35
© 2016 IBM Corporation Authentication without Identification How to Protect On-Line Identity Dr. Jan Camenisch Principle Research Staff Member Member, IBM Academy of Technology IBM Research – Zurich @JanCamenisch [email protected] ibm.biz/jancamenisch 3. - 4. MAJ 2016 ØKSNEHALLEN, KØBENHAVN

Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation

Authentication without IdentificationHow to Protect On-Line Identity

Dr. Jan Camenisch

Principle Research Staff MemberMember, IBM Academy of TechnologyIBM Research – Zurich

@[email protected] ibm.biz/jancamenisch

3. - 4. MAJ 2016ØKSNEHALLEN, KØBENHAVN

Page 2: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation2 May 4, 2016 - Infosecurity Denmark

33% of cyber crimes, including identity theft, take less time than to make a cup of tea.

Facts

Page 3: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation3 May 4, 2016 - Infosecurity Denmark

10 Years ago, your personal data on the black market was worth $150. Today….

Facts

Page 4: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation4 May 4, 2016 - Infosecurity Denmark

Houston, we have a problem!

Page 5: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation5 May 4, 2016 - Infosecurity Denmark

Houston, we have a problem!

“Buzz Aldrin's footprints are still up there”(Robin Wilton)

Page 6: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation6 May 4, 2016 - Infosecurity Denmark

Computers don't forget

! Data storage ever cheaper “store by default”→ – also collateral collection, surveillance cameras, Google Street

View with wireless traffic, Apple location history,...

! Data mining ever better– self-training algorithms cleverer than their designers– not just trend detection, even prediction, e.g., flu

pandemics, ad clicks, purchases,…– what about health insurance, criminal behavior?

! The world as we know it– Humans forget most things too quickly– Paper collects dust in drawers

We build apps with the paper-based world in mind :-(– if it works it works– security too often still an afterthought– implementors too often have no crypto education

Page 7: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation7 May 4, 2016 - Infosecurity Denmark

You have no privacy, get over it .....?!?

… “I have nothing to hide!”… “The intelligence agencies have all my data anyway”

! Huge security problem!– Millions of hacked passwords (100'000 followers $115 - 2013)– Stolen identities ($150 - 2005, $15 - 2009, $5 – 2013, $1 – 2015)

! Difficult to put figures down– Credit card fraud – Spam & marketing – Manipulating stock ratings, etc..– (Industrial) espionage

! We know that 3 letter orgs can do it easily, but they are not the only ones– this is not about homeland security– and of course there are limits to the degree of protection that one can achieve

! Last but not least: data are the new money, so they need to be protected!

Page 8: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation8 May 4, 2016 - Infosecurity Denmark

we need paradigm shift &build stuff for the moon

rather than the sandy beach!

Privacy is not a lost cause!

Page 9: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation9 May 4, 2016 - Infosecurity Denmark

Private CredentialsThe paradigm shift for authentication

Page 10: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation10 May 4, 2016 - Infosecurity Denmark

Alice wants to watch a movie at Movie Streaming Service

Alice

Movie Streaming Service

I wish to see Alice in Wonderland

Page 11: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation11 May 4, 2016 - Infosecurity Denmark

Alice wants to watch a movie at Movie Streaming Service

Alice

Movie Streaming Service

You need:- subscription- be older than 12

Page 12: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation12 May 4, 2016 - Infosecurity Denmark

Watching the movie with the traditional solution

Alice

Movie Streaming Service

ok, here's - my eID - my subscription

Using digital equivalent of paper world, e.g., with X.509 Certificates

Page 13: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation13 May 4, 2016 - Infosecurity Denmark

Watching the movie with the traditional solution

Alice

Movie Streaming Service

Aha, you are- Alice Doe- born on Dec 12, 1975- 7 Waterdrive- CH 8003 Zurich - Married- Expires Aug 4, 2018

Mplex Customer - #1029347 - Premium Subscription - Expires Jan 13, 2016

...with X.509 Certificates

Page 14: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation14 May 4, 2016 - Infosecurity Denmark

Watching the movie with the traditional solution

Alice

Movie Streaming Service

Aha, you are- Alice Doe- born on Dec 12, 1975- 7 Waterdrive- CH 8003 Zurich - Married- Expires Aug 4, 2018

Mplex Customer - #1029347 - Premium Subscription - Expires Jan 13, 2016

This is a privacy and security problem! - identity theft - discrimination - profiling, possibly in connection with other services

Page 15: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation15 May 4, 2016 - Infosecurity Denmark

Watching the movie with the traditional solution

Alice

Movie Streaming Service

With OpenID and similar solution, e.g., log-in with Facebook

Page 16: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation16 May 4, 2016 - Infosecurity Denmark

Watching the movie with the traditional solution

Alice

Movie Streaming Service

With OpenID and similar solution, e.g., log-in with Facebook

Aha, Alice is watching a 12+ movie

Page 17: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation17 May 4, 2016 - Infosecurity Denmark

Watching the movie with the traditional solution

Alice

Movie Streaming Service

With OpenID and similar solution, e.g., log-in with Facebook

Aha, you are- [email protected] 12+Mplex Customer - #1029347 - Premium Subscription - Expires Jan 13, 2016

Aha, Alice is watching a 12+ movie

Page 18: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation18 May 4, 2016 - Infosecurity Denmark

Private Credentials (Privacy- ABC) solve this.

