Skip to main content

2024 | OriginalPaper | Buchkapitel

Secure and Privacy-Preserving Authentication for Data Subject Rights Enforcement

verfasst von : Malte Hansen, Andre Büttner

Erschienen in: Privacy and Identity Management. Sharing in a Digital World

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In light of the GDPR, data controllers (DC) need to allow data subjects (DS) to exercise certain data subject rights. A key requirement here is that DCs can reliably authenticate a DS. Due to a lack of clear technical specifications, this has been realized in different ways, such as by requesting copies of ID documents or by email address verification. However, previous research has shown that this is associated with various security and privacy risks and that identifying DSs can be a non-trivial task. In this paper, we review different authentication schemes and propose an architecture that enables DCs to authenticate DSs with the help of independent Identity Providers in a secure and privacy-preserving manner by utilizing attribute-based credentials and eIDs. Our work contributes to a more standardized and privacy-preserving way of authenticating DSs, which will benefit both DCs and DSs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
At the time of writing.
 
Literatur
1.
Zurück zum Zitat Alonso, Á., et al.: Enhancing university services by extending the eIDAS European specification with academic attributes. Sustainability 12(3), 770 (2020)CrossRef Alonso, Á., et al.: Enhancing university services by extending the eIDAS European specification with academic attributes. Sustainability 12(3), 770 (2020)CrossRef
2.
Zurück zum Zitat Avellaneda, O., et al.: Decentralized identity: where did it come from and where is it going? IEEE Commun. Stand. Maga. 3(4), 10–13 (2019)CrossRef Avellaneda, O., et al.: Decentralized identity: where did it come from and where is it going? IEEE Commun. Stand. Maga. 3(4), 10–13 (2019)CrossRef
3.
Zurück zum Zitat Berbecaru, D., Lioy, A., Cameroni, C.: Electronic identification for universities: building cross-border services based on the eIDAS infrastructure. Information 10(6), 210 (2019)CrossRef Berbecaru, D., Lioy, A., Cameroni, C.: Electronic identification for universities: building cross-border services based on the eIDAS infrastructure. Information 10(6), 210 (2019)CrossRef
4.
Zurück zum Zitat Boniface, C., Fouad, I., Bielova, N., Lauradoux, C., Santos, C.: Security analysis of subject access request procedures: how to authenticate data subjects safely when they request for their data. In: Naldi, M., Italiano, G., Rannenberg, K., Medina, M., Bourka, A. (eds.) Privacy Technologies and Policy: 7th Annual Privacy Forum, APF 2019, Rome, Italy, 13–14 June 2019, Proceedings, vol. 7, pp. 182–209. Springer, Heidelberg (2019). https://doi.org/10.1007/978-3-030-21752-5_12 Boniface, C., Fouad, I., Bielova, N., Lauradoux, C., Santos, C.: Security analysis of subject access request procedures: how to authenticate data subjects safely when they request for their data. In: Naldi, M., Italiano, G., Rannenberg, K., Medina, M., Bourka, A. (eds.) Privacy Technologies and Policy: 7th Annual Privacy Forum, APF 2019, Rome, Italy, 13–14 June 2019, Proceedings, vol. 7, pp. 182–209. Springer, Heidelberg (2019). https://​doi.​org/​10.​1007/​978-3-030-21752-5_​12
6.
Zurück zum Zitat Di Martino, M., Meers, I., Quax, P., Andries, K., Lamotte, W.: Revisiting identification issues in GDPR ‘Right Of Access’ policies: a technical and longitudinal analysis. Proc. Priv. Enhan. Technol. 2022(2), 95–113 (2022) Di Martino, M., Meers, I., Quax, P., Andries, K., Lamotte, W.: Revisiting identification issues in GDPR ‘Right Of Access’ policies: a technical and longitudinal analysis. Proc. Priv. Enhan. Technol. 2022(2), 95–113 (2022)
7.
