<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">TPIM: Transparent Privacy-Enhanced Identity Management of Web Services</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Yong</forename><surname>Yang</surname></persName>
							<email>yongyang@ics.mq.edu.au</email>
							<affiliation key="aff0">
								<orgName type="department">School of Computer Science</orgName>
								<orgName type="institution">University of Electronic Sci. &amp; Tech. of China</orgName>
								<address>
									<country key="CN">China</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">Department of Computing</orgName>
								<orgName type="institution">Macquarie University</orgName>
								<address>
									<country key="AU">Australia</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="department">Department of Com-puting</orgName>
								<orgName type="institution">Macquarie University</orgName>
								<address>
									<country key="AU">Australia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">TPIM: Transparent Privacy-Enhanced Identity Management of Web Services</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">E55A5119F7A6390731E811D2FF75C94E</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T08:57+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>Ring signature verifcation Ring signature creation Identity verification Identity Generator</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The growth of web services has been accompanied by sharing more and more users' personal information with service providers, which has raised concern about possible malicious or accidental unauthorized abuse of user information. This paper focuses on how we can give the user a deep sense of safety, privacy and certainty about service invocations in the diverse and heterogeneous computing environment. We present Transparent privacy-enhanced Identity Management of Web Services (TPIM), a privacy-enhanced personal Identity Management architecture for web services users. TPIM is an extension of SOAP specification, which provides a sense of "circle of trust" in the identity management during the collaborations of web services. It enables that user's identity or personal data to adapt to be accessible only to whom they trust. In other words, a user can put his or her personal information on any web services and maintain privacy in different user-defined security level (including up to unconditional anonymity) as well.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>People are expected to remember different organization-specific user names and passwords in the online world. Identity management systems seek automated solutions for managing their identities by making them transferable across organizational boundaries. However, an increasing sharing personal information with service providers concerns the user with risks to privacy. Aside from the endusers' privacy, if the system is perceived as privacy infringing, it will endanger the reputation of involved service providers, which may lead to loss of profits in the long run.</p><p>Research has shown that how to manage the identities in web services and maintain user's privacy is really a challenge. Many efforts are made at "domaincentric" identity management, in which users have no control, and suffer from the identity theft or fraud. So scientists shift focus onto the dimensions of users control, where there is no universal agreement to date.</p><p>In this paper we investigate a transparent privacy-enhanced Identity Management (TPIM ), which enables the users have total control over the management of their identities. In order to enhance users' privacy, the SOAP standard is extended and a TPIM framework supporting "Single sign-on"(SSO) is proposed, which allows the user to access multiple sets of resources after being authenticated just once. It provides users with a more seamless user-experience when accessing different user accounts on the Internet.</p><p>To sum up, this paper makes the following main contributions:</p><p>-Id-based Ring signature is introduced and adapted to support unconditional anonymity. Even if ID information is leaked later on, the user can not be identified. Meanwhile the control of privacy preserving shifts from the third party to users themselves, which greatly increases users' confidence and promotes privacy. -The SOAP architecture is extended to enhance privacy in web services. The user can manage her own profiles and have a total control on her identities. The user can set different levels of security identity. For example, a user may use a set of credentials or id name to access her blog with security level 1, a second set to discuss work with her colleagues with security level 2, a third set to purchase goods online with security level 3. Besides, a novel rule model is presented to exploit the privacy policies on both the organizational and execution levels.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">RELATED WORK</head><p>Privacy in general has been exploited for years. However, privacy in web services is still under development. Research to date has been focused on developing privacy languages. Rezgui et al. <ref type="bibr" target="#b4">[5]</ref> investigate the feasibility and provable reliability of privacy preserving solutions for web service infrastructures. Yee <ref type="bibr" target="#b8">[9]</ref> and Ni et al. <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref> designs privacy controllers together with user privacy policies to protect privacy. Squicciiarini et al. <ref type="bibr" target="#b7">[8]</ref> provide a set of assertions to define the privacy related properties. But none of them addresses the issue of enforcing privacy that confirms to emerging industry standards. Most commercial available systems such as Microsoft .Net Passport and Liberty Alliance can be improved on the user-friendly feature. Without consideration of unconditional anonymity, <ref type="bibr" target="#b1">[2]</ref> presents a personal Identity Management, which can be a complement with privacy enhancement. In cryptography, Sharmir <ref type="bibr" target="#b6">[7]</ref> introduced the notion of identity-based (IDbased) cryptography to solve the certificate management problem, which is supposed to provide a more convenient alternative to the traditional public key infrastructure (PKI). Ring signature <ref type="bibr" target="#b5">[6]</ref> is a type of digital signature that can be performed by any