<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>TPIM: Transparent Privacy-Enhanced Identity Management of Web Services</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yong Yang</string-name>
          <email>yongyang@ics.mq.edu.au</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computing, Macquarie University</institution>
          ,
          <country country="AU">Australia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>School of Computer Science, University of Electronic Sci. &amp; Tech. of China</institution>
          ,
          <country country="CN">China</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The growth of web services has been accompanied by sharing more and more users' personal information with service providers, which has raised concern about possible malicious or accidental unauthorized abuse of user information. This paper focuses on how we can give the user a deep sense of safety, privacy and certainty about service invocations in the diverse and heterogeneous computing environment. We present Transparent privacy-enhanced Identity Management of Web Services (TPIM), a privacy-enhanced personal Identity Management architecture for web services users. TPIM is an extension of SOAP speci¯cation, which provides a sense of \circle of trust" in the identity management during the collaborations of web services. It enables that user's identity or personal data to adapt to be accessible only to whom they trust. In other words, a user can put his or her personal information on any web services and maintain privacy in di®erent user-de¯ned security level (including up to unconditional anonymity) as well.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>People are expected to remember di®erent organization-speci¯c user names and
passwords in the online world. Identity management systems seek automated
solutions for managing their identities by making them transferable across
organizational boundaries. However, an increasing sharing personal information with
service providers concerns the user with risks to privacy. Aside from the
endusers' privacy, if the system is perceived as privacy infringing, it will endanger
the reputation of involved service providers, which may lead to loss of pro¯ts in
the long run.</p>
      <p>Research has shown that how to manage the identities in web services and
maintain user's privacy is really a challenge. Many e®orts are made at
\domaincentric" identity management, in which users have no control, and su®er from
the identity theft or fraud. So scientists shift focus onto the dimensions of users
control, where there is no universal agreement to date.
? This work was performed during the author's scienti¯c visit at Department of
Computing, Macquarie University, Australia.</p>
      <p>In this paper we investigate a transparent privacy-enhanced Identity
Management (TPIM ), which enables the users have total control over the management
of their identities. In order to enhance users' privacy, the SOAP standard is
extended and a TPIM framework supporting \Single sign-on"(SSO) is proposed,
which allows the user to access multiple sets of resources after being
authenticated just once. It provides users with a more seamless user-experience when
accessing di®erent user accounts on the Internet.</p>
      <p>To sum up, this paper makes the following main contributions:
{ Id-based Ring signature is introduced and adapted to support unconditional
anonymity. Even if ID information is leaked later on, the user can not be
identi¯ed. Meanwhile the control of privacy preserving shifts from the third
party to users themselves, which greatly increases users' con¯dence and
promotes privacy.
{ The SOAP architecture is extended to enhance privacy in web services. The
user can manage her own pro¯les and have a total control on her identities.
The user can set di®erent levels of security identity. For example, a user may
use a set of credentials or id name to access her blog with security level 1, a
second set to discuss work with her colleagues with security level 2, a third
set to purchase goods online with security level 3. Besides, a novel rule model
is presented to exploit the privacy policies on both the organizational and
execution levels.
2</p>
    </sec>
    <sec id="sec-2">
      <title>RELATED</title>
    </sec>
    <sec id="sec-3">
      <title>WORK</title>
      <p>
        Privacy in general has been exploited for years. However, privacy in web services
is still under development. Research to date has been focused on developing
privacy languages. Rezgui et al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] investigate the feasibility and provable reliability
of privacy preserving solutions for web service infrastructures. Yee [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] and Ni et
al. [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ] designs privacy controllers together with user privacy policies to protect
privacy. Squicciiarini et al. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] provide a set of assertions to de¯ne the privacy
related properties. But none of them addresses the issue of enforcing privacy
that con¯rms to emerging industry standards. Most commercial available
systems such as Microsoft .Net Passport and Liberty Alliance can be improved
on the user-friendly feature. Without consideration of unconditional anonymity,
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] presents a personal Identity Management, which can be a complement with
privacy enhancement.
