EID System's Privacy Protection Enhancement Design

Article Preview

Abstract:

Recently, eID system is proposed to settle security problems and even more important to fulfill the need of government administration and control. But the main obstacle of spreading eID systems is privacy worrying though they possessed some security and privacy protection measures. In this paper, we provided the enhancement design for protecting citizen privacy in an eID system (taking German eID system as analysis object).Firstly, we suggested to separate authorization eID server and authentication eID server physically to reduce the possibility of personal data breach since eID server could not avoid to be attacked if it was one part of the internet ; Secondly, we put forward that privacy data should be double-encrypted in the stage of applying service, and should be remain encryption except the service program using it, and more importantly , it should be deleted when service is ending ; Thirdly, in order to prevent fake eID server plus fake service provider attack, we devised the authentication flow when citizen access service which let citizen to take part in the authentication process actively. In addition, we present the remote delete personal data process which invoked by citizen to further privacy protection.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

192-198

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Andreas Poller, Ulrich Waldmann, Sven Vowé, and Sven Türpe, Electronic Identity Cards for User Authentication—Promise and Practice . IEEE Security and Privacy. 2012, Volume 10, Issue 1: 46-54.

DOI: 10.1109/msp.2011.148

Google Scholar

[2] Mika¨el Ates and Serge Ravet and Abakar Mohamat Ahmat and Jacques Fayolle, An Identity-Centric Internet: Identity in the Cloud, Identity as a Service and other delights. 2011 Sixth International Conference on Availability, Reliability and Security. 2011: 555-560.

DOI: 10.1109/ares.2011.85

Google Scholar

[3] Eric Olden, Architecting a Cloud-Scale Identity Fabric. IEEE computer society. March 2011: 52-59.

DOI: 10.1109/mc.2011.60

Google Scholar

[4] Christian Senk and Florian Dotzler, Biometric Authentication as a Service for Enterprise Identity Management Deployment. 2011 Sixth International Conference on Availability, Reliability and Security. 2011 IEEE: 43-50.

DOI: 10.1109/ares.2011.14

Google Scholar

[5] Peng Zhang, Hanlin Sun and Zheng Yan, Building up trusted identity management in mobile heterogeneous environment, 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11, 2011: 873-877.

DOI: 10.1109/trustcom.2011.117

Google Scholar

[6] Valentina Casola, Massimiliano Rak and Umberto Villano, Identity Federation in Cloud Computing, 2010 Sixth International Conference on Information Assurance and Security. 2010: 253-259.

DOI: 10.1109/isias.2010.5604074

Google Scholar

[7] Christian Schridde, etc. An Identity-Based Security Infrastructure for Cloud Environments, 2010 IEEE: 644-649.

Google Scholar

[8] Lishan Kang and Xuejie Zhang, Identity-Based Authentication in Cloud Storage Sharing, 2010 International Conference on Multimedia Information Networking and Security, 2010: 851-855.

DOI: 10.1109/mines.2010.180

Google Scholar

[9] Zombo Fu, etc. Application Independent Identity Management, 2010 IEEE: 625-627.

Google Scholar

[10] Ghazi Ben Ayed. Digital Identity Metadata Scheme—A technical approach to reduce digital identity risks, 2011 Workshops of International Conference on Advanced Information Networking and Applications: 607-612.

DOI: 10.1109/waina.2011.118

Google Scholar

[11] P. Mell and T. Grance. The NIST Definition of cloud computing, ver 15, Information Technology Laboratory, US Nat'1 Inst. Of Standards and technology, 7Oct, 2009. http: /csrc. nist. gov/groups/sns/cloud-computing.

DOI: 10.6028/nist.sp.800-145

Google Scholar

[12] Cath Everett. E-Identity: an issue of trust. Computer Fraud & Security, March, 2011: 8-10.

Google Scholar

[13] http: /news. xinhuanet. com/world/2011-04/21/c_121331615. htm.

Google Scholar

[14] Christian Cachin, Mattias Schunter. A Cloud You Can Trust. IEEE Spectrum, DEC 2011: 28-52.

DOI: 10.1109/mspec.2011.6085778

Google Scholar

[15] Lori M. Kaufman. How Private Is the Internet?. IEEE Security &privacy, 2011, Volume 9, Issue 1: 73-75.

Google Scholar

[16] HUANG Ruwei, GUI Xiaolin, etc. Design of Cloud Storage Framework with Privacy-preserving. Journal of XI'AN JiaoTong University, 2011, volume 45, No 10: 1-6.

Google Scholar

[17] Hong Cheng, Zhang Min, etc. AB-ACCA: A Cryptographic Access Control Scheme for cloud storage. Journal of Computer Research and Development, 2010, vol 47(suppl): 259-265.

Google Scholar

[18] XU Zi-Yao, HE Ye-Ping, etc. Efficient Remote Attestation Mechanism with Privacy Protection. Journal of Software, 2011, 22(2): 39-352.

DOI: 10.3724/sp.j.1001.2011.03714

Google Scholar