Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3098954.3104061acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Towards the Adoption of Secure Cloud Identity Services

Published: 29 August 2017 Publication History

Abstract

Enhancing trust among service providers and end-users with respect to data protection is an urgent matter in the growing information society. In response, CREDENTIAL proposes an innovative cloud-based service for storing, managing, and sharing of digital identity information and other highly critical personal data with a demonstrably higher level of security than other current solutions. CREDENTIAL enables end-to-end confidentiality and authenticity as well as improved privacy in cloud-based identity management and data sharing scenarios. In this paper, besides clarifying the vision and use cases, we focus on the adoption of CREDENTIAL. Firstly, for adoption by providers, we elaborate on the functionality of CREDENTIAL, the services implementing these functions, and the physical architecture needed to deploy such services. Secondly, we investigate factors from related research that could be used to facilitate CREDENTIAL's adoption and list key benefits as convincing arguments.

References

[1]
Andreas Abraham, Jörg Caumanns, Enrico Francescato, Felix Hörandner, Elias Klughammer, Stephan Krenn, Thomas Lorünser, Andrea Migliavacca, Silvana Mura, Franco Nieddu, Nicolas Notario McDonnell, Christoph Rabensteiner, Simon Roth, Jetzabel Serna, Christoph Striecks, Florian Thiemer, Alberto Zanini, and Bernd Zwattendorfer. 2017. Assessment Report on Cryptographic Technologies, Protocols and Mechanisms. CREDENTIAL Deliverable D4.1. (2017).
[2]
Charlotte Bäccman, Andreas Happe, Felix Hörandner, Simone Fischer-Hübner, Farzaneh Karegar, Alexandros Kostopoulos, Stephan Krenn, Daniel Lindegren, Silvana Mura, Andrea Migliavacca, Nicolas Notario McDonnell, Juan Carlos Pérez Baún, John Sören Pettersson, Anna E. Schmaus-Klughammer, Evangelos Sfakianakis, Welderufael Tesfay, Florian Thiemer, and Melanie Volkamer. 2017. UI Prototypes v1. CREDENTIAL Deliverable D3.1. (2017).
[3]
Matt Blaze, Gerrit Bleumer, and Martin Strauss. 1998. Divertible Protocols and Atomic Proxy Cryptography. In EUROCRYPT 1998 (LNCS), Kaisa Nyberg (Ed.), Vol. 1403. Springer, 127--144.
[4]
Nikolas Bompetsis, Jörg Caumanns, Pasquale Chiaro, Enrico Francescato, Agi Karyda, Alexandros Kostopoulos, Stephan Krenn, Andrea Migliavacca, Juan Carlos Pérez Baún, Luigi Rizzo, Anna E. Schmaus-Klughammer, Evangelos Sfakianakis, Florian Thiemer, and Alberto Zanini. 2017. Pilot Use Case Specification. CREDENTIAL Deliverable D6.1. (2017).
[5]
CREDENTIAL. 2017. CREDENTIAL Secure Cloud Identity Wallet. https://credential.eu. (2017).
[6]
Fred D. Davis. 1989. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly 13, 3 (1989), 319--340.
[7]
Felix Hörandner, Stephan Krenn, Andrea Migliavacca, Florian Thiemer, and Bernd Zwattendorfer. 2016. CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing. In ARES. IEEE Computer Society, 742--749.
[8]
Anat Hovav, Ravi Patnayakuni, and David Schuff. 2004. A model of Internet standards adoption: the case of IPv6. Inf. Syst. J. 14, 3 (2004), 265--294.
[9]
Dilip Antony Joseph, Nikhil Shetty, John Chuang, and Ion Stoica. 2007. Modeling the adoption of new network architectures. In CoNEXT 2007, Jim Kurose and Henning Schulzrinne (Eds.). ACM, 5.
[10]
Farzaneh Karegar, Christoph Striecks, Stephan Krenn, Felix Hörandner, Thomas Lorünser, and Simone Fischer-Hübner. 2016. Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider. In IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School 2016 (IFIP AICT), Anja Lehmann, Diane Whitehouse, Simone Fischer-Hübner, Lothar Fritsch, and Charles D. Raab (Eds.), Vol. 498. 76--91.
[11]
M. Katz and C. Shapiro. 1986. Technology Adoption in the Presence of Network Externalities. Journal of Political Economics 94 (1986), 822--84.
[12]
Nicolás Notario, Stephan Krenn, Bernd Zwattendorfer, and Felix Hörandner. 2016. CREDENTIAL: Secure Cloud Identity Wallet. ERCIM News 2016, 106 (2016).
[13]
Everett M. Rogers. 2003. Diffusion of innovations (5. ed.). Free Press.
[14]
Ron Steinfeld, Laurence Bull, and Yuliang Zheng. 2001. Content Extraction Signatures. In ICISC 2001 (LNCS), Kwangjo Kim (Ed.), Vol. 2288. Springer, 285--304.
[15]
D. Thaler and B. Aboba. 2008. What Makes for a Successful Protocol? RFC 5218. (2008).
[16]
Kevin Zhu and John Weyant. 2003. Strategic Decisions of New Technology Adoption under Asymmetric Information: A Game-Theoretic Model. Decision Sciences 34, 4 (2003), 643--675.
[17]
Bernd Zwattendorfer, Stephan Krenn, and Thomas Lorünser. 2016. Secure and Privacy-Preserving Identity Management in the Cloud. ERCIM News 2016, 104 (2016).

