ilikeafrica.com

Innovative Summaries and Translations of Scientific Papers

Digital Identity in The Absence of Authorities: A New Socio-Technical Approach

|

This post, leveraging AI, summarizes and analyzes the key aspects of the research paper “Digital Identity in The Absence of Authorities: A New Socio-Technical Approach”. For in-depth information, please refer to the original PDF.


📄 Original PDF: Download / View Fullscreen

English Summary

Digital Identity in The Absence of Authorities: A New Socio-Technical Approach Mark McLaughlin∗ Gerard Briscoe† Paul Malone∗ Abstract On the Internet large service providers tend to control the digital identities of users. These defacto identity authorities wield significant power over users, compelling them to comply with non-negotiable terms, before access to services2010 is granted. In doing so, users expose themselves to privacy risks, manipulation and Oct exploitationevital Ecosystemsvia anddirectuser-centricmarketing.identityAgainstemphasisethis backdrop,decentralisedthe emergingenvironmentsareas of withDig- independent self-detringuing entities that control their own data and identity. We 31 show that recent advances in user-centric identity, federated identity and trust have prepared the ground for decentralised identity provisioning. We show how social trust, rather than blind deference to authorities, can provide a basis for identity, where risks can be weighed and compared rather than merely accepted. Funda- mentally, we are considering the move from authority-centric centralised identity provisioning to user-centric distributed identity provisioning. Finally, we highlight[cs.CY] the potential impacts of distributed identity provisioning in the Information Society and give a brief roadmap for its general implementation and adoption. Keywords: digital identity, user-centric, federated identity, trust, decentralised 1 Introduction This paper is concerned with digital identity1 in decentralised environments, where iden- tity authorities either do not exist or play a limited role. We have two decentralised environments in mind: i) the web, where users access services on the Internet via a web browser, and ii) Digital Ecosystem platforms where users use enhanced clients to accessarXiv:1011.0192v1 web services via arbitrary service access protocols. Usually, our analysis applies equally to both cases; where this is otherwise, a distinction is made. The ethos of Digital Ecosystemsvia (DEs) favours open, distributed service platforms as an alternative to the ‘keystone’ model, in which entities cluster around systems that are owned and maintained by a small number of authoritative entities. DEs are composed of distributed, interconnected groups of equal entities, in contrast to the keystone model ∗Telecommunications Software & Systems Group, Waterford Institute of Technology, Ireland, {mmclaughlin, pmalone}@tssg.org †Department of Media and Communications, London School of Economics and Political Science, United Kingdom, g.briscoe@lse.ac.uk 1 that fosters an undesirable dependence of ‘ordinary’ entities on ‘authoritative’ entities. DEs are effective when they foster broad, diverse organisations of entities that are free to compete and collaborate based on dynamic social factors. Identity in DEs must be similarly distributed and decentralised, and founded on social relationships within the ecosystem. The virtual organisation of identities in an ecosystem can be described as emergent, decentralised, informal, and though based on local relationships is potentially global in extent. Traditionally, identity has been concerned almost solely with the use of a username-password pair to authenticate a user for access to a service. A small set of data items stored by the service provider (SP) determines the user’s access rights and other information pertinent to service use. Users, typically, have one identity per service, and the SP provides the identity, via an internal identity provider (IdP). The IdP is responsible for retaining information pertaining to this identity, providing authentication and authorisation, and generally speaking presiding over the entire life-cycle of the identity. For each service, there is a prescribed IdP that users must deal with. Where services become very popular, and where services proliferate on the same network, or service platform (e.g. Google, Yahoo!), a common IdP is invariably used to manage identities for all services. These IdPs are identity authorities for those environments and users are compelled to accept their terms of service and to trust them with supplied personal information. Recent developments in identity, driven by technical, social and business concerns have begun to change this landscape significantly. User-centric identity developments have led to the logical and functional separation of SP and IdP, which allows the user to choose the IdP that provides their identity to an SP. Federated Identity is concerned with linking identity domains intra-and interorganisation such as users in one domain can consume services in another. “Federated identity infrastructure enables cross-boundary single sign-on (SSO), dynamic user provisioning and identity attribute sharing. By providing for identity portability, identity federation affords end-users with increased simplicity and control over the movement of personal identity information while simultaneously enabling companies to extend their security perimeter to trusted partners.” (SourceID, 2009). User-centric identity is a philosophy, and set of supporting standards and technologies, for empowering the user by giving them control over their identities (Maler and Reed, 2008). The major philosophical innovation is in forming a distinction between SP and IdP in online applications, where the two have always been seamlessly integrated, and providing those SPs (e.g. Facebook, Twitter) to use an IdP of the user’s choice (rather than its own) to authenticate the user for the service. This move has given users the opportunity to manage consent for personal data disclosure, manage their own credentials, and perform authentication, or SSO (where the IdP will authenticate the user to a range of services), independently of SPs4 (e.g. OpenID5). Trust has long been a topic of study in psychology, sociology, philosophy and economics; but in the nineties it has also found application in e-commerce, particularly in online markets such as eBay (Sabater and Sierra, 2005). Trust can be described as “a directional relationship between two parties that can be called trustor and trustee,” (Jøsang, 2007) where a trustor is said to trust, or not to trust, a trustee, in a particular context. Trust transitivity describes how trust propagates on social networks, and is predicated on the principle that if A trusts B and B trusts C, indirectly trusts C under certain conditions (Huang and Fox, 2006). These trusted beliefs feed into decision making in the real world, and recently in the online worl