When Alice authenticates to the Movie StreamingService with Identity Mixer, all the services learns isthat Alice

has a subscriptionis older than 12

and no more!

Page 19: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation19 May 4, 2016 - Infosecurity Denmark

Users' Keys:! One secret Identity (secret key)! Many Public Pseudonyms (public keys)

Privacy-protecting authentication with Privacy ABCs

Page 20: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation20 May 4, 2016 - Infosecurity Denmark

Certified attributes from Identity provider! Issuing a credential

Privacy-protecting authentication with Privacy ABCs

Name = Alice DoeBirth date = April 3, 1997

Page 21: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation21 May 4, 2016 - Infosecurity Denmark

Privacy-protecting authentication with Privacy ABCs

Alice

I wish to see Alice in Wonderland

You need:- subscription- be older than 12

Movie Streaming Service

Page 22: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation22 May 4, 2016 - Infosecurity Denmark

Privacy-protecting authentication with Privacy ABCs

Alice

Movie Streaming Service

Page 23: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation23 May 4, 2016 - Infosecurity Denmark

Privacy-protecting authentication with Privacy ABCs

Alice

Movie Streaming Service

Page 24: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation24 May 4, 2016 - Infosecurity Denmark

Privacy-protecting authentication with Privacy ABCs

Alice

I wish to see Alice in Wonderland

You need:- subscription- be older than 12

Movie Streaming Service

Concept: presentation policy

Page 25: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation25 May 4, 2016 - Infosecurity Denmark

Proving identity claims! but does not send credential! only minimal disclosure

Privacy-protecting authentication with Privacy ABCs

Alice

Movie Streaming Service

- valid subscription - eID with age ≥ 12

Page 26: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation26 May 4, 2016 - Infosecurity Denmark

Privacy-protecting authentication with Privacy ABCs

Alice

Aha, you are- older than 12- have a subscription

Movie Streaming ServiceMovie Streaming Service

Proving identity claims! but does not send credential! only minimal disclosure (Public Verification Key

of issuer)

Page 27: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation27 May 4, 2016 - Infosecurity Denmark

Proving Identity Claims: Minimal Disclosure

Alice DoeDec 12, 1998Hauptstr. 7, ZurichCHsingleExp. Aug 4, 2018 ve

rified

ID

Alice DoeAge: 12+Hauptstr 7, ZurichCHsingleExp. Valid ve

rified

ID

Page 28: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation28 May 4, 2016 - Infosecurity Denmark

Demo

Try yourself at www.ibm.biz/identitymixer

Page 29: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation29 May 4, 2016 - Infosecurity Denmark

IBM's Privacy ABCs: Identity Mixer

! Scientific foundation laid 15 years ago, well studied & award winning

! Successful real-world pilots in series of EU projects

! You can have identity mixer, too!– Open-source implementation: https://github.com/p2abcengine– Idemix-as-a-Service on IBM Bluemix– Web-based demo to try for everyone– Coming soon: Idemix on mobile

Page 30: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation

Some Use Cases

Page 31: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation31 May 4, 2016 - Infosecurity Denmark

Subscriptions, membership

! Patent databases! DNA databases! News/Journals/Magazines! Transportation: tickets, toll roads! Loyalty programs

Who accesses which data at which time can reveal sensitive information about the users (their research strategy, location, habits, etc.)

???

Page 32: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation32 May 4, 2016 - Infosecurity Denmark

Healthcare Use Case

Anonymous consultations with specialists– online chat with a psychologist – online consultation with IBM Watson

1. Alice proves she has insurance2. Alice describes symptoms 3. Alice gets credential that she is allowed to get treatment

Alice gets a health insurance credential

Insurance

Insurance

Health portal

5. Alice sends bill to insurance and proves that she had gottenthe necessary permission for the treatment.

4. Alice gets treatment from physician, hospital, etc

Page 33: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation33 May 4, 2016 - Infosecurity Denmark

Polls, recommendation platforms

! Online polls – applying different restrictions on the poll participants: location, citizenship

! Rating and feedback platforms– anonymous feedback for a course only from the students who attended it– wikis– recommendation platforms

Providing anonymous, but at the same time legitimate feedback

Page 34: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation34 May 4, 2016 - Infosecurity Denmark

Conclusion – Let's Engage in Some Rocket Science

! Personal data are the oil of the information society

Still, we hardly protect these data

! Need to protect our infrastructure much better – encrypt every bit– data parsimony – strong authentication, but only to the level necessary

! Necessary technology exists but is not used!– and is it not hard to use it

Page 35: Authentication without Identification - IBM · 04/05/2016  · Polls, recommendation platforms! Online polls – applying different restrictions on the poll participants: location,

© 2016 IBM Corporation35 May 4, 2016 - Infosecurity Denmark

Thank you!!eMail: [email protected]! twitter: @IdentityMixer!Links:

– www.zurich.ibm.com/idemix– idemixdemo.zurich.ibm.com– github.com/p2abcengine & abc4trust.eu/idemix– console.ng.bluemix.net/catalog/services/ibm-identity-mixer/