DocumentCode :
3309182
Title :
Audit based privacy preservation for the OpenID authentication protocol
Author :
Riesch, P.J. ; Xiaojiang Du
Author_Institution :
Dept. of Comput. & Inf. Sci., Temple Univ., Philadelphia, PA, USA
fYear :
2012
fDate :
13-15 Nov. 2012
Firstpage :
348
Lastpage :
352
Abstract :
This paper studies a privacy vulnerability within OpenID, a distributed single sign on protocol. An OpenID system consists of three components: User Agent (UA); Relying Party - A web application that a UA would like to authenticate with using their unique identifier; and Identity Provider - A web server that provides a globally unique identifier for the UA and validates the identity of UAs on behalf of Relying Parties. The privacy vulnerability has been identified in existing literatures. However, no effective solution has been proposed to date. In this paper, we present an effective scheme to mitigate this vulnerability. In order for OpenID to gain wider acceptance, this vulnerability must be addressed with a solution that is convenient to the users of single sign on. We propose a method for mitigating this vulnerability by creating vertical levels of trust between constituents of an OpenID network through expanding the role of OpenID Identity Providers to include auditing OpenID Relying Parties for privacy vulnerabilities. In addition, Identity Providers may keep records of audits that identify Relying Parties that do not protect the privacy of OpenID users. The primary issue with this privacy vulnerability is that it is completely transparent - it occurs without the user ever being aware that it is happening. We cannot force Relying Parties to guarantee the privacy of OpenID users, nor would we like to burden individual users with browser level solutions that are often overly technical and difficult to understand. We have designed an audit solution at the level of the Identity Provider, which can accurately inform users when Relying Parties may be sharing information with third parties, therefore giving OpenID users the ability to make a conscious choice to share that information. We have performed real network experiments to validate our scheme, and the experimental results show that our scheme is effective.
Keywords :
cryptographic protocols; data privacy; distributed processing; OpenID authentication protocol; audit based privacy preservation; distributed single sign on protocol; identity provider; privacy vulnerability; relying party; user agent; user privacy; Authentication; Browsers; Computer applications; IP networks; Privacy; Protocols; OpenID; authentication; distributed systems; privacy; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Homeland Security (HST), 2012 IEEE Conference on Technologies for
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4673-2708-4
Type :
conf
DOI :
10.1109/THS.2012.6459873
Filename :
6459873
Link To Document :
بازگشت