Anonymity Facilitated with Limited Scope Claims: Difference between revisions
m (8 revisions imported: Initial Upload of old pages from IDESG Wiki) |
(No difference)
|
Latest revision as of 03:00, 28 June 2018
Title:
Anonymity Facilitated with Limited Scope Claims
Use Case Description:
Limit the scope of exposure of user claims and behaviors to avoid linking the real identity of the user to specific interchanges on the internet.
Use Case Category:
Anonymity, Attributes, Claims
Contributor:
Tom Jones (editor)
Use Case Details
Actors:
- User - a carbon based life form that desires to use resources on the web without linking that interchange to a real identity.
- Relying party is a web service that needs some claim before making some resource available to the user.
- Identity or Attribute Provider (IAP) that can create claims based on the user's actual attributes while hiding information that might like the user to the claim.
Goals:
The user can browse the internet in relative safety while keeping any real identity secret from the relying party.
Assumptions:
- While any collection of attributes or behaviors will allow a relying party to winnow away that the population that contains the user, with a little bit of care the user can create a small set of claims that still contains too large a population to avoid discovery.
- Any claim must be bound to some identifier to limit its scope, otherwise it can be endlessly replayed.
- An identity ecosystem is accepted by the parties as providing a set of policy guidelines for the protection of identifiers that are marked for an anonymous interaction.
Requirements:
Process Flow:
The two distinct process flows that are considered for this use case are the only anonymity methods known at this point. Other privacy enhancing technologies are described in the references below.
- One time use tokens (including tokens with extremely short life times.)
- Session identifiers that can be used to create a scope where attributes and behaviors are present.
Success Scenario:
Error Conditions:
Relationships
Privacy Enhancing technologies are usually considered as support for pseudonymous interchanges, but can help with anonymity in privacy-friendly ecosystems. The following link point to the general use case for privacy enhancing technologies. Links on that page lead to specific privacy-enhancing use cases. https://www.idecosystem.org/wiki/Privacy_Enhancing_Technologies
- Extended by:
- Extension of:
References and Citations