| Literature DB >> 22778634 |
Rosa Sánchez-Guerrero1, Florina Almenárez, Daniel Díaz-Sánchez, Andrés Marín, Patricia Arias, Fabio Sanvido.
Abstract
Credential-based authorization offers interesting advantages for ubiquitous scenarios involving limited devices such as sensors and personal mobile equipment: the verification can be done locally; it offers a more reduced computational cost than its competitors for issuing, storing, and verification; and it naturally supports rights delegation. The main drawback is the revocation of rights. Revocation requires handling potentially large revocation lists, or using protocols to check the revocation status, bringing extra communication costs not acceptable for sensors and other limited devices. Moreover, the effective revocation consent--considered as a privacy rule in sensitive scenarios--has not been fully addressed. This paper proposes an event-based mechanism empowering a new concept, the sleepyhead credentials, which allows to substitute time constraints and explicit revocation by activating and deactivating authorization rights according to events. Our approach is to integrate this concept in IdM systems in a hybrid model supporting delegation, which can be an interesting alternative for scenarios where revocation of consent and user privacy are critical. The delegation includes a SAML compliant protocol, which we have validated through a proof-of-concept implementation. This article also explains the mathematical model describing the event-based model and offers estimations of the overhead introduced by the system. The paper focus on health care scenarios, where we show the flexibility of the proposed event-based user consent revocation mechanism.Entities:
Keywords: delegation; event; federation; health care; identity management; privacy; revocation consent; theory queue; user-centric
Mesh:
Year: 2012 PMID: 22778634 PMCID: PMC3386733 DOI: 10.3390/s120506129
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1.Federated model scenario. A user, after a successful authentication, can access services from any service provider within the circle of trust. For instance, booking a flight, then renting a car, and finally buying tickets for a show. Note that the IdP stores identity information on behalf of the user.
Figure 2.User centric model. A user can access services from any service provider accepting his/her credentials. For instance, booking a flight, then renting a car and finally buying tickets for a show. Note that the information is provided always by the user.
Summary of privacy features in Identity Management.
| Federated Model (SAML/ID-FF) | Partial anonymity (IdP knows user identity). | Transient and permanent identifiers. | The XSPA-SAML profile enables to obtain user's consent and describe attributes to preserve privacy in health care. | |
| User-centric Model (InfoCards) | Included in the specification | Message flow eliminates direct communication IdP-SP. | Allows to express privacy policies of RPs. | |
| Hybrid Model (OpenID) | Not addressed | Not addressed | Not addressed |
Figure 3.Event queueing system.
Definition of the parameters for the event model.
| Total number of entities in the system | |
| Number of possible event types (matches the Markov's chain states) | |
| Number of notifier entities in the system | |
| Number of subscriber entities in the system, | |
|
| Number of notifiers in the system delivering events of type |
|
| Number of entities subscribed to events of type |
|
| Percentage of notifiers in the system delivering events of type |
|
| Percentage of entities subscribed to events of type |
| Message size to be transferred, considering the overhead introduced by the protocol, when an | |
| λ | Rate of |
| λ | Rate of |
|
| Rate of arriving events of type |
|
| Rate of notified events of type |
|
| Percentage of notified events of type |
| Service time for notification of events of type | |
| Number of servers or notifiers attending notification of | |
| Congestion of the system with parameters λ, | |
| Maximum number of notification messages that can be buffered by the queue | |
| Probability of having | |
| Probability of having 0 notification messages in the system | |
| Notification message queue size | |
| Average notification messages in the system | |
| Average waiting time of notification messages in the queue |
Figure 4.Health care event-based scenario across different domains.
Figure 5.Test architecture. It can be seen the different interactions between the entities (an IdP and two SPs) through the exchange of SIP and SAML messages. Firstly, the SIP clients are registered in the Registrar Server by sending REGISTER messages. Then, the SIP clients subscribe to different events by means of SUBSCRIBE Requests. The SIP Server notifies events to the subscribed entities through NOTIFY Responses. Once events are received, they are analyzed by the Privacy Engine and the sleepyhead credentials are exchanged through SAML requests and responses.
Figure 6.Overhead SIP-Event Notify messages by varying the notification arrival rates and the number of notifiers.
Figure 7.Multi-server notification queueing system that serves urgent events first. Example of Simulink block diagram.