member of a group of users that each has keys. But it can not be determined which of the group members' keys was used to produce the signature. The combination of ID-based cryptography and ring signature schemes has been well-studied in the recent research. Chow et al. <ref type="bibr" target="#b0">[1]</ref> proposed a high efficient construction of ID-based ring signature, which only needs two pairing computations for any group size. The general idea of unconditional anonymity in TPIM is to hide the user's identity in a group S during service invocations. Figure <ref type="figure" target="#fig_0">1</ref> illustrates the architecture for our TPIM framework. In order to be convenient for leveraging applications software, our framework does not break any existing services by acting as add-on components, which guarantees easy integration with existing web-based applications. Specifically, TPIM agents will probe in the network layer and snatch SOAP packages during the monitoring. Once identity related packages are intercepted, they are forwarded to user space to reconstitute the conversation for further judgement. After identity verification, the packages are either dropped or injected back to network layer. All the procedure are well encapsulated and executed in the background, making it completely transparent to the end-user.</p><p>We extend SOAP specification to support security and privacy features discussed in this paper. The &lt;wsse:security&gt; head blocks are designed to carry privacy related attributes:</p><p>-ValueType: A string identification label defines the value space and type of the encoded binary data. The value we have chosen for our anonymous group identification security token is "IdBasedRingSignature". -EncodingType: It defines the encoding format of the binary data. In our protocol it is set to "wsse:Base64Binary" to denote a base64 encoding. -NameID: This element describes the group S which the user choose to hide in. To promote privacy, make sure the members within their lifespan during the period of invoking. We can use colon (:) marks to concatenate all the identifiers of individuals in the group S. For instance, if such group includes three persons: Alice, Bob and Lily, the NameID should be "Alice:Bob:Lily".</p><p>-Conditions: Conditions must be evaluated when assessing the validity of the assertion. NotBefore and NotOnOrAfter, together with IssueInstant define the exact lifetime of the assertion. -AttributeSatement: It asserts a multi-valued attribute associated with the authenticated principal. In the response assertion, all the group public keys information is linked by colon (:) with each other in the same order of NameID element. For instance, the attribute values for Alice, Bob and Lily may be "XD6s. . . :ZCCA. . . :ors. . . ". In addition, the correspondent life expectancy is further supplied to assure the validity of each individual.</p><p>An example of a SOAP header containing anonymous group identification is presented in Figure <ref type="figure">2</ref>. This extension gives rise to an additional payload required for encoding anonymous identification tokens in SOAP request that is proportional to the size of the group the user belongs to.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Privacy enhanced process</head><p>During the invocation, when the user issues a SOAP request toward Web serthe message is implicitly intercepted and processed by the client agent. This handler invokes the identity generator module and prepends the resulting identification token together with a timestamp to the SOAP header blocks of the outgoing request. The identity generator will comply with user's directive and bind the request to corresponding identity profile. For example, in the highest security user profiles, the Id-based ring signature is produced to attain unconditional anonymity.</p><p>Whenever the service provider receives a SOAP request from client agent, the server side agent is implicitly invoked to determine whether the request should be accepted or not. If the request is for an authorized Web Services and no grouprelevant identification information are provided then it is rejected by raising a SecurityTokenUnavailable SOAP fault. In the case that the timestamp reported in the request is older than a fixed security time interval the request is rejected with FailedAuthentication SOAP fault. Otherwise, the identification request is processed by identity verification module. If the verification is successful then the service request is executed and the response is returned to the application client. Otherwise, a FailedAuthentication SOAP fault is sent back to the requesting client. A representation of the privacy process life-cycle is depicted in the Figure <ref type="figure">3</ref>. In order to avoid the flow peak in SOAP header request, we forward privacy process to other available server agents for load-balancing.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">A TPIM rule model</head><p>As shown in Figure <ref type="figure" target="#fig_3">4</ref>, a rule model is designed to facilitate user's privacy policy setting under web service circumstances. Each security policy is defined for and by an organization. Thus, the specification of the security policy is completely parameterized by the organization so that it is possible to handle simultaneously several security policies associated with different organizations. The model is not restricted to identity permissions, but also includes the possibility to specify other identity related information such as priorities.</p><p>The rules are context sensitive, so the policy could be expressed dynamically at two different levels.</p><p>1. Organizational level : The users defines privacy rules through abstract entities (profile, activity, view, duration) without worrying about how each organization implements these entities. 2. Execution level : When a user login in other organization, the execution authorizations are granted (or not) to him according to the execution rules.</p><p>TPIM maps from organizational level to execution level for further elaborate control.</p><p>The derivation of invocation policies can be formalized as : Rule Γ = P ermission× Υ × H while P ermission(s, α, d, t, c) is defined as ∀ subject s ∈ S, performs action α ∈ A, login on to disclose-to service d ∈ V, at time t ∈ D.</p><p>-Profiles S: A set of identity profiles in different security levels.</p><p>-Activity A: A set of aims of identity requests.