      </p>
      <p>
        In cryptography, Sharmir [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] introduced the notion of identity-based
(IDbased) cryptography to solve the certi¯cate management problem, which is
supposed to provide a more convenient alternative to the traditional public key
infrastructure (PKI). Ring signature [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] is a type of digital signature that can be
performed by any member of a group of users that each has keys. But it can not
be determined which of the group members' keys was used to produce the
signature. The combination of ID-based cryptography and ring signature schemes
has been well-studied in the recent research. Chow et al. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] proposed a high
e±cient construction of ID-based ring signature, which only needs two pairing
computations for any group size.
      </p>
      <p>Keys Public Store(BBS) Keys
Ring signature creation</p>
      <p>Ring signature verifcation
Identity Generator</p>
      <p>Identity verification
SOAP Head handler</p>
      <p>SOAP Head Handler
Message Body
service
SOAP Client</p>
      <p>SOAP Engine
Client Agent</p>
      <p>Server Agent</p>
    </sec>
    <sec id="sec-4">
      <title>Architecture of TPIM</title>
      <sec id="sec-4-1">
        <title>Design and usage scenario</title>
        <p>The general idea of unconditional anonymity in TPIM is to hide the user's
identity in a group S during service invocations. Figure 1 illustrates the architecture
for our TPIM framework. In order to be convenient for leveraging applications
software, our framework does not break any existing services by acting as add-on
components, which guarantees easy integration with existing web-based
applications. Speci¯cally, TPIM agents will probe in the network layer and snatch
SOAP packages during the monitoring. Once identity related packages are
intercepted, they are forwarded to user space to reconstitute the conversation for
further judgement. After identity veri¯cation, the packages are either dropped
or injected back to network layer. All the procedure are well encapsulated and
executed in the background, making it completely transparent to the end-user.</p>
        <p>We extend SOAP speci¯cation to support security and privacy features
discussed in this paper. The &lt;wsse:security&gt; head blocks are designed to carry
privacy related attributes:
{ ValueType: A string identi¯cation label de¯nes the value space and type
of the encoded binary data. The value we have chosen for our anonymous
group identi¯cation security token is \IdBasedRingSignature".
{ EncodingType: It de¯nes the encoding format of the binary data. In our
protocol it is set to \wsse:Base64Binary" to denote a base64 encoding.
{ NameID: This element describes the group S which the user choose to hide
in. To promote privacy, make sure the members within their lifespan during
the period of invoking. We can use colon (:) marks to concatenate all the
identi¯ers of individuals in the group S. For instance, if such group includes
three persons: Alice, Bob and Lily, the NameID should be \Alice:Bob:Lily".
{ Conditions: Conditions must be evaluated when assessing the validity of the
assertion. NotBefore and NotOnOrAfter, together with IssueInstant de¯ne
the exact lifetime of the assertion.
{ AttributeSatement: It asserts a multi-valued attribute associated with
the authenticated principal. In the response assertion, all the group public
keys information is linked by colon (:) with each other in the same order
of NameID element. For instance, the attribute values for Alice, Bob and
Lily may be \XD6s. . . :ZCCA. . . :ors. . . ". In addition, the correspondent life
expectancy is further supplied to assure the validity of each individual.</p>
        <p>An example of a SOAP header containing anonymous group identi¯cation
is presented in Figure 2. This extension gives rise to an additional payload
required for encoding anonymous identi¯cation tokens in SOAP request that is
proportional to the size of the group the user belongs to.</p>
      </sec>
      <sec id="sec-4-2">
        <title>3.2 Privacy enhanced process</title>
        <p>During the invocation, when the user issues a SOAP request toward Web
services, the message is implicitly intercepted and processed by the client agent.
