Publication:
Analysis of privacy vulnerabilities in single sign-on mechanisms for multimedia websites

Loading...
Thumbnail Image

Advisors

Tutors

Editor

Publication date

Defense date

Journal Title

Journal ISSN

Volume Title

Publisher

Springer

Serie/Núm

Creative Commons license

Impact
Google Scholar
Export

Research Projects

Research Projects

Organizational Units

Journal Issue

To cite this item, use the following identifier: https://hdl.handle.net/10016/20008

Abstract

This paper studies the privacy risks for the users of two popular single sign-on platforms for web-based content access: OpenID and Facebook Connect. In particular we describe in detail a privacy vulnerability of the OpenID Authentication Protocol that leads to the exposure of the OpenID user identifier to third parties. We illustrate how OpenID agents leak the (potentially unique) OpenID identifiers of their users to third parties, like advertisement and traffic analysis corporations. This vulnerability is a real and widespread privacy risk for OpenID users. This paper also analyzes the privacy of Facebook Connect --the proprietary single sign-on platform that is gaining a lot of popularity recently-- and, we conclude that it is not affected by the same vulnerability but other important privacy issues remain. Finally, this paper studies the solution space of these problems and defines a number of possible countermeasures. In the case of the OpenID vulnerability, we propose three solutions to this problem: one for the long term to avoid the root cause of the vulnerability, and another two short-term mitigations.

Note

ODS

Funder

Bibliographic citation

Multimed Tools Appl 68 (2014) 1, pp. 159–176

Table of contents

Has version

Is version of

Related dataset

Related Publication

Is part of