Towards Constructing a Trustworthy Internet: Privacy-aware Transfer of Digital Identity Document in Content Centric Internetworking Amine Abidi1, Ghazi Ben Ayed2, Farouk Kamoun3 1

2

CRISTAL Lab, ENSI School of Engineering, University of Manouba, Tunisia Department of Information Systems, Faculty of Business and Economics, University of Lausanne, CH-1015, Lausanne, Switzerland 3 SESAME University, Tunis, Tunisia [email protected], [email protected], [email protected]

Abstract. Managing digital identity documents with a proper privacy protection is of pivotal importance to construct trustworthy Internet. As far as the amount of digital identities is expanding at an accelerating rate, content-centric model provides administration capabilities of data transfer. We propose an innovative approach and implementation of privacy-aware Content-Centric Internetworking (CCN)-based of federated digital identity. Privacy requirements related to identity are translated with user-centric federated digital identity parlance into a set of eleven rules. CCN has been enforced by respecting a set of rules, designing a data packet and creating an identity contract. We provide an implementation of privacy-aware CCN data packet that is bound to XML-based digital identity document. We explain that the forwarding engine verifies the validity of digital identity document transmission on the basis of identity contract terms. Three use cases are presented to detail the proposed approach with the corresponding UML sequence diagrams. Keywords: Federated digital identity, content-centric internetworking, privacy contract, data packet.

1 Introduction Internet is qualified as ‘trustworthy’ when users depend on and trust it; otherwise the cost of the distrust would be high. Trustworthy Internet promises security, reliability and resilience to attacks and operational failures that fit into mechanisms, architectures and networking infrastructures. In addition to quality of service, protecting user’s data, ensuring privacy and providing usable and trusted tools to support users in their security management are guaranteed [1]. Thus, managing digital identity with proper privacy protection is of pivotal importance for creating the necessary trust for the Internet. Data-centric architecture has proven to be a promising model to accommodate in and drive the Internet of the future. Wired and wireless communication networks are making data collection and transmission cheap and widespread. Data-centric

Towards Constructing a Trustworthy Internet: Privacy ...

... drive the Internet of the future. Wired and wireless communication networks are making data collection and transmission cheap and widespread. Data-centric.

9KB Sizes 0 Downloads 137 Views

Recommend Documents

Towards a Future Internet Architecture
offers little feedback for hosts to perform root cause discovery and analysis. ... agement, fast data mining and retrieval, refreshing and removal optimized for dif-.

Towards a Future Internet Architecture
This article is published with open access at SpringerLink.com. Towards ... 5 Center of Research and Technology Hellas/ITI, Greece daras@iti. ..... mobility is enabled by wireless networks, packets can be dropped because of corrup- tion loss ...

Internet Privacy Policy.pdf
Page 1 of 2. Page 1 of 2. Page 2 of 2. Page 2 of 2. Internet Privacy Policy.pdf. Internet Privacy Policy.pdf. Open. Extract. Open with. Sign In. Details. Comments.

Internet Privacy Policy.pdf
Page 2 of 2. Internet Privacy Policy.pdf. Internet Privacy Policy.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Internet Privacy Policy.pdf.

Taxation and Privacy Protection on Internet Platforms
Oct 4, 2015 - The immense profits of (some not all) internet platforms suggests ... specific tax paid by users (like a tax on internet service providers) produces ...

Trustworthy Proxies - Research at Google
In a language with both proxies and objects with invariants, these features in- teract. ...... 8 See http://wiki.ecmascript.org/doku.php?id=harmony:weak_maps.

Choreographies in the Wild - Trustworthy Computational Societies
Nov 30, 2014 - the “bottom layer” of the software stack [9]. To overcome the state .... of such a choreography guarantees progress and safety of the contractual agreement (Theorem 3.9). We can exploit the ... does not guarantee that progress and

Constructing Reliable Distributed Communication ... - CiteSeerX
bixTalk, and IBM's MQSeries. The OMG has recently stan- dardized an Event Channel service specification to be used in conjunction with CORBA applications.

constructing connections
CONSTRUCTING CONNECTIONS: MUSEOLOGICAL THEORY AND BLOGGING ... with Web 2.0 include: blogging, wikis, podcasts, tagging, videoblogs, online social .... school age children and increasingly for adults and exhibit making.

Cheap privacy filter 14 inch Laptop Privacy Screens Anti Privacy ...
Cheap privacy filter 14 inch Laptop Privacy Screens A ... Monitor 31.0df17.4cm Privacy Anti-Spy Screen 16-9.pdf. Cheap privacy filter 14 inch Laptop Privacy ...

Towards a clearer image - Nature
thus do not resolve the question of whether humans, like monkeys, have mirror neurons in the parietal lobe. However, there are several differ- ences between the studies that have to be taken into account, including the precise cortical location of th

A Practical Algorithm for Constructing Oblivious Routing ...
computing, as e.g. multicast routing and data management problems. Furthermore .... on level l ≥ 1 if both endpoints of e are contained in the same level l − 1 ...

Constructing Connections: A Museological Approach to ...
blogs usually include the hosting service name in the web address, such as generic- ... 10. For the purposes of this thesis, conversation is not necessarily oral; the written ..... their best advantage by museums, have the potential to help fulfill t

Collaborative Inquiry in Co-constructing a Better ...
In primary schools, writing is a big problem. Children do not like to write and don‟t write well. ..... Adult and Continuing Education, No. 94, Jossey-Bass. Zhang ...

Verifiable abstractions for contract-oriented systems - Trustworthy ...
Jun 11, 2015 - “Social Glue”, by MIUR PRIN 2010-11 project “Security Horizons”, and by EU ..... We observe that the notion of compliance in Definition 2.3 is ...

Verifiable abstractions for contract-oriented systems - Trustworthy ...
Jun 11, 2015 - Contract-oriented computing [1] is a design paradigm for distributed systems wherein the interaction ... “Social Glue”, by MIUR PRIN 2010-11 project “Security Horizons”, ...... To overcome these problems, we present below an ab

Dilation Bootstrap: a method for constructing ...
Keywords: Partial identification, incomplete specification test, duality, dilation ...... 15 minutes for n = 1000 on an AMD Opteron (tm) Processor 250 with 4G of ...

Toward Trustworthy Recommender Systems: An ...
systems: An analysis of attack models and algorithm robustness. ACM Trans. Intern. Tech. 7, 4,. Article 20 ..... knowledge attack if it requires very detailed knowledge the ratings distribution in a recommender system's ... aim of an attacker might b