This handler invokes the identity generator module and prepends the
resulting identi¯cation token together with a timestamp to the SOAP header blocks
of the outgoing request. The identity generator will comply with user's
directive and bind the request to corresponding identity pro¯le. For example, in the
highest security user pro¯les, the Id-based ring signature is produced to attain
unconditional anonymity.</p>
        <p>Whenever the service provider receives a SOAP request from client agent, the
server side agent is implicitly invoked to determine whether the request should
be accepted or not. If the request is for an authorized Web Services and no
grouprelevant identi¯cation information are provided then it is rejected by raising a
SecurityTokenUnavailable SOAP fault. In the case that the timestamp reported
Envelope
&lt;xmls:env&gt;</p>
        <p>Header
Wsse:Security</p>
        <p>BinarySecurityToken
Body
Signature</p>
        <p>&lt; &gt;</p>
        <p>Element Attribute</p>
        <p>Privacy Process lifecycle</p>
        <p>No</p>
        <p>Local Additional</p>
        <p>Process
Extract ring
signature
s Verification
e</p>
        <p>Y
Passed
Label!
o</p>
        <p>N
Abort
Organizational level
Profile</p>
        <p>Activity</p>
        <p>View</p>
        <p>Duration
Organization
context
Execution level
Subject</p>
        <p>Action</p>
        <p>Disclose
to</p>
        <p>Time
in the request is older than a ¯xed security time interval the request is rejected
with FailedAuthentication SOAP fault. Otherwise, the identi¯cation request is
processed by identity veri¯cation module. If the veri¯cation is successful then the
service request is executed and the response is returned to the application client.
Otherwise, a FailedAuthentication SOAP fault is sent back to the requesting
client. A representation of the privacy process life-cycle is depicted in the Figure
3. In order to avoid the °ow peak in SOAP header request, we forward privacy
process to other available server agents for load-balancing.
As shown in Figure 4, a rule model is designed to facilitate user's privacy policy
setting under web service circumstances. Each security policy is de¯ned for and
by an organization. Thus, the speci¯cation of the security policy is completely
parameterized by the organization so that it is possible to handle simultaneously
several security policies associated with di®erent organizations. The model is
not restricted to identity permissions, but also includes the possibility to specify
other identity related information such as priorities.</p>
        <p>The rules are context sensitive, so the policy could be expressed dynamically
at two di®erent levels.
1. Organizational level : The users de¯nes privacy rules through abstract
entities (pro¯le, activity, view, duration) without worrying about how each
organization implements these entities.
2. Execution level : When a user login in other organization, the execution
authorizations are granted (or not) to him according to the execution rules.
TPIM maps from organizational level to execution level for further
elaborate control.</p>
        <p>The derivation of invocation policies can be formalized as : Rule ¡ = P ermission£
¨ £ H while P ermission(s; ®; d; t; c) is de¯ned as 8 subject s 2 S; performs
action ® 2 A, login on to disclose-to service d 2 V; at time t 2 D.</p>
        <p>{ Pro¯les S: A set of identity pro¯les in di®erent security levels.
{ Activity A: A set of aims of identity requests.
{ View V: a set of other services whom the identity information can be
disclosed to.
{ Duration D: A set of durations of validity with regard to identity information.
{ Privacy level ¨ : The identity information should be protected at di®erent
privacy level such as whether it allows service providers to store user's
identity information.
{ Handling H: Once the identity information is breached, what approaches
should be issued to notify the user of the risk, such as sending an email
or an alert. The event-based approach is well suited for services' distributed
environments. Apart from the regular infrastructure, the design will facilitate
measures to integrate accounting and noti¯cation support.
4</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusion</title>
      <p>We have introduced Id-based ring signature into web services and extended the
SOAP standard to achieve privacy enhancement. The user can have su±cient
control on her privacy. It provides a more user-friendly and e±cient ways of
managing digital identities and enables people to assert their privacy rights in
the online world. As future work, we will develop a tool to simulate the rule
model and perform con°ict detection to help the designer to re¯ne rules.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>S. S. M.</given-names>
            <surname>Chow</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.-M.</given-names>
            <surname>Yiu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L. C. K.</given-names>
            <surname>Hui</surname>
          </string-name>
          . E±
          <article-title>cient identity based ring signature</article-title>
          . In J.
          <string-name>
            <surname>Ioannidis</surname>
            ,
            <given-names>A. D.</given-names>
          </string-name>
          <string-name>
            <surname>Keromytis</surname>
          </string-name>
          , and M. Yung, editors,
          <source>ACNS</source>
          , volume
          <volume>3531</volume>
          of Lecture Notes in Computer Science, pages
          <volume>499</volume>
          {
          <fpage>512</fpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>T. M. Eap</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Hatala</surname>
            , and
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Gasevic</surname>
          </string-name>
          .
          <article-title>Enabling user control with personal identity management</article-title>
          .
          <source>scc</source>
          ,
          <volume>0</volume>
          :
          <fpage>60</fpage>
          {
          <fpage>67</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Q.</given-names>
            <surname>Ni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Bertino</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Lobo</surname>
          </string-name>
          .
          <article-title>Conditional privacy-aware role based access control</article-title>
          .
          <source>In ESORICS '07: Proceedings of the 12th European Symposium On Research In Computer Security</source>
          , pages
          <volume>72</volume>
          {
          <fpage>89</fpage>
          . Springer,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Q.</given-names>
            <surname>Ni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Trombetta</surname>
          </string-name>
          , E. Bertino, and
          <string-name>
            <given-names>J.</given-names>
            <surname>Lobo</surname>
          </string-name>
          .
          <article-title>Privacy-aware role based access control</article-title>
          .
          <source>In SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies</source>
          , pages
          <volume>41</volume>
          {
          <fpage>50</fpage>
          , New York, NY, USA,
          <year>2007</year>
          . ACM Press.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>A.</given-names>
            <surname>Rezgui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ouzzani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bouguettaya</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Medjahed</surname>
          </string-name>
          .
          <article-title>Preserving privacy in web services</article-title>
          .
          <source>In WIDM '02: Proceedings of the 4th international workshop on Web information and data management</source>
          , pages
          <volume>56</volume>
          {
          <fpage>62</fpage>
          , New York, NY, USA,
          <year>2002</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>R. L.</given-names>
            <surname>Rivest</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shamir</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tauman</surname>
          </string-name>
          .
          <article-title>How to leak a secret</article-title>
          . In C. Boyd, editor,
          <source>ASIACRYPT</source>
          , volume
          <volume>2248</volume>
          of Lecture Notes in Computer Science, pages
          <volume>552</volume>
          {
          <fpage>565</fpage>
          . Springer,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>A.</given-names>
            <surname>Shamir</surname>
          </string-name>
          .
          <article-title>Identity-based cryptosystems and signature schemes</article-title>
          .
          <source>Proceedings of CRYPTO</source>
          ,
          <volume>84</volume>
          ,
          <year>1984</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>A. C.</given-names>
            <surname>Squicciarini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Hintoglu</surname>
          </string-name>
          , E. Bertino, and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Saygin</surname>
          </string-name>
          .
          <article-title>A privacy preserving assertion based policy language for federation systems</article-title>
          .
          <source>In SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies</source>
          , pages
          <volume>51</volume>
          {
          <fpage>60</fpage>
          , New York, NY, USA,
          <year>2007</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>G. O. M.</given-names>
            <surname>Yee</surname>
          </string-name>
          .
          <article-title>A privacy controller approach for privacy protection in web services</article-title>
          .
          <source>In SWS '07: Proceedings of the 2007 ACM workshop on Secure web services</source>
          , pages
          <volume>44</volume>
          {
          <fpage>51</fpage>
          , New York, NY, USA,
          <year>2007</year>
          . ACM.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>