Key Technical Terms

Below are key technical terms and their explanations to help understand the core concepts of this paper. You can explore related external resources via the links next to each term.

View Original Excerpt (English)

Digital Identity in The Absence of Authorities: A New Socio-Technical Approach Mark McLaughlin∗ Gerard Briscoe† Paul Malone∗ Abstract On the Internet large service providers tend to control the digital identities of users. These defacto identity authorities wield significant power over users, compelling them to comply with non-negotiable terms, before access to services2010 is granted. In doing so, users expose themselves to privacy risks, manipulation and Oct exploitationital Ecosystemsvia anddirectuser-centricmarketing.identityAgainstemphasisethis backdrop,decentralisedthe emergingenvironmentsareas of withDig- independent self-determining entities that control their own data and identity. We 31 show that recent advances in user-centric identity, federated identity and trust have prepared the ground for decentralised identity provisioning. We show how social trust, rather than blind deference to authorities, can provide a basis for identity, where risks can be weighed and compared rather than merely accepted. Funda- mentally, we are considering the move from authority-centric centralised identity provisioning to user-centric distributed identity provisioning. Finally, we highlight[cs.CY] the potential impacts of distributed identity provisioning in the Information Society and give a brief roadmap for its general implementation and adoption. Keywords: digital identity, user-centric, federated identity, trust, decentralised 1 Introduction This paper is concerned with digital identity1 in decentralised environments, where iden- tity authorities either do not exist or play a limited role. We have two decentralised environments in mind: i) the web, where users access services on the Internet via a web browser, and ii) Digital Ecosystem platforms where users use enhanced clients to accessarXiv:1011.0192v1 web services via arbitrary service access protocols. Usually, our analysis applies equally to both cases; where this is otherwise, a distinction is made. The ethos of Digital Ecosystems2 (DEs) favours open, distributed service platforms as an alternative to the ‘keystone’ model, in which entities cluster around systems that are owned and maintained by a small number of authoritative entities. DEs…

🇰🇷 한국어 보기 (View in Korean)

한글 요약 (Korean Summary)

Korean summary generation failed or content is empty.

주요 기술 용어 (한글 설명)

  • Digital Identity
    설명 (Korean): 컴퓨터 시스템과 인터넷에서 개인이 식별되는 방법에 대한 개념. 실제로 사용자를 대표하는 데 사용되는 부분 정체성을 나타냅니다.
    (Original English: Concept of how individuals are identified on computer systems and internet. Represents a partial identity that is used to represent users in practice.)
  • Federated Identity
    설명 (Korean): 대규모 조직 및 기업에서 별도의 ID 도메인을 활성화하여 한 도메인의 사용자가 다른 도메인에서 서비스를 소비 할 수 있도록합니다. SSO (Shine Single Sign-on), 동적 사용자 프로비저닝을 생성하고 회사가 보안 경계를 신뢰할 수있는 파트너로 확장 할 수 있도록합니다.
    (Original English: Process enabling separate identity domains across large organizations and enterprise, allowing users in one domain to consume services in another. Creates cross-boundary single sign-on (SSO), dynamic user provisioning, and enables companies to extend security perimeter to trusted partners.)
  • User-centric Identity
    설명 (Korean): 철학은 사용자가 자신의 정체성을 통제함으로써 권한을 부여합니다. 온라인 응용 프로그램에서 SPS 및 IDP의 논리적 분리 결과. SPS (Facebook, Twitter)와 SPS가 SPS의 자체 ID 제공자와 독립적으로 사용자를 인증하는 데 사용되는 IDP를 구별합니다.
    (Original English: Philosophy empowering users by giving them control over their identities. Results from logical separation of SPs and IdPs in online applications. Creates distinction between SPs (Facebook, Twitter) and IdPs where SPs are used to authenticate users independently of SPs’ own identity providers.)
  • Trust
    설명 (Korean): 한 당사자는 신탁자와 수탁자 당사자 간의 방향성 관계를 기반으로 한 당사자가 있습니다. 현실 세계의 의사 결정에 영향을 미치는 전이 신뢰 또는 신념 신뢰와 같은 의사 결정 프로세스를 위해 다양한 모델을 사용하여 계산할 수 있습니다.
    (Original English: Confidence one party has in another based on directional relationships between trustor and trustee parties. Can be computed using various models for decision making processes such as transitive trust or belief trust which feed into decision making in the real world.)
  • Decentralised Identity Provisioning
    설명 (Korean): 프로세스를 통해 개인 데이터 공개에 대한 동의를 관리하고 SPS와 독립적으로 인증을 수행하며 Federated Identity Infrastructure를 사용하여 SSO (Shine Single Sign-On)를 만듭니다. 권한 중심 중앙 정체성 정체성 프로비저닝에서 사용자 중심 분산 신원 프로비저닝으로의 이동을 강조합니다.
    (Original English: Process allowing users to manage consent for personal data disclosure, perform authentication independently of SPs, and create cross-boundary single sign-on (SSO) using federated identity infrastructure. Emphasizes move from authority-centric centralized identity provisioning to user-centric distributed identity provisioning where risks are weighed and compared rather than merely accepted.)

발췌문 한글 번역 (Korean Translation of Excerpt)

당국이 없을 때의 디지털 정체성 : 새로운 사회 기술적 접근법 Mark McLaughlin * Gerard Briscoe † Paul Malone * 인터넷 대형 서비스 제공 업체는 사용자의 디지털 신원을 제어하는 ​​경향이 있습니다. 이러한 DEFACTO ID 당국은 사용자에게 중요한 권한을 부여하여 Services2010에 대한 액세스 권한이 부여되기 전에 협상 불가능한 용어를 준수하도록 강요했습니다. 그렇게함으로써 사용자는 개인 정보 보호 위험, 조작 및 OCT 익스플로레이션 생태계 생태계 및 디렉터 중심의 마커 팅에 노출됩니다. identityAgainStemphasisesThis 배경 배경, 자체 데이터 및 정체성을 통제하는 독립적 인자가 결정 기관의 신흥 환경 조건이 분산되어 있습니다. 우리는 31 사용자 중심의 정체성, 연합 정체성 및 신뢰의 발전이 분산 된 신원 공급을위한 근거를 준비했음을 보여줍니다. 우리는 당국에 대한 맹목적인 연기보다는 사회적 신뢰가 어떻게 위험을 측정하고 비교할 수있는 정체성의 기초를 제공 할 수 있는지 보여줍니다. 기본적으로, 우리는 권한 중심 중앙 정체성 프로비저닝에서 사용자 중심 분산 신원 프로비저닝으로의 이동을 고려하고 있습니다. 마지막으로, 우리는 정보 사회에서 분산 신원 프로비저닝의 잠재적 영향을 [cs.cy]를 강조하고 일반적인 구현 및 채택을위한 간단한 로드맵을 제공합니다. 키워드 : 디지털 아이덴티티, 사용자 중심, 연합 정체성, 신뢰, 분산 된 분산 1 소개이 백서는 분산 된 환경에서 디지털 정체성 1과 관련이 있습니다. 우리는 사용자가 웹 브라우저를 통해 인터넷에서 서비스에 액세스하는 웹 및 ii) 사용자가 AccessArxiv : 1011.0192V1 웹 서비스를 임의의 서비스 액세스 프로토콜을 통해 사용하는 디지털 생태계 플랫폼 인 웹과 같은 두 가지 분산 환경을 염두에두고 있습니다. 일반적으로 우리의 분석은 두 경우 모두에 동일하게 적용됩니다. 그렇지 않으면 차이가 이루어집니다. DES (Digital Ecosystems2)의 정신은 ‘키스톤’모델의 대안으로 개방 된 분산 서비스 플랫폼을 개방하며,이 엔터티는 소수의 권위있는 단체가 소유하고 유지 관리하는 시스템을 중심으로 클러스터링됩니다. DES …


Source: arXiv.org (or the original source of the paper)

답글 남기기

이메일 주소는 공개되지 않습니다. 필수 필드는 *로 표시됩니다