Zurück zum Zitat Di Martino, M., Robyns, P., Weyts, W., Quax, P., Lamotte, W., Andries, K.: Personal information leakage by abusing the GDPR ‘Right of Access’. In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) (2019) Di Martino, M., Robyns, P., Weyts, W., Quax, P., Lamotte, W., Andries, K.: Personal information leakage by abusing the GDPR ‘Right of Access’. In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) (2019)
9.
Zurück zum Zitat Engelbertz, N., Erinola, N., Herring, D., Somorovsky, J., Mladenov, V., Schwenk, J.: Security analysis of \(\{\)eIDAS\(\}\)–The \(\{\)Cross-Country\(\}\) authentication scheme in Europe. In: 12th USENIX Workshop on Offensive Technologies (WOOT 18) (2018) Engelbertz, N., Erinola, N., Herring, D., Somorovsky, J., Mladenov, V., Schwenk, J.: Security analysis of \(\{\)eIDAS\(\}\)–The \(\{\)Cross-Country\(\}\) authentication scheme in Europe. In: 12th USENIX Workshop on Offensive Technologies (WOOT 18) (2018)
12.
Zurück zum Zitat European Commission: Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on European data governance (Data Governance Act), cOM/2020/767 final European Commission: Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on European data governance (Data Governance Act), cOM/2020/767 final
13.
Zurück zum Zitat European Commission: Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on harmonised rules on fair access to and use of data (Data Act), sEC(2022) 81 final - SWD(2022) 34 final - SWD(2022) 35 final European Commission: Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on harmonised rules on fair access to and use of data (Data Act), sEC(2022) 81 final - SWD(2022) 34 final - SWD(2022) 35 final
14.
19.
Zurück zum Zitat Gaw, S., Felten, E.W.: Password management strategies for online accounts. In: Proceedings of the Second Symposium on Usable Privacy and Security, pp. 44–55 (2006) Gaw, S., Felten, E.W.: Password management strategies for online accounts. In: Proceedings of the Second Symposium on Usable Privacy and Security, pp. 44–55 (2006)
20.
Zurück zum Zitat Gerakos, K., Maliappis, M., Costopoulou, C., Ntaliani, M.: Electronic authentication for university transactions using eIDAS. In: Katsikas, S., Zorkadis, V. (eds.) E-Democracy–Privacy-Preserving, Secure, Intelligent E-Government Services: 7th International Conference, E-Democracy 2017, Athens, Greece, 14–15 December 2017, Proceedings, vol. 7. pp. 187–195. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-319-71117-1_13 Gerakos, K., Maliappis, M., Costopoulou, C., Ntaliani, M.: Electronic authentication for university transactions using eIDAS. In: Katsikas, S., Zorkadis, V. (eds.) E-Democracy–Privacy-Preserving, Secure, Intelligent E-Government Services: 7th International Conference, E-Democracy 2017, Athens, Greece, 14–15 December 2017, Proceedings, vol. 7. pp. 187–195. Springer, Heidelberg (2017). https://​doi.​org/​10.​1007/​978-3-319-71117-1_​13
21.
Zurück zum Zitat Hansen, M., Gruschka, N., Jensen, M.: A universal data model for data sharing under the european data strategy (2023) Hansen, M., Gruschka, N., Jensen, M.: A universal data model for data sharing under the european data strategy (2023)
22.
Zurück zum Zitat Hansen, M., Gruschka, N., Jensen, M.: Introducing the concept of data subject rights as a service under the GDPR (2023) Hansen, M., Gruschka, N., Jensen, M.: Introducing the concept of data subject rights as a service under the GDPR (2023)
23.
25.
Zurück zum Zitat Khayretdinova, A., Kubach, M., Sellung, R., Roßnagel, H.: Conducting a usability evaluation of decentralized identity management solutions. In: Selbstbestimmung, Privatheit und Datenschutz: Gestaltungsoptionen für einen europäischen Weg, pp. 389–406. Springer, Fachmedien Wiesbaden Wiesbaden (2022) Khayretdinova, A., Kubach, M., Sellung, R., Roßnagel, H.: Conducting a usability evaluation of decentralized identity management solutions. In: Selbstbestimmung, Privatheit und Datenschutz: Gestaltungsoptionen für einen europäischen Weg, pp. 389–406. Springer, Fachmedien Wiesbaden Wiesbaden (2022)
