Role Based Authorization as a Tool for Privacy and Anonymity

14 Pages Posted: 15 May 2012

See all articles by Douglas Sicker

Douglas Sicker

University of Colorado at Boulder - Department of Computer Science; University of Colorado at Denver

Date Written: September 1, 2003

Abstract

The advent of the information age has brought a proliferation in the amount of information that is available and an increase in accessibility to such information. As we rely more heavily on networks as a means of communicating, we must increasingly consider how these networks store and distribute this information. Aside from the problems that arise in managing the security of large diverse systems, we must also consider the implications of distributing personally identifiable information across such systems. For example, both web browsing and voice over internet communications processes include considerable amounts of personally identifiable information about the user. For some, the distribution of (and access to) this personal information is of no consequence; however, for others, this is tantamount to an invasion of their privacy. Some of the issues associated with the distribution of this information arise out of the identity, authentication and authorization models that have been defined for these services. Many of the existing models rely heavily on identity information that readily links back to an individual (i.e., an individual’s name as their login). Further, many models do not provide support for privacy or anonymity, nor do they provide granularity in terms of what information might be released to whom and methods of controlling such release.

To address these problems, various groups are working on new role-based authorization (RBA) models. The value of a RBA approach is that the user asserts a ‘role’ rather than a typical identity when requesting a service. In this way, the user can maintain some level of anonymity and privacy. However, the actual identity of the user may still be maintained by the local domain, thereby addressing possible repudiation and legal concerns (i.e., CALEA). These RBA systems also allow the user to determine the amount and type of information released about that user. This granularity of control can be used to adjust the level of anonymity associated with a communication session. For example, a user may want one session to be anonymous and the next not. In this paper, we will begin by providing some relevant technical background material and loosely define two rather contentious terms, privacy and anonymity. We will then briefly describe the RBA models under development, including the motivation of these models. We will demonstrate how these models can be used to provide privacy and anonymity. Next, we will consider the policy implications of RBA models, particularly as it relates to US federal law and policy. We will end by considering how privacy, anonymity and law might co-exist.

Suggested Citation

Sicker, Douglas and Sicker, Douglas, Role Based Authorization as a Tool for Privacy and Anonymity (September 1, 2003). TPRC 2003, Available at SSRN: https://ssrn.com/abstract=2060640

Douglas Sicker (Contact Author)

University of Colorado at Denver ( email )

Box 173364
1250 14th Street
Denver, CO 80217
United States

University of Colorado at Boulder - Department of Computer Science ( email )

Boulder, CO
United States

Do you have negative results from your research you’d like to share?

Paper statistics

Downloads
40
Abstract Views
528
PlumX Metrics