Skip to main content

Managing and Presenting User Attributes over a Decentralized Secure Name System

  • Conference paper
  • First Online:
Data Privacy Management and Security Assurance (DPM 2016, QASA 2016)

Abstract

Today, user attributes are managed at centralized identity providers. However, two centralized identity providers dominate digital identity and access management on the web. This is increasingly becoming a privacy problem in times of mass surveillance and data mining for targeted advertisement. Existing systems for attribute sharing or credential presentation either rely on a trusted third party service or require the presentation to be online and synchronous. In this paper we propose a concept that allows the user to manage and share his attributes asynchronously with a requesting party using a secure, decentralized name system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.gigya.com/blog/the-landscape-of-customer-identity-q2-2015/, accessed 2016/02/20.

  2. 2.

    https://nameid.org, accessed 2016/02/20.

  3. 3.

    https://namecoin.info/, accessed 2016/02/23.

  4. 4.

    https://gnunet.org/svn.

  5. 5.

    https://github.com/schanzen/gnunet-webui.

  6. 6.

    https://github.com/schanzen/gnuidentity-example-rp.

References

  1. Brown, D.: Standards for efficient cryptography, sec 1: elliptic curve cryptography. Released Stan. Version 1, 2 (2009)

    Google Scholar 

  2. Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 21–30. ACM (2002)

    Google Scholar 

  3. French data protection authority. Decision no. 2016–007 of January 26, 2016 issuing formal notice to FACEBOOK INC. and FACEBOOK IRELAND, January 2016

    Google Scholar 

  4. Gola, P., Schomerus, R., Klug, C.: BDSG-: Bundesdatenschutzgesetz: Kommentar. Beck, Mnchen, 8. berarbeitete und ergnzte auflage edition (2005)

    Google Scholar 

  5. Hardjono, T.: User-managed access (uma) profile of oauth 2.0, December 2015. https://docs.kantarainitiative.org/uma/draft-uma-core.html

  6. Jones, M., Bradley, J., Sakimura, N.: Json web token (jwt). RFC 7519, RFC Editor, May 2015. http://www.rfc-editor.org/rfc/rfc7519.txt

  7. Jones, M., Hardt, D.: The oauth 2.0 authorization framework: Bearer token usage. RFC 6750, RFC Editor, October 2012. http://www.rfc-editor.org/rfc/rfc6750.txt

  8. Lowe, G.: Casper: A compiler for the analysis of security protocols. J. Comput. Secur. 6(1,2), 53–84 (1998)

    Article  Google Scholar 

  9. Rivest, R.L., Lampson, B.: Sdsi-a simple distributed security infrastructure. In: Crypto (1996)

    Google Scholar 

  10. Sakimura, N., Bradley, J., Jones, M., de Medeiros, B., Mortimore, C.: OpenID Connect Core 1.0 incorporating errata set 1. Technical report, November 2014

    Google Scholar 

  11. Wachs, M., Schanzenbach, M., Grothoff, C.: A censorship-resistant, privacy-enhancing and fully decentralized name system. In: Gritzalis, D., Kiayias, A., Askoxylakis, I. (eds.) CANS 2014. LNCS, vol. 8813, pp. 127–142. Springer, Heidelberg (2014)

    Google Scholar 

  12. Wachs, M., Schanzenbach, M., Grothoff, C.: On the feasibility of a censorship resistant decentralized name system. In: Danger, J.-L., Debbabi, M., Marion, J.-Y., Garcia-Alfaro, J., Heywood, N.Z. (eds.) FPS 2013. LNCS, vol. 8352, pp. 19–30. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

Download references

Acknowledgment

This work has been partially funded in the project PARADISE by the German Federal Ministry of Education and Research under the reference 16KIS0422.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Martin Schanzenbach .

Editor information

Editors and Affiliations

A Appendix - Casper Sources

A Appendix - Casper Sources

figure a

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Schanzenbach, M., Banse, C. (2016). Managing and Presenting User Attributes over a Decentralized Secure Name System. In: Livraga, G., Torra, V., Aldini, A., Martinelli, F., Suri, N. (eds) Data Privacy Management and Security Assurance. DPM QASA 2016 2016. Lecture Notes in Computer Science(), vol 9963. Springer, Cham. https://doi.org/10.1007/978-3-319-47072-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47072-6_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47071-9

  • Online ISBN: 978-3-319-47072-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics