Click here to load reader

Elisa Bertino, Federica Paci, Rodolfo Ferrini and Ning Shang IEEE Data Engineering Bulletin, Vol. 32, #1, March 2009 Privacy-preserving Digital Identity

Embed Size (px)

Citation preview

  • Slide 1
  • Elisa Bertino, Federica Paci, Rodolfo Ferrini and Ning Shang IEEE Data Engineering Bulletin, Vol. 32, #1, March 2009 Privacy-preserving Digital Identity Management for Cloud Computing
  • Slide 2
  • Outline Cloud computing Digital Identity Management Introduction Method Conclusion
  • Slide 3
  • Cloud computing EX:
  • Slide 4
  • Digital identity management Digital identity management (IdM for short) IDM is a term related to how humans are are authenticated and Authorized across computer networks. It covers issues such as how users are given an identity, the protection of that identity, and the technologies supporting that protection (e.g., network protocols, digital certificates, passwords, etc.).
  • Slide 5
  • Digital identity management
  • Slide 6
  • Identity management can involve three perspectives: 1.Creation, management and deletion of identities 2. The user access (log-on) paradigm 3. The service paradigm
  • Slide 7
  • Outline Cloud computing Digital Identity Management Introduction Method Conclusion
  • Slide 8
  • Introduction Digital identity management services are crucial in cloud computing infrastructures to authenticate users and to support flexible access control to services, based on user identity Properties and past interaction histories. Such services should preserve the privacy of users. EX: identity verification
  • Slide 9
  • Introduction Users have typically to establish their identity each time they use a new cloud service, usually by filling out an online form and providing sensitive personal information (e.g., name, home address, credit card number, phone number, etc.). This leaves a trail of personal information that, if not properly protected, may be misused. Solution: digital identity management systems
  • Slide 10
  • Outline Cloud computing Digital Identity Management Introduction Method Conclusion
  • Slide 11
  • Method Assumes an IdM system that include several entities: Identity Providers(IdPs) Cloud Service Providers (CSPs) Registrars users
  • Slide 12
  • Method Assume that a user Alice submits a request to her Hospital Web portal to access her test results. Alice (user) 1 Hospital web (CSPs) 6 4 5 2 3 Laborstory service (IdPs) database Registrars
  • Slide 13
  • Outline Cloud computing Digital Identity Management Introduction Method Conclusion
  • Slide 14
  • It is available to preserve personal information through IdM system. V.S. Group signature ? user----Group member IdPs----Group manager