing, version 1.0. Technical report, Cloud Security Alliance, 2010
The Notorious Nine: Cloud Computing Top Threats in 2013. Technical report, Cloud Security Alliance (2013)
Casassa Mont, M., Pearson, S., Bramhall, P.: Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. In Proceedings of the 14th International Workshop on Database and Expert Systems Applications, pp. 377–382. IEEE (2003)
Dhamija, R., Dusseault, L.: The seven flaws of identity management: usability and security challenges. IEEE Secur. Priv. 6(2), 24–29 (2008)
Hussain, M.: The Design and Applications of a Privacy-Preserving Identity and Trust-Management System. PhD thesis, School of Computing, Queen’s University, (2010)
OASIS Security Services TC: Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0 (2005)
Shibboleth Consortium. Shibboleth. http://shibboleth.net/
OASIS Web Services Federation TC. Web Services Federation Language (WS-Federation) Version 1.2 (2009)
OASIS Security Services TC: Glossary for the OASIS Security Assertion Markup Language (SAML) V2.0, (2005)
Maler, E., Reed, D.: The venn of identity: options and issues in federated identity management. IEEE Secur. Priv. 6(2), 16–23 (2008)
Microsoft. Windows Azure Active Directory. http://www.windowsazure.com/en-us/home/features/identity/
CA Technologies. CA CloudMinder Identity Management. http://www.ca.com/us/cloudminder-identity-management
Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. In: 2nd IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 693–702. IEEE (2010)
Clauß, S., Köhntopp, M.: Identity management and its support of multilateral security. Computer Networks 37(2), 205–219 (2001)
De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Managing and accessing data in the cloud: privacy risks and approaches. In: Risk and Security of Internet and Systems (CRiSIS), 2012 7th International Conference on, pp. 1–9. IEEE (2012)
E.U. Comission. Council Directive 95/46/EC: On the protection of individuals with regard to the processing of personal data and on the free movement of such data, (1995)
Shane, S., Burns, J.F.: U.S. Subpoenas Twitter Over WikiLeaks Supporters. The New York Times, January 8 (2011)
U.S. Congress. Uniting and strengthening america by providing appropriate tools required to intercept and obstruct terrorism act (2001)
U.S. Congress. Health insurance portability and accountability act (1996)
Hon, W.K., Millard, C., Walden, I.: The problem of ‘personal data’ in cloud computing: what information is regulated? The cloud of unknowing. Int. Data Priv. Law 1(4), 211–228 (2011)
Fowler, G.A., Barrett, D., Schechner, S.: U.S. shuts offshore file-share ‘locker’. The Wall Street Journal, January 20 (2012)
Certivox. PrivateSky. http://privatesky.me/
CipherCloud. CipherCloud Gateway. http://www.ciphercloud.com/
Y. Chen and R. Sion. On securing untrusted clouds with cryptography. In Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, pages 109–114. ACM, 2010
Gritzalis, Stefanos: Enhancing web privacy and anonymity in the digital era. Inf. Manag. Comput. Secur. 12(3), 255–287 (2004)
Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications security, pp. 21–30. ACM (2002)
OASIS Security Services TC: Metadata for the OASIS Security Assertion Markup Language (SAML) V2.0 (2005)
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In Proceedings of the 12th Annual Network and Distributed System Security Symposium, pp. 29–44 (2005)
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Advances in Cryptology—EUROCRYPT’98, pp. 127–144 (1998)
Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Applied Cryptography and Network Security, pp. 288–306. Springer (2007)
Chu, C.K., Tzeng, W.G.: Identity-based proxy re-encryption without random oracles. In: Information Security, pp. 189–202 (2007)
Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: Proceedings of the 14th ACM conference on Computer and communications security, pp. 185–194. ACM (2007)
Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. IEEE Trans. Inf. Theory 57(3), 1786–1802 (2011)
Ateniese, G., Benson, K., Hohenberger, S.: Key-private proxy re-encryption. In: Topics in Cryptology-CT-RSA 2009, pp. 279–294 (2009)
W3C. XML Encryption Syntax and Processing Version 1.0. W3C Recommendation, W3C (2002). http://www.w3.org/TR/xmlenc-core/
OASIS Security Services TC: Bindings for the OASIS Security Assertion Markup Language (SAML) V2.0 (2005)
Nuñez, D., Agudo, I., Lopez, J.: Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services. In: Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on, pp. 241–248. IEEE (2012)
Shirey, R.: Internet Security Glossary, Version 2. RFC 4949 (Informational), August (2007)
Angin, P., Bhargava, B., Ranchal, R., Singh, N., Othmane, L.B., Lilien, L., Linderman, M.: An entity-centric approach for privacy and identity management in cloud computing. In: 29th IEEE Symposium on Reliable Distributed Systems, pp. 177–183 (2010)
Ardagna, C.A., Camenisch, J., Kohlweiss, M., Leenes, R., Neven, G., Priem, B., Samarati, P., Sommer, D., Verdicchio, M.: Exploiting cryptography for privacy-enhanced access control: A result of the PRIME project. J. Comput. Secur. 18(1), 123–160 (2010)
Dey, A., Weis, S.: PseudoID: Enhancing privacy in federated login. In: Hot Topics in Privacy Enhancing Technologies, pp. 95–107 (2010)
Chow, S., He, Y.J., Hui, L., and Yiu, S.: SPICE-simple privacy-preserving identity-management for cloud environment. In: Applied Cryptography and Network Security, pp. 526–543. Springer (2012)
Bertino, E., Paci, F., Ferrini, R., Shang, N.: Privacy-preserving digital identity management for cloud computing. Bull. IEEE Comput. Soc. Tech. Committ. Data Eng. 32(1), 21–27 (2009)
Agudo, I., Nuñez, D., Giammatteo, G., Rizomiliotis, P., Lambrinoudakis, C.: Cryptography goes to the cloud. In: Secure and Trust Computing, Data Management, and Applications, pp. 190–197. Springer (2011)
Kamara, S., Lauter, K.: Cryptographic cloud storage, pp. 136–149. Financial Cryptography and Data, Security (2010)
System for cross-domain identity management. http://www.simplecloud.info/
Acknowledgments
This work was partly supported by the projects FISICCO (P11-TIC-07223) and ARES (CSD2007-00004). The first author has been funded by a FPI fellowship from the Junta de Andalucia through the project PISCIS (P10-TIC-06334).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Nuñez, D., Agudo, I. BlindIdM: A privacy-preserving approach for identity management as a service. Int. J. Inf. Secur. 13, 199–215 (2014). https://doi.org/10.1007/s10207-014-0230-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-014-0230-4