Identity Management Systems (IMS) Challenges and Opportunities for e-Government e-Government Europe 2004 Noordwijk aan Zee, NL, 1-3 March Institute for Prospective Technological Studies (IPTS) Seville, Spain http://www.jrc.es http://www.jrc.cec.eu.int 1 CONTENTS E-Government services: a new paradigm A ‘trusted’ environment for e-Government services Identity, Identity Management and applications Identity Management requirements e-Identification and the Public Sector Discussion Topics 2 E-Government services: a new paradigm ICTs increasingly used to reduce cost, improve efficiency of e-Government services through: (a) back-office re-engineering; (b) one-stop-shop approach; (c) interoperable systems & interfaces. However, important social and technological developments act as drivers for change: e.g. (a) enlarged and aging population in need of personalised services; (b) increased socio-cultural & religious diversity; (c) flexible, mobile living + working + consumption patterns; (e) pervasive computing, ubiquitous communication, intelligent interfaces (Ambient Intelligence environment). In addition, renewed interest in the role of the public sector in encouraging demand and the part that e-services can play. The issue of e-Government wider-adoption sets new requirements on public e-services (from supply-side issues to demand-side and societal factors). Future Challenge: From more efficient e-Administration to personalised e-Government services to e-Governance based on Knowledge Management in an AmI environment 3 A ‘trusted’ environment for e-Gov. services Rising crime, lack of security, trust and privacy protection impacts, inherent computer interface complexity, and cost of solutions seem to be the main barriers to the wider adoption of ‘trusted’ physical and knowledge networks, required to transform Europe into a Knowledge Society (Lisbon objectives). The deployment of identification technologies as a panacea for ‘trust’ problems raise some concern since emerging technology and other social and financial factors, affect their application in ways that requires further understanding. Also e-Governance in an AmI environment requires that new risks be assessed and managed, especially regarding the public/private sphere boundaries. Solutions related to identification and authentication need be devised so as to efficiently secure the e-services and promote citizens’ confidence in them. Future Challenge: Identification, Authentication, Identity management, Liability, Security, Privacy, legal aspects and social implications ought to be carefully addressed. 4 Identity, Identity management and applications People are skilful in mastering identity, which is a complex social concept, in the real world, but not yet in the virtual world Technologically supported Identity Management gives users control over the amount and nature of their personal data that should be released. IM is driven by security/access management needs, but also seen as a tool to enforce security and privacy protection. IM is a layered problem that needs a comprehensive solution dealing with all layers at once. IM needs a flexible, cost-aware, public-lead & market-driven evolution path 5 Identity Management - Requirements Specific Functionality (depending on the scenario) Basic Usability Security Privacy Specific Law Enforcement legal regulations Objective Trustworthiness Affordability Interoperability “ IMS Identification and Comparison Study ” Hansen, M., ICPP Schleswig-Holstein, DE, Sep.03 6 Technology & identity-attribute independent requirements e-Identification and the Public Sector Identification used in the physical world varies as to: (a) the medium/support type; (b) geographic and sectorial scope; (c) the process to issue, re-new, authenticate; and (d) the security and data protection mechanisms. Various e-identification processes exist at local and national level with significant variation as to the scope, purpose and mechanisms. Secondary use of the result of the process, extended use beyond sector and geographical borders and the security and privacy risks involved indicate that problem is thornier than technical or legal interoperability alone. IMS with the following min functionality: usability, multi-lateral & multi-channel security and law enforcement limitations, privacy protection, offering users transparency and control over their data, can help enhance trust and thus acceptance of such an environment. However users will be expected to develop new skills related to the online world and be prepared to upgrade them as time and technology progresses. Future Challenge: For the Public sector policy and governance issues are thornier than the technical e-identification capability. 7 Policy questions for further discussion (1) • How to develop interoperable IMS from the heterogeneous, autonomous, authentication systems that exist and operate today? Cooperation among all levels of Government (cross-country + intra-country) especially when considering legal impacts of standardisation of both data and processes of issuing, verifying, revoking source identity documents leading to data + function interoperability. Cooperation among public/private actors on authentication issues related to security, privacy protection, liability, non-repudiation, centralised vs. distributed/federated IMS, etc. • CONVERGENCE questions: ? Geographical and sectorial convergence will bear new problems such as: increased interdependence as a result of single sign-on, technical & legal interoperability needs, increased security and privacy risks (Identity theft, data aggregation/profiling). • PARTNERSHIP questions: ? Private sector, mainly banks, which have experience on secure e-identification solutions over a variety of remote channels (phone & mobile, PC & Internet banking, Interactive TV and payment cards) need to share experience in assessing risk and developing and deploying security/privacy compliant IMS. This may result in sharing of costs and an easier learning process leading to widespread adoption of services. 8 Policy questions for further discussion (2) • Governments’ role in identity management is to properly balance the competing interests of legitimate public and private business activities, law enforcement and state intelligence while protecting citizens and consumers’ privacy. How can they play this role effectively? ICT can play an important role in this by aiding in the managed transfer of control from the hands of an unaccountable central administration to the hands of appropriately skilled citizens, through the wider adoption of Identity Management Systems. Also, an appropriate e-governance structure will have to be developed / implemented. • Is it desirable to require a single national ID for all citizens? Is it necessary to avoid such a scheme so as to prevent inevitable misuse and abuse? The essence of the question relates to who will have control over what data and what processes will be in place to aid in the implementation of the IMS to be used. • The role of biometric and DRM technologies? Who will pay for/control them? Depending on the specific application and thus the need for weak or strong identification the role of such technologies in authentication processes and in protecting identity information should be better understood. 9 Thank you ! Any Questions ? Contact Details Ioannis Maghiros Cyber-Security Project Officer EC – DG JRC – IPTS – Seville ioannis.maghiros@jrc.es 10