Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, Unis. of Hong Kong, U.N.S.W., ANU {.html,.ppt} 7th Annual Privacy & Security Conference Victoria BC – 10 February 2006 (Id)entities Management and Nym Management for People not of People
Copyright (Id)entities
Copyright Names Codes Roles
Copyright
Copyright
Copyright Identities Management
Copyright User Access Security for a Single Application
Copyright Single-Organisation Single-SignOn (aka Silo'd) Identity Management
Copyright Multi-Organisation Single-SignOn Identity Management
Copyright Federated Identity Management
Copyright Identities Management for People not of People Did you ever pause to consider that the expression Identity Provider is Arrogant?
Copyright Countermeasures by Individuals Web-Forms can be filled with: pre-recorded data convenient data pseudo-random data false data Personal data can be automatically varied for each remote service, in order to detect data leakage, e.g. spelling-variants, numerical anagrams Personal data can be automatically varied for the same remote service on successive occasions (to pollute the data-store and confuse the userprofile) Users can exchange cookies, resulting in compound profiles rather than profiles that actually reflect an individual user's behaviour
Copyright Identity Management by a User-Selected Intermediary
Copyright User-Device Identity Management
Copyright User-Proxy Identity Management
Copyright The Multi-Mediated Super-Architecture
Copyright Nym Management
Copyright (Id)entities
Copyright Nyms
Copyright Nym One or more attributes of an Identity (represented in transactions and records as one or more data-items) sufficient to distinguish that Identity from other instances of its class but not sufficient to enable association with a specific Entity Pseudonym – association is not made, but possible Anonym – association is not possible
Copyright Some Mainstream Nymous Transactions Barter transactions Visits to Enquiry Counters in government agencies and shops Inspection of publications on library premises Telephone Enquiries Access to Public Documents by electronic means, at a kiosk or over the Internet Cash Transactions, incl. the myriad daily payments for inexpensive goods and services, gambling and road-tolls Voting in secret ballots Treatment at discreet clinics, particularly for sexually transmitted diseases
Copyright Some Important Applications of Nymity Epidemiological Research (HIV/AIDS) Financial Exchanges, including dealing in commodities, stocks, shares, derivatives, and foreign currencies Nominee Trading and Ownership Banking Secrecy, incl. Swiss / Austrian bank accounts Political Speech Artistic Speech Call Centres Counselling Phone-calls with CLI Internet Transactions 'Anonymous' r ers Chaumian eCash
Copyright Common Uses for Nymity Criminal purposes Dissent and sedition Scurrilous rumour- mongering To avoid being found by people who wish to inflict physical harm (e.g. ex- criminal associates, religious zealots, over- enthusiastic fans, obsessive stalkers) To protect the sources of journalists, and whistle- blowers To avoid unjustified exposure of personal data To keep data out of the hands of marketing organisations To prevent government agencies using irrelevant and outdated information
Copyright Nymality aka ('also-known-as'), alias, avatar, character, nickname, nom de guerre, nom de plume, manifestation, moniker, persona, personality, profile, pseudonym, pseudo-identifier, sobriquet, stage-name Cyberpace has adopted, and spawned more: account, alias, avatar, handle, nick, nickname, persona, personality
Copyright Effective Pseudonymity The Necessary Protections Legal Protections Organisational Protections Technical Protections Over-ridability of Protections BUT subject to conditions being satisified, esp. collusion among multiple parties legal authority
Copyright Privacy Enhancing Technologies (PETs) Counter-PITs Savage PETs Gentle PETs Pseudo-PETs
Copyright Savage PETs Deny identity Provide anonymity Genuinely anonymous ('Mixmaster') r ers, web-surfing tools, ePayment mechanisms Privacy Enhancing Technologies (PETs)
Copyright Gentle PETs Seek a balance between nymity and accountability through Protected Pseudonymity Privacy Enhancing Technologies (PETs)
Copyright Some Myths in the Authentication and Identity Management Arena That the only assertions that need to be authenticated are assertions of identity (fact, value, attribute, agency and location) That individuals only have one identity That identity and entity are the same thing That biometric identification: works is inevitable doesnt threaten freedoms will help much will help at all in counter-terrorism
Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor/Fellow, Unis. of Hong Kong, U.N.S.W., ANU {.html,.ppt} 7th Annual Privacy & Security Conference Victoria BC – 10 February 2006 (Id)entities Management and Nym Management for People not of People
Copyright
Copyright Anonymity vs. Pseudonymity Anonymity precludes association of data or a transaction with a particular person Pseudonymity creates barriers to association of data or a transaction with a particular person The barriers are Legal, Organisational and Technical The barriers can be over-ridden BUT conditions apply and are enforced, including: collusion among multiple parties sanctions and enforcement
Copyright Pseudonymous Transactions The Basic Principles Enable communications that do not require the client to identify themselves Conduct no authentication of identifiers leaving clients free to choose their identifier Protect the organisation against default or malperformance by the client (by ensuring that transaction risk is borne by the client)
Copyright Pseudonymous Transactions The Challenge of Continuity Needs for Continuity arise: within the context of a transaction (e.g. repairs under warranty) to associate successive transactions (e.g. loyalty discounts) Although the identifier is a pseudonym: Authentication is unaffected Customers are still Customers
Copyright Pseudonymous Transactions The Challenge of Payments Anonymous Payment Schemes work, e.g. DigiCash, but they have not achieved the breakthrough Schemes based on Credit-Cards dominate Identified credit-card tx undermine pseudonymity Alternatives: sponsor anonymous payments mechanisms separate payment aspects of transactions from the ordering and fulfilment aspects
Copyright Pseudonymous Transactions Potential Conflicts Customer Relationship Management 'Know Your Customer' Policies where organisations have become part of the national security machinery To perform their business functions effectively, organisations need to balance many interests, not simply succumb