Cited By

View all
  • (2024)Environmental factors and risks affecting the adoption of e-wallets by small and medium-sized enterprises during disasters: The case of COVID-19 pandemicRisk Governance and Control: Financial Markets and Institutions10.22495/rgcv14i4p814:4(78-88)Online publication date: 30-Oct-2024
  • (2023)CACS: A Cloud Privacy-Preserving Attribute Management SystemProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605022(1-9)Online publication date: 29-Aug-2023
  • (2022)Cloud Computing Service Provider Business Model Success CharacteristicsDigital Transformation and Internationalization Strategies in Organizations10.4018/978-1-7998-8169-8.ch006(124-148)Online publication date: 2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security
August 2017
853 pages
ISBN:9781450352574
DOI:10.1145/3098954
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 August 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Data sharing
  2. access control
  3. identity management
  4. proxy re-encryption
  5. user adoption

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ARES '17
ARES '17: International Conference on Availability, Reliability and Security
August 29 - September 1, 2017
Reggio Calabria, Italy

Acceptance Rates

ARES '17 Paper Acceptance Rate 100 of 191 submissions, 52%;
Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)1
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Environmental factors and risks affecting the adoption of e-wallets by small and medium-sized enterprises during disasters: The case of COVID-19 pandemicRisk Governance and Control: Financial Markets and Institutions10.22495/rgcv14i4p814:4(78-88)Online publication date: 30-Oct-2024
  • (2023)CACS: A Cloud Privacy-Preserving Attribute Management SystemProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605022(1-9)Online publication date: 29-Aug-2023
  • (2022)Cloud Computing Service Provider Business Model Success CharacteristicsDigital Transformation and Internationalization Strategies in Organizations10.4018/978-1-7998-8169-8.ch006(124-148)Online publication date: 2022
  • (2022)What is a (Digital) Identity Wallet? A Systematic Literature Review2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)10.1109/COMPSAC54236.2022.00131(809-818)Online publication date: Jun-2022
  • (2020)An overview of limitations and approaches in identity managementProceedings of the 15th International Conference on Availability, Reliability and Security10.1145/3407023.3407026(1-10)Online publication date: 25-Aug-2020
  • (2019)An evaluation of three designs to engage users when providing their consent on smartphonesBehaviour & Information Technology10.1080/0144929X.2019.169789840:4(398-414)Online publication date: 17-Dec-2019
  • (2018)Fully-Featured Anonymous Credentials with Reputation SystemProceedings of the 13th International Conference on Availability, Reliability and Security10.1145/3230833.3234517(1-10)Online publication date: 27-Aug-2018
  • (2018)Secure and Privacy-Friendly Storage and Data Processing in the CloudPrivacy and Identity Management. The Smart Revolution10.1007/978-3-319-92925-5_10(153-169)Online publication date: 9-Jun-2018
  • (2018)User Evaluations of an App Interface for Cloud-Based Identity ManagementAdvances in Information Systems Development10.1007/978-3-319-74817-7_13(205-223)Online publication date: 28-Mar-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media