Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Privacy preserved attribute aggregation to avoid correlation of user activities across Shibboleth SPs
Nakamura M., Nishimura T., Yamaji K., Sato H., Okabe Y.  COMPSACW 2013 (Proceedings of the 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, Kyoto, Japan, Jul 22-26, 2013)367-372.2013.Type:Proceedings
Date Reviewed: Jun 11 2014

Have you ever encountered a problem where you thought you had to dig a tunnel through the hard way, but then saw you can instead fly around it?

I had a similar feeling when reading this paper. In our projects based around Security Assertion Markup Language (SAML) single sign-on (SSO), we had been looking at the issue of aggregating attributes from multiple identity sources (the user’s home identity provider and attribute providers) when a user is logging into a service provider (SP). And we had been just taking for granted that in order for this to work, we must have a shared attribute uniquely identifying users across all services and all identity sources, which comes at a cost in terms of privacy issues.

This paper shows an interesting and innovative way of aggregating attributes from all sources without having to have the shared identifier. The trick is in using front-channel communication and making each additional source of attributes establish a new session via the browser, reusing the user’s existing SSO session at their home identity provider. And even though this requires modification to both the identity provider (IdP) and SP code, these changes need only be deployed at the target SP and at the attribute providers; no changes need to be made at the user’s home identity provider, which makes this solution feasible to deploy in an existing federated identity environment.

In addition to this innovative solution, the paper also provides a good background introduction to federated identity management. It is definitely worth reading.

Reviewer:  Vladimir Mencl Review #: CR142382 (1409-0768)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Authentication (D.4.6 ... )
 
 
Privacy (K.4.1 ... )
 
 
General (H.2.0 )
 
Would you recommend this review?
yes
no
Other reviews under "Authentication": Date
Showing credentials without identification: transferring signatures between unconditionally unlinkable pseudonyms
Chaum D. (ed)  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)2641990. Type: Proceedings
Jan 1 1992
Some constructions and bounds for authentication codes
Stinson D.  Advances in cryptology--CRYPTO ’86 (, Santa Barbara, CA, Aug 11-15, 1987)4251987. Type: Proceedings
Sep 1 1988
A pauper’s callback scheme
Bishop M. Computers and Security 5(2): 141-144, 1986. Type: Article
Mar 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy