An identity-matching process to strengthen trust in federated-identity architectures

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

To smoothly counteract privilege escalation in federated-identity architectures, the cross-checking of asserted Personally Identifiable Information (PII) among different sources is highly recommended and advisable. Identity matching is thus a key component for supporting the automated PII cross-checking process. This paper proposes an efficient identity-matching solution, adapted to a chosen User-Relationship Management (URM) platform, relying on a French Territorial Collectivities and Public Administrations (TCPA) use case. The originality of the paper is threefold. (1) It presents an original solution to identity-matching issues raised by a concrete use case from the Territorial Collectivities and the Public Administration (TCPA), formalizing concepts such as information completeness, PII normalization and Levenshtein-distance matrix generation. (2) Implementation guidelines are given to deploy the solution on an operational Publik platform. (3) A precise security analysis is provided, relying on an original attacker model.

Original languageEnglish
Title of host publicationICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications
EditorsChristian Callegari, Soon Xin Ng, Panagiotis Sarigiannidis, Sebastiano Battiato, Angel Serrano Sanchez de Leon, Adlen Ksentini, Pascal Lorenz, Mohammad Obaidat, Mohammad Obaidat, Mohammad Obaidat
PublisherSciTePress
Pages142-154
Number of pages13
ISBN (Electronic)9789897584459
DOIs
Publication statusPublished - 1 Jan 2020
Event17th International Conference on Security and Cryptography, SECRYPT 2020 - Part of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Virtual, Online, France
Duration: 8 Jul 202010 Jul 2020

Publication series

NameICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications
Volume3

Conference

Conference17th International Conference on Security and Cryptography, SECRYPT 2020 - Part of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020
Country/TerritoryFrance
CityVirtual, Online
Period8/07/2010/07/20

Keywords

  • Citizen-relationship management
  • Federated-identity architecture
  • Identity management
  • Identity matching
  • Trust enforcement

Fingerprint

Dive into the research topics of 'An identity-matching process to strengthen trust in federated-identity architectures'. Together they form a unique fingerprint.

Cite this