PORTALE DELLA DIDATTICA

PORTALE DELLA DIDATTICA

PORTALE DELLA DIDATTICA

Elenco notifiche



Security and Privacy for Digital Identity Frameworks

01DXTIU

A.A. 2022/23

Course Language

Inglese

Degree programme(s)

Doctorate Research in Ingegneria Informatica E Dei Sistemi - Torino

Course structure
Teaching Hours
Lezioni 20
Lecturers
Teacher Status SSD h.Les h.Ex h.Lab h.Tut Years teaching
Berbecaru Diana Gratiela Ricercatore L240/10 IINF-05/A 20 0 0 0 3
Co-lectures
Espandi

Context
SSD CFU Activities Area context
*** N/A ***    
In the last decade, digital identity management systems (IDMs) have attracted attention because they allow entities providing web-based services to delegate user authentication to other dedicated, trusted parties. Thus, IDMs have been increasingly used in federated control domains, or between different organizations to ease citizen’s access to services at national level or in cross-country scenarios. Nowadays, widely used platforms like Google or Facebook implement digital identity technologies to support access to their services, while in Europe there exist government-backed national identity systems in which the citizen authentication and identification are performed with national credentials, like a smart-card or with multi-factor authentication technologies. At the same time, people typically have multiple digital identities, so service providers need to employ techniques for attribute aggregation and identity matching purposes. On the other hand, new identity models such as self-sovereign identity or decentralized identity leveraging blockchain and distributed ledger technology are getting increased attention. Such identity models allow identity holders to create and control their verifiable credentials without an intermediate or centralized administrative authority intervening. Last, but not least the digital identities of ``things’’ or devices in Internet-of-Things or smart cities scenarios are intensively studied, as well as the privacy issues related to the (personal or identification) data they may handle. Alan Grau, VP of IoT/Embedded Solutions of Sectigo (sectigo.com) writes: “With hundreds and possibly thousands of devices making up enterprise networks, a single device which lacks properly secured digital identity can render the whole network insecure. Identity management solutions can ensure that each device across the network has authenticated certificates to verify the identity of the device, whilst also ensuring that each connected device has in-built PKI solutions to protect the network and device from malicious actors.” (source: https://techmonitor.ai/techonology/networks/digital-identities-for-iot-devices) In this context, this course is aimed to present the digital or electronic identities (eIDs) of the persons, companies, and ``things’’, their identifiers, the infrastructures handling such information, and the privacy issues concerning eIDs exploitation.
In the last decade, digital identity management systems (IDMs) have attracted attention because they allow entities providing web-based services to delegate user authentication to other dedicated, trusted parties. Thus, IDMs have been increasingly used in federated control domains, or between different organizations to ease citizen’s access to services at national level or in cross-country scenarios. Nowadays, widely used platforms like Google or Facebook implement digital identity technologies to support access to their services, while in Europe there exist government-backed national identity systems in which the citizen authentication and identification are performed with national credentials, like a smart-card or with multi-factor authentication technologies. At the same time, people typically have multiple digital identities, so service providers need to employ techniques for attribute aggregation and identity matching purposes. On the other hand, new identity models such as self-sovereign identity or decentralized identity leveraging blockchain and distributed ledger technology are getting increased attention. Such identity models allow identity holders to create and control their verifiable credentials without an intermediate or centralized administrative authority intervening. Last, but not least the digital identities of ``things’’ or devices in Internet-of-Things or smart cities scenarios are intensively studied, as well as the privacy issues related to the (personal or identification) data they may handle. Alan Grau, VP of IoT/Embedded Solutions of Sectigo (sectigo.com) writes: “With hundreds and possibly thousands of devices making up enterprise networks, a single device which lacks properly secured digital identity can render the whole network insecure. Identity management solutions can ensure that each device across the network has authenticated certificates to verify the identity of the device, whilst also ensuring that each connected device has in-built PKI solutions to protect the network and device from malicious actors.” (source: https://techmonitor.ai/techonology/networks/digital-identities-for-iot-devices) In this context, this course is aimed to present the digital or electronic identities (eIDs) of the persons, companies, and ``things’’, their identifiers, the infrastructures handling such information, and the privacy issues concerning eIDs exploitation.
Basic knowledge of computer networks and protocols, e.g. HTTP and DNS protocols Background on computer and network security concepts: - digital certificates, Public Key Infrastructures (PKIs), common security protocols (TLS protocol) - authentication and authorization - main cryptography definitions and their applications, e.g. digital signature
Basic knowledge of computer networks and protocols, e.g. HTTP and DNS protocols Background on computer and network security concepts: - digital certificates, Public Key Infrastructures (PKIs), common security protocols (TLS protocol) - authentication and authorization - main cryptography definitions and their applications, e.g. digital signature
- Electronic/digital identities, identifiers, and identity models - Trust models in digital service infrastructures - Exploitation of electronic identities in cross-sectorial and cross-border services: models and implementations - Attribute linking, attribute aggregation, attribute retrieval, and identity matching - Decentralized (self-sovereign) identity: concepts and implementations - Privacy issues in digital identity infrastructures and IoT networks - Digital identities for IoT devices: models, secure authentication, possible attacks
- Electronic/digital identities, identifiers, and identity models - Trust models in digital service infrastructures - Exploitation of electronic identities in cross-sectorial and cross-border services: models and implementations - Attribute linking, attribute aggregation, attribute retrieval, and identity matching - Decentralized (self-sovereign) identity: concepts and implementations - Privacy issues in digital identity infrastructures and IoT networks - Digital identities for IoT devices: models, secure authentication, possible attacks
Modalità mista
Mixed mode
Test a risposta multipla - Presentazione report scritto
Multiple choice test - Written report presentation
P.D.2-2 - Maggio
P.D.2-2 - May