respond asynchronously to requests by either grant-
ing or denying it. Before issuing this consent, both
data owner and IdP needs some assurance that the
right owner has received the request, to do this a se-
cured secret key generation process is initiated using
the Diffie Hellman public key exchange discussed in
Section 4.1, with which they both generate common
secured key to confirm their identities. Once both par-
ties are able to confirm their identities and establish a
common secured key, the data owner drafts a delega-
tion policy with the client application using the PAP,
and forwards a response to the IdP. The IdP computes
an authorisation code with query parameters in the
URL and sends it to the user via the adapter. To access
the resources the user presents the authorisation code
to the SP in exchange for a digitally signed OAuth
JSON Web access Token (JWT) and ID token at the
IdP, that is only understood by the RS but opaque to
client application and user. The RS submits the au-
thorisation code directly to the IdP for confirmation
of code, users authorisation process and scope of ac-
cess. IdP then responds with the access, refresh and
ID token. The access token is used to invoke RS
forthe protected resources. While the ID token
contain set of claims about the authentication session
such as user, IdP and client application ID, and
validity of the token. In other to protect an attacker
from overcoming IdP’s security, data owner issues an
access token that contains policy and scope, which
determines access lifetime, purpose, method,
location, usage and ability to revoke the token (both
refresh and access). With access token a user is able
to further invoke the RS for the purported service at
the same instance, while a refresh token is used to
access the same resource within the lifetime of the
access token.
5 CONCLUSIONS AND FUTURE
WORK
This paper introduces a user centred access
delegation framework. It foresees a method that
secures users privacy and ensure data confidentiality
by authenticating a requestor, and granting only an
authorized requestor access to data via a revocable
token. This manifestation has detached the need to
trust an external IdP residing at the SP or controlled
by third parties and vice versa.
Being part of a work in progress, we strongly rely
on already implemented IdMs, client applications and
Government owned registers for integrating the
method. For future development, we plan to
implement our framework within the health care,
education and other social services to support
seamless interoperability of citizens data. This we
believe will further support EU digital single market.
ACKNOWLEDGEMENTS
This work is partially financed by National Funds
through the Portuguese funding agency, FCT - Fun-
dação para a Ciência e a Tecnologia, within project
UIDB/50014/2020.”
REFERENCES
Ausanka-Crues, R. (2001). Methods for access control: ad-
vances and limitations. Harvey Mudd College, 301:20.
Dash, P., Rabensteiner, C., Hörandner, F., and
Roth, S. (2017). Towards privacy-preserving and
user-centric identity management as a service. Open
Identity Sum- mit 2017.
Directive, E. (1995). 95/46/ec of the european parliament
and of the council of 24 october 1995 on the protec-
tion of individuals with regard to the processing of
personal data and on the free movement of such data.
Official Journal of the EC, 23(6).
Falcão-Reis, F. and Correia, M. E. (2010). Patient
empowerment by the means of citizen-managed elec-
tronic health records. Medical and Care Compunetics,
6:214–228.
Gates, C. (2007). Access control requirements for web 2.0
security and privacy. IEEE Web, 2(0).
Hankerson, D., Menezes, A. J., and Vanstone, S. (2006).
Guide to elliptic curve cryptography. Springer Sci-
ence & Business Media.
Hu, V. C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin,
K., Miller, R., and Scarfone, K. (2014). Guide to at-
tribute based access control (abac) definition and con-
siderations. NIST Special Publication, 800:162.
Jin, X., Krishnan, R., and Sandhu, R. (2012). A unified
attribute-based access control model covering dac,
mac and rbac. In IFIP Annual Conference on Data and
Applications Security and Privacy, pages 41–55.
Springer.
Kuegler, D. and Sheffer, Y. (2012). Password authenti-
cated connection establishment with the internet key
exchange protocol version 2 (ikev2). IETF RFC 6631.
Leitold, H., Lioy, A., and Ribeiro, C. (2014). Stork 2.0:
Breaking new grounds on eid and mandates. In Pro-
ceedings of ID World International Congress, pages
1–8. .
NIST, N. (1995). An introduction to computer security: The
nist handbook. NIST Special Publication, pages 800–
12.
Regulation, E. (2016). 2016/679 of the european parliament
and of the council of 27 april 2016 on the protection of
natural persons with regard to the processing of per-
sonal data and on the free movement of such data, and