</p><p>-View V: a set of other services whom the identity information can be disclosed to. -Duration D: A set of durations of validity with regard to identity information.</p><p>-Privacy level Υ : The identity information should be protected at different privacy level such as whether it allows service providers to store user's identity information.</p><p>-Handling H: Once the identity information is breached, what approaches should be issued to notify the user of the risk, such as sending an email or an alert. The event-based approach is well suited for services' distributed environments. Apart from the regular infrastructure, the design will facilitate measures to integrate accounting and notification support.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusion</head><p>We have introduced Id-based ring signature into web services and extended the SOAP standard to achieve privacy enhancement. The user can have sufficient control on her privacy. It provides a more user-friendly and efficient ways of managing digital identities and enables people to assert their privacy rights in the online world. As future work, we will develop a tool to simulate the rule model and perform conflict detection to help the designer to refine rules.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Privacy-enhanced framework 3 Architecture of TPIM 3.1 Design and usage scenario</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 2 FinishFig. 3 .</head><label>23</label><figDesc>Fig. 2. SOAP extension</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. rule model for TPIM</figDesc></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Efficient identity based ring signature</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S M</forename><surname>Chow</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S.-M</forename><surname>Yiu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">C K</forename><surname>Hui</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>J. Ioannidis, A. D. Keromytis, and M. Yung</editor>
		<imprint>
			<biblScope unit="volume">3531</biblScope>
			<biblScope unit="page" from="499" to="512" />
			<date type="published" when="2005">2005</date>
			<publisher>ACNS</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Enabling user control with personal identity management</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">M</forename><surname>Eap</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hatala</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Gasevic</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">scc</title>
		<imprint>
			<biblScope unit="volume">0</biblScope>
			<biblScope unit="page" from="60" to="67" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Conditional privacy-aware role based access control</title>
		<author>
			<persName><forename type="first">Q</forename><surname>Ni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Bertino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lobo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ESORICS &apos;07: Proceedings of the 12th European Symposium On Research In Computer Security</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="72" to="89" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Privacy-aware role based access control</title>
		<author>
			<persName><forename type="first">Q</forename><surname>Ni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Trombetta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Bertino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lobo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">SACMAT &apos;07: Proceedings of the 12th ACM symposium on Access control models and technologies</title>
				<meeting><address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="41" to="50" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Preserving privacy in web services</title>
		<author>
			<persName><forename type="first">A</forename><surname>Rezgui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ouzzani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bouguettaya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Medjahed</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">WIDM &apos;02: Proceedings of the 4th international workshop on Web information and data management</title>
				<meeting><address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="56" to="62" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">How to leak a secret</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">L</forename><surname>Rivest</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Shamir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Tauman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ASIACRYPT</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">C</forename><surname>Boyd</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2001">2001</date>
			<biblScope unit="volume">2248</biblScope>
			<biblScope unit="page" from="552" to="565" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Identity-based cryptosystems and signature schemes</title>
		<author>
			<persName><forename type="first">A</forename><surname>Shamir</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of CRYPTO</title>
				<meeting>CRYPTO</meeting>
		<imprint>
			<date type="published" when="1984">1984</date>
			<biblScope unit="volume">84</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A privacy preserving assertion based policy language for federation systems</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">C</forename><surname>Squicciarini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Hintoglu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Bertino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Saygin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">SACMAT &apos;07: Proceedings of the 12th ACM symposium on Access control models and technologies</title>
				<meeting><address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="51" to="60" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">A privacy controller approach for privacy protection in web services</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">O M</forename><surname>Yee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">SWS &apos;07: Proceedings of the 2007 ACM workshop on Secure web services</title>
				<meeting><address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="44" to="51" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
