Pseudonymous Authentication and Authorization enhancing ubiquitous - - PowerPoint PPT Presentation

pseudonymous authentication and authorization enhancing
SMART_READER_LITE
LIVE PREVIEW

Pseudonymous Authentication and Authorization enhancing ubiquitous - - PowerPoint PPT Presentation

Pseudonymous Authentication and Authorization enhancing ubiquitous Identity Management Thomas Hildmann hildmann@prz.tu-berlin.de Berlin University of Technology (TUB) Content Motivation Advantages of pseudonymous A+A


slide-1
SLIDE 1

Pseudonymous Authentication and Authorization enhancing ubiquitous Identity Management

Thomas Hildmann hildmann@prz.tu-berlin.de Berlin University of Technology (TUB)

slide-2
SLIDE 2

Content

  • Motivation

– Advantages of pseudonymous A+A

  • Pseudonymous Authentication
  • Pseudonymous Authorization

– ADFBlinder – Hiding of Structure-Application Mapping – Isolated ADF-Components

  • Summary
slide-3
SLIDE 3

Motivation

  • Ubiquitous A+A

– Just one (meta-) database – Effective, consistent

  • Pseudonymity

– Privacy Law – Unions – Employees – Insider attacks – Works in B2B- Environments (multi- party A+A) – Good for outsourcing – In case of an incident

  • Multilateral Security

– Principles and Methods are well- investigated

slide-4
SLIDE 4

Pseudonymous Authentication

  • Implemented in Project „Campuskarte“
  • Basic idea

– Separation of Card-ID and User-ID – Card-ID revocation-lists – Knowledge is distributed between Application, Authentication-Server, Card- Database and Client-Computer

slide-5
SLIDE 5

Basic RBAC-Model

UML-representation of simplified NIST RBAC model Derived model

slide-6
SLIDE 6

How to archive pseudonymity?

  • To authorize a person (s)he must be

identified (may be pseudonymously).

  • Maintaining pseudonymity during the

authorization-process.

  • This is possible by deploying necessary

information: Initiator (subject), application/data (object), function (operation)

slide-7
SLIDE 7

ADFBlinder-Architecture

Q ID A

slide-8
SLIDE 8

Hiding of Structure- Application-Mapping

slide-9
SLIDE 9

2 2 1 1

slide-10
SLIDE 10

Hiding of Structure- Application-Mapping User SBR SBR ABR

slide-11
SLIDE 11

Isolated ADF-Components

slide-12
SLIDE 12

Comparing

ADFBlinder-Architecture Hiding of Structure- Application-Mapping Isolated ADF-Components

+ simple cryptographic solution + just jails needed

  • RBAC-Metadirectory can

track users + no additional cryptography + mixes are well-investigated

  • mixes must be driven

+ no additional crypto + no mixes

  • Metadir-Problem
slide-13
SLIDE 13

Summary

  • Advantages of ubiquitous IDM

– Centralized structure / decentralized management – Homogeneous policy / fine grained customization – Users controlling their own identity

  • Disadvantages without pseudonymity

– Traceability

  • Pseudonymous Authorization

– Different implementation possible – We are implementing one

slide-14
SLIDE 14

Outlook

  • Implementation of

RBAC-IDM System at Berlin University of Technology (TUB)

– Application comprehensive – Modeling of organization- and access-roles – Use of modeling patterns (like programming patterns) – Pseudonymous Authentication and Authorization – Self administration and delegation of rights – Privacy suitable IDM – Distributed cross-

  • rganizational RBAC

hildmann@prz.tu-berlin.de