from re cred control · confidential and proprietary materials for authorized verizon personnel and...

12
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties ex cept by written agreement. ReCRED Bharadwaj Pulugundla, MBA Manager Digital Innovation, Verizon Enterprise Solutions From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Trust in Digital World 2016, Den Haag, June 15-16

Upload: others

Post on 11-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: From Re CRED Control · Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties ex cept by written agreement.

ReCRED

Bharadwaj Pulugundla, MBAManager Digital Innovation,

Verizon Enterprise Solutions

From Real-world Identities to Privacy-preserving and Attribute-basedCREDentials for Device-centric Access Control

Trust in Digital World 2016, Den Haag, June 15-16

Page 2: From Re CRED Control · Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties ex cept by written agreement.

Project funded by EU under H2020Call Identifier: H2020-DS2-2014-1

2

ReCRED Consortium

Page 3: From Re CRED Control · Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties ex cept by written agreement.

ReCRED Context

3

7.6 billion Mobile connections

4.7 billion unique subscribers

$1.06trillion Revenue/year

6.4 billion Connected "Things" Will Be in Use in 2016*

63%of confirmed data breaches involved leveraging weak, default or stolen passwords.

Source: https://www.gsmaintelligence.com/*Gartner

Presenter
Presentation Notes
Cyber Threat landscape Examining over 100,000 incidents, including 2,260 confirmed data breaches across 82 countries. With data provided by 67 contributors including security service providers, law enforcement and government agencies, this year'��s report offers unparalleled insight into the cybersecurity threats you face. There are many “Things” And it is very important for the service providers and users to operate in a safe and trusted environment
Page 4: From Re CRED Control · Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties ex cept by written agreement.

To promote the user’s personal mobile device to the role of a unified authentication and authorization proxy towards the digital world.

4

ReCRED’s goal

Presenter
Presentation Notes
There are four problems we tried to address in ReCRED. The outcome of this project is a technological platform, APIs, Demonstrations, Reports and so on
Page 5: From Re CRED Control · Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties ex cept by written agreement.

ReCRED concepts

5

User to Device & Device to Service authentication

Binding digital Identity with Real-world Identities

Account less access through verified identity attributes (eg. Age, location etc)

Presenter
Presentation Notes
Human to device – Bio metric such as gait, fingerprint, facial recognition, typing pattern Device to Service – OpenID connect, Oauth2 Seamless integration of the multiple identity attributes of a user (Physical Identity, Online Identities)
Page 6: From Re CRED Control · Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties ex cept by written agreement. 6

ReCRED’s adopted Technologies and Standards

Presenter
Presentation Notes
Open standards, is a key principle, Scalability to connect to any other online services eg. Mobile Connect (where Mobile operators as ID providers) OpenID Connect (Single Sign On) for federation between Identity Providers. Online services authenticate their users by employing Google, Microsoft, PayPal, accounts OAuth 2.0 (Open standard for Authorization): Issues and uses access tokens to be used for authorization FIDO (Fast IDentity Online) : Standardized protocols for password-less authentication Universal Authentication Framework Trusted Execution Environment (TEE): A secure area of the main processor of a smart phone that provides secure storage and cryptographic functions products from the partners in the consortium GateSafe, Latch from telefonica Particular attention to anonymous credential systems such as Idemix, Uprove, ABAC CP-ABE Ciphertext-Policy Attribute-based Encryption Considered the results of ABC4Trust, Fiware, IRMA
Page 7: From Re CRED Control · Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties ex cept by written agreement. 7

ReCRED’s adoption of FIDO

Presenter
Presentation Notes
FIDO (Fast IDentity Online) Specification - Password less UX with Universal Authentication Framework Pluggable local authentication, Bring your own local Authenticator
Page 8: From Re CRED Control · Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties ex cept by written agreement. 8

ReCRED reference Architecture

Presenter
Presentation Notes
Five main components: User device Online Services or Verifiers Identity Providers Identity Consolidation Service Behavioral Authentication Authorities (BAA) ID Consolidator: Central component of the architecture. Provides and ID management console to the user, User can recover accounts and credentials when device is lost. register his ID providers and BAAs so they can be easily discovered in a trust way by the verifiers be aware of which ID providers and verifiers know what attributes and what values. To transfer attributes among them. For ID providers to register so they can be trusted by the RPs. At all stages the user is in full control of his data and fully informed about the risks on his privacy. Various levers to tune the degree of desired privacy.
Page 9: From Re CRED Control · Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties ex cept by written agreement.

ReCRED’s Pilots

Student

CUT WiFi area

Student Proof

Professor

UC3M WiFi area

Professor Proof

Professor Proof

Student Proof

StudentProof

Pilot 1

Pilot 1:Device-centric

campus WiFi and web services access control

Pilot 2:Student

authentication and offers

Student Proof

StudentDiscount

DiscountedTransaction

Pilot 2

Trusted Government

Authority

AgeGateway

18+ Age Proof

Access

Pilot 3

Pilot 3: Attribute-based age

verification online gateway

Financial Institution A

Financial Institution B

Financial Status Proof

LoanOrigination

Pilot 4

Pilot 4:Financial

services –microloan origination

Presenter
Presentation Notes
Page 10: From Re CRED Control · Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties ex cept by written agreement.

1. Device-centric Authentication, Password-less experience, FIDO UAF

2. Fine-grained control of identity attributes to be revealed (ABAC)

3. FIDO + OpenID Connect Integration4. Support for privacy-preserving ABAC (Idemix, U-Prove, CP-

ABE)5. Biometrics and behavioral authentication6. Single Sign On (SSO) with federated identities7. Enhanced security & privacy by employing the crypto functions

and secure storage of TEE8. Unlinkability & untraceability

10

ReCRED’s Innovation

Presenter
Presentation Notes
Paypal’s FIDO + OpenID integration, Still a prototype, no source code released, just a 4-page documentation
Page 11: From Re CRED Control · Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties ex cept by written agreement.

www.recred.euLinkedin:: ReCRED - H2020

Facebook:https://web.facebook.com/ReCRED-393935714133064/

Twitter: @ReCRED_H2020

DBIR REPORT: http://www.verizonenterprise.com/resources/reports/rp

_DBIR_2016_Report_en_xg.pdf

11

Where to find more information

Presenter
Presentation Notes
ReCRED is in the social media. Please join us and you can also contribute towards this project by engaging in the discussions, and posting your comments. It helps to raise the awareness on the topics in the area of digital trust, and also gives us, the project, an opportunity to consider those views into the project implementation and dissemination.
Page 12: From Re CRED Control · Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties ex cept by written agreement.

Thank you.

12