TY - GEN
T1 - An identity-matching process to strengthen trust in federated-identity architectures
AU - Marillonnet, Paul
AU - Ates, Mikaël
AU - Laurent, Maryline
AU - Kaaniche, Nesrine
N1 - Publisher Copyright:
Copyright © 2020 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved
PY - 2020/1/1
Y1 - 2020/1/1
N2 - To smoothly counteract privilege escalation in federated-identity architectures, the cross-checking of asserted Personally Identifiable Information (PII) among different sources is highly recommended and advisable. Identity matching is thus a key component for supporting the automated PII cross-checking process. This paper proposes an efficient identity-matching solution, adapted to a chosen User-Relationship Management (URM) platform, relying on a French Territorial Collectivities and Public Administrations (TCPA) use case. The originality of the paper is threefold. (1) It presents an original solution to identity-matching issues raised by a concrete use case from the Territorial Collectivities and the Public Administration (TCPA), formalizing concepts such as information completeness, PII normalization and Levenshtein-distance matrix generation. (2) Implementation guidelines are given to deploy the solution on an operational Publik platform. (3) A precise security analysis is provided, relying on an original attacker model.
AB - To smoothly counteract privilege escalation in federated-identity architectures, the cross-checking of asserted Personally Identifiable Information (PII) among different sources is highly recommended and advisable. Identity matching is thus a key component for supporting the automated PII cross-checking process. This paper proposes an efficient identity-matching solution, adapted to a chosen User-Relationship Management (URM) platform, relying on a French Territorial Collectivities and Public Administrations (TCPA) use case. The originality of the paper is threefold. (1) It presents an original solution to identity-matching issues raised by a concrete use case from the Territorial Collectivities and the Public Administration (TCPA), formalizing concepts such as information completeness, PII normalization and Levenshtein-distance matrix generation. (2) Implementation guidelines are given to deploy the solution on an operational Publik platform. (3) A precise security analysis is provided, relying on an original attacker model.
KW - Citizen-relationship management
KW - Federated-identity architecture
KW - Identity management
KW - Identity matching
KW - Trust enforcement
U2 - 10.5220/0009828401420154
DO - 10.5220/0009828401420154
M3 - Conference contribution
AN - SCOPUS:85109216396
T3 - ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications
SP - 142
EP - 154
BT - ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications
A2 - Callegari, Christian
A2 - Ng, Soon Xin
A2 - Sarigiannidis, Panagiotis
A2 - Battiato, Sebastiano
A2 - de Leon, Angel Serrano Sanchez
A2 - Ksentini, Adlen
A2 - Lorenz, Pascal
A2 - Obaidat, Mohammad
A2 - Obaidat, Mohammad
A2 - Obaidat, Mohammad
PB - SciTePress
T2 - 17th International Conference on Security and Cryptography, SECRYPT 2020 - Part of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020
Y2 - 8 July 2020 through 10 July 2020
ER -