Payment in Identity Federations David J. Lutz Universitaet Stuttgart.

Slides:



Advertisements
Similar presentations
Identity Network Ideals – Heterogeneity & Co-existence
Advertisements

Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Authz work in GGF David Chadwick
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
FIT3105 Smart card based authentication and identity management Lecture 4.
Digital Cash Damodar Nagapuram. Overview ► Monetary Freedom ► Digital Cash and its importance ► Achieving Digital Cash ► Disadvantages with digital cash.
Applied Cryptography for Network Security
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
IDENTITY MANAGEMENT Hoang Huu Hanh (PhD), OST – Hue University hanh-at-hueuni.edu.vn.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Copyright © 2002 Pearson Education, Inc. Slide 6-1.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
May 28, 2002Mårten Trolin1 Protocols for e-commerce Traditional credit cards SET SPA/UCAF 3D-Secure Temporary card numbers Direct Payments.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Secure Electronic Transaction (SET)
Identity Management in Education. Welcome Scott Johnson, NetProf, Inc. Creator of OmnID Identity Management for Education
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
1 Using EMV cards for Single Sign-On 26 th June st European PKI Workshop Andreas Pashalidis and Chris J. Mitchell.
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Payment Systems. Payment Revolution 1970: Electronic Funds Transfer between banking industries 1980: Electronic Data Interchange (EDI) for e- commerce.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
SAML 2.0: Federation Models, Use-Cases and Standards Roadmap
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
(c) Mitsubishi Electric Corp. 1 User Scenarios & Security Considerations in APPAGG part 2/ Nobuhiro Electric.
MagicNET: Security System for Protection of Mobile Agents.
Connect. Communicate. Collaborate The authN and authR infrastructure of perfSONAR MDM Ann Arbor, MI, September 2008.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
Connect. Communicate. Collaborate The MetaData Service Distributing trust in AAI confederations Manuela Stanica, DFN.
Copyright © 2003 Jorgen Thelin / Cape Clear Software 1 A Web Services Security Framework Jorgen Thelin Chief Scientist Cape Clear Software Inc.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
1 Privacy Aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication Junggab Son*, Donghyun Kim*, Rasheed Hussain**, Sung-Sik Kwon*,
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Digital Signatures and Digital Certificates Monil Adhikari.
Electronic Payment Systems Presented by Rufus Knight Veronica Ogle Chris Sullivan As eCommerce grows, so does our need to understand current methods of.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
Electronic Banking & Security Electronic Banking & Security.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Grid Security.
Future Ideas: Federation and Integration
Secure Authentication System for Public WLAN Roaming
Electronic Payment Security Technologies
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

Payment in Identity Federations David J. Lutz Universitaet Stuttgart

Outline Problem Statement Enhanced Federation Architecture Security Issues Protocol Elements Conclusion

Roaming Student

Solution for Services: Federation

Problem: Payment

Solution for Payment Local Payment Account –Easy to handle –Administration Overhead at Universities –Administration Overhead for roaming Students Global Solution –Paypal –Credit Cards –Easy to use –Administration overhead at Universities Federation Based Payment –Payment Solution integrated into Federation –Does not exist

Traditional Federation Architecture User –Wishes Access to restricted SP Resources –Has Identity Information stored at IdP Identity Provider –Authenticates User –Sends User‘s ID Information to SPs Service Provider –Offers restricted Services to authorized Users –Request User‘s ID Information at IdP

Payment Federation Archtiecture User/Consumer –Wishes Access to restricted SP Resources –Has ID Information stored at IdP –Has Payment Accout at PP Identity Provider –Authenticates Consumer –Sends Consumer‘s ID Information to SPs Service Provider –Offers restricted Services to authorized Consumers –Request Consumer‘s ID Information at IdP –Accepts Payment Statements from PP Payment Provider –Hosts Consumer‘s Payment Accout –Issues, Validates and Reimburses Payment Statements

Payment Provider Tasks –Payment Statement Generation –Payment Statement Validation –Payment Statement Reimbursement Connections –Consumer: Statement Generation –Identity Provider: Consumer AA –Service Provider: Statement Validation –Service Provider: Statement Reimbursement

Payment Provider

Payment Statement Issuing

Payment

Payment Statement Reimbursement

Security Issues Lots of „General Attacks“ –Attacks against Infrastructure and Communication Types: MitM, DOS, Eavesdropping, etc. –Attacks against SAML See: [1] Overspending –Statement must not be used for Payment more than once Data-Tampering –Statement must not be changed, e.g., larger Amount, etc. [1]: F. Hirsch, R. Philpott, and E. Maler: “Security and Privacy Considerations for the OASIS Security Assertion Markup Language (SAML) V2.0”. March Document ID saml-sec-consider-2.0-os. security/saml/v2.0/, last visited

Hardware based Solutions Each Participant has secured Hardware –Non-modifiable Private Key –Signes Statement –Secures Application: The Payment Application cannot be modified without Detection –Controls Data: All Payment Statements are controlled by the Hardware; no Statement Modification without Detection Avoidance of Overspending –Statement Lifetime and ID are stored –Application sends Payment Statement only if Data was not sent before Avoidance of Tampering –Payment Statements are controlled by Hardware –Tampering is detected

Software based Solution PP stores Payment Statement Information during Generation Consumer pays using Payment Statements SP requests Payment Statement Validation at PP –SP or PP checks PP Signature –PP checks if Payment Statement has not been used before –PP marks Payment Statement as being spent –PP informs SP about the Validation Result Reimbursement: –SP requests Reimbursement at PP –PP validates Payment Statement –PP reimburses Payment Statement and informs SP Weak Software Solution: –SP requests no Validation –SP requests Reimbursement –High level of trust between SP and Consumer

Required Information Hardware based Solution –Amount: PP, SP, C must know the Amount conveyed –Currency: PP, SP, C must know the Currency conveyed –PP ID: SP must know where to reimburse the Statement –Secured Hardware Signature: Hardware Signature provides Assuredness that the Payment Statement was never modified or maliciously misused. –Payment Data ID: Needed by the securing Hardware to detect misuse. –Payment Data Lifetime: Needed to control the Statement‘s validity. Software based Solution –Amount: PP, SP, C must know the Amount conveyed –Currency: PP, SP, C must know the Currency conveyed –Payment Provider ID: SP must know where to reimburse and validate the Statement –Payment Provider Signature: Non-Repudiation about the issuing PP –Payer’s ID: Consumer must be identified for Account charging or when he/she acts maliciously. –Payer’s Signature: Non-Repudiation when the paying Consumer’s Account is debited or when he/she acts maliciously. –Payment Data ID: Needed by the Payment Provider to detect Misuse. –Payment Data Lifetime: Needed to control the Statement‘s Validity.

Protocol Enhancements SAML Elements –Request –Response Assertions –Statements

Example Response Payment Provider Signature

Example Response (cont.) Payment Provider Signature NotBefore=" T20:03:25.32Z“ 30 NotOnOrAfter=" T20:03:25.33Z“ 31 /> EUR

Information Overview HardwareSoftwareExample Amount 33 – 36 Currency 37 – 40 PP ID 23 HW Signature12 – 14; 25 – 27 PP Signature25 – 27 Sender Signature12 – 14 Payment Data ID 21 Payment Data Lifetime 28 – 31

Conclusion Missing integrated Payment Solution for Identity Federations –Micropayment Problem –Little attractive for commercial Service Providers Especially small SPs Solution: Payment using SAML –Usage of already established Language –Not only transmission of Payment Information –Up to High Security Hardware; Strong Software; Weak Software –Few Modification needed

Questions? Any Questions Thank You!