27.
28.
Zurück zum Zitat Mühle, A., Grüner, A., Gayvoronskaya, T., Meinel, C.: A survey on essential components of a self-sovereign identity. Comput. Sci. Rev. 30, 80–86 (2018)CrossRef Mühle, A., Grüner, A., Gayvoronskaya, T., Meinel, C.: A survey on essential components of a self-sovereign identity. Comput. Sci. Rev. 30, 80–86 (2018)CrossRef
30.
Zurück zum Zitat Papadamou, K., et al.: Killing the password and preserving privacy with device-centric and attribute-based authentication. IEEE Trans. Inf. Forensics Secur. 15, 2183–2193 (2019)CrossRef Papadamou, K., et al.: Killing the password and preserving privacy with device-centric and attribute-based authentication. IEEE Trans. Inf. Forensics Secur. 15, 2183–2193 (2019)CrossRef
32.
Zurück zum Zitat Preukschat, A., Reed, D.: Self-sovereign identity. Manning Publications (2021) Preukschat, A., Reed, D.: Self-sovereign identity. Manning Publications (2021)
33.
Zurück zum Zitat Purtova, N.: From knowing by name to targeting: the meaning of identification under the GDPR. Int. Data Priv. Law 12(3), 163–183 (2022)CrossRef Purtova, N.: From knowing by name to targeting: the meaning of identification under the GDPR. Int. Data Priv. Law 12(3), 163–183 (2022)CrossRef
34.
Zurück zum Zitat Sabouri, A., Rannenberg, K.: ABC4Trust: protecting privacy in identity management by bringing privacy-ABCs into real-life. In: Camenisch, J., Fischer-Hubner, S., Hansen, M. (eds.) Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2. 2 International Summer School, Patras, Greece, 7–12 September 2014, Revised Selected Papers, vol. 9, pp. 3–16. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-319-18621-4_1 Sabouri, A., Rannenberg, K.: ABC4Trust: protecting privacy in identity management by bringing privacy-ABCs into real-life. In: Camenisch, J., Fischer-Hubner, S., Hansen, M. (eds.) Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2. 2 International Summer School, Patras, Greece, 7–12 September 2014, Revised Selected Papers, vol. 9, pp. 3–16. Springer, Heidelberg (2015). https://​doi.​org/​10.​1007/​978-3-319-18621-4_​1
36.
37.
Zurück zum Zitat Sharif, A., Ranzi, M., Carbone, R., Sciarretta, G., Marino, F.A., Ranise, S.: The eIDAS regulation: a survey of technological trends for European electronic identity schemes. Appl. Sci. 12(24), 12679 (2022)CrossRef Sharif, A., Ranzi, M., Carbone, R., Sciarretta, G., Marino, F.A., Ranise, S.: The eIDAS regulation: a survey of technological trends for European electronic identity schemes. Appl. Sci. 12(24), 12679 (2022)CrossRef
38.
Zurück zum Zitat Tsakalakis, N., O’hara, K., Stalla-Bourdillon, S.: Identity assurance in the UK: technical implementation and legal implications under the eIDAS Regulation. In: Proceedings of the 8th ACM Conference on Web Science, pp. 55–65 (2016) Tsakalakis, N., O’hara, K., Stalla-Bourdillon, S.: Identity assurance in the UK: technical implementation and legal implications under the eIDAS Regulation. In: Proceedings of the 8th ACM Conference on Web Science, pp. 55–65 (2016)
39.
Zurück zum Zitat Urban, T., Tatang, D., Degeling, M., Holz, T., Pohlmann, N.: A study on subject data access in online advertising after the GDPR. In: Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, 26–27 September 2019, Proceedings 14, pp. 61–79. Springer, Heidelberg (2019). https://doi.org/10.1007/978-3-030-31500-9_5 Urban, T., Tatang, D., Degeling, M., Holz, T., Pohlmann, N.: A study on subject data access in online advertising after the GDPR. In: Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, 26–27 September 2019, Proceedings 14, pp. 61–79. Springer, Heidelberg (2019). https://​doi.​org/​10.​1007/​978-3-030-31500-9_​5
Metadaten
Titel
Secure and Privacy-Preserving Authentication for Data Subject Rights Enforcement
verfasst von
Malte Hansen
Andre Büttner
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-57978-3_12