Abstract
Cross-domain identity management remains a major challenge for potential WebRTC adopters. In order to provide a global web-based communication system, it is critical to locate the destination called party, map the identity to the user device, and provide mutual authentication for both caller and called party. In this paper, we present a novel identity management and user discovery framework that enables callers to search and locate users across service domains. The identity management is decoupled from the used calling service, allowing users to manage their profiles and credentials independently of the applications. The framework is designed to preserve privacy and exploit web technology to gain trust and contact list management.
Similar content being viewed by others
Notes
ReTHINK Project Website: https://rethink-project.eu
Apache Lucene Project Website http://lucene.apache.org
References
A Bergkvist, Burnett DC, Jennings C (2015) WebRTC 1.0: real-time communication between browsers, W3C Working Draft, 10 February
Barnes R, Thomson M (2014) Browser-to-browser security assurances for WebRTC. IEEE Internet Comput 18(6):11–17
E Bertin, S Cubaud, S Tuffin, N Crespi, V Beltran (2013) WebRTC, the day after: what’s next for conversational services? International Conference on Intelligence in Next Generation Networks (ICIN 2013)
I Javed et al. (2016) Global identity and reachability framework for interoperable P2P communication services, 19th Conference on Innovations in Clouds, Internet and Networks (ICIN 2016)
S Becot, E Bertin, J Crom, V Frey, S Tuffin (2015) Communication services in the Web era: how can Telco join the OTT hangout?, International Conference on Intelligence in Next Generation Networks (ICIN 2015)
Lampropoulos K, Sanchez D, Almenares F, Weik P, Denazis S (2010) Introducing a cross federation identity solution for converged network environments, principles, systems and applications of IP Telecommunications (IPTComm ‘10). ACM, New York, pp 1–11
Beltran V (2016) Characterization of web single sign-on protocols. IEEE Commun Mag 54(7):24–30
M Jones and D Hardt (2012) The OAuth 2.0 authorization framework: bearer token usage, IETF RFC6750
N Sakimura, J Bradley, M Jones, B Medeiros, C Mortimore (2014) OpenID connect Core 1.0, The OpenID Foundation
E Rescorla (2016) WebRTC security architecture, IETF internet draft, standards track
Beltran V, Bertin E, Crespi N (2014) User identity for WebRTC services: a matter of trust. IEEE Internet Comput 18(6):18–25
R Copeland (2009) Converging NGN wireline and mobile 3G networks with IMS. CRC Press, Talor & Francis Group, Boca Raton
L Li, W Chou, T Cai, Z Wang, Z Qiu Mirror presence: secure web identity resolution and call control for WebRTC, Proceedings of International Conference on Information Integration and Web-based Applications & Services (IIWAS 2013) ACM, New York, pp 523–532
S Göndör, H Hebbo (2014) SONIC: Towards seamless interaction in heterogeneous distributed OSN ecosystems, IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Larnaca
Cutillo L, Molva R, Strufe T (2009) Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Commun Mag 47(12):94–101
A Bouabdallah Data models and interface specification of the framework, reTHINK project Deliverable. http://dx.doi.org/10.18153/RTH-645342-D2_2.
M Jones, J Bradley, N Sakimura (2015) JSON Web Token (JWT), IETF Standard
J-M Crom (2015) Management and security features specifications, reTHINK project Deliverable http://dx.doi.org/10.18153/RTH-645342-D4_1
I Javed, K Toumi, N Crespi, A Mohammadinejad Br2Br: a vector-based trust framework for WebRTC calling services. IEEE IEEE International Conference on High Performance Computing and Communications (HPCC 2016), 12–14 December, Sydney, Australia
J-M Crom Implementation of governance and identity management components, reTHINK Project Deliverable
I Friese, R Copeland, S Göndör, F Beierle, A Küpper, R Pereir and J-M Crom (2017) Cross-domain discovery of communication peers. Identity mapping and discovery services (IMaDS), IEEE European Conference on Networks and Communications (EuCNC)
S Göndör, F Beierle, S Sharhan, A Küpper (2016) Distributed and domain-independent identity management for user profiles in the SONIC Online Social Network Federation, International Conference on Computational Social Networks, Springer
S Göndör, F Beierle, E Küçükbayraktar, H Hebbo, S Sherhan, A Küpper (2015) Towards migration of user profiles in the SONIC Online Social Network Federation, International Multi-Conference on Computing in the Global Information Technology (ICCGI)
Alliance, Open Mobile (2013) Lightweight machine to machine technical specification. Technical Specification OMA-TS-LightweightM2M-V1
Z Shelby (2012) Constrained RESTful environments (CoRE) link format, IETF standard
R Copeland, K Corre, I Friese, S El Jaouhari (2016) Requirements for trust and privacy in WebRTC peer-to-peer Authentication IETF internet draft
A Cooper et al. (2013) Privacy considerations for Internet protocols, IETF RFC 6973
R Yavatkar, D Pendarakis, R Guerin (1999) A framework for policy-based admission control, IETF RFC 2753
Damianou N, Dulay N, Lupu E, Sloman M (2001) The ponder policy specification language, policies for distributed systems and networks. Springer, Berlin, pp 18–38
D Crockford (2006) JSON: the fat-free alternative to XML, XML 2006 Conference, Boston
F Beierle, S Göndör, A Küpper (2015) Towards a three-tiered social graph in decentralized online social networks, Workshop on Hot Topics in Planet-scale mobile computing and online Social networking (HotPOST ‘15), ACM
Alaggan M, Gambs S, Kermarrec A (2012) BLIP: non-interactive differentially-private similarity computation on bloom filters, symposium on self-stabilizing systems. Springer, Berlin
Acknowledgements
This work has received funding from the European Union’s Horizon 2020 research and innovation program under grant agreement no. 645342, project reTHINK.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Javed, I.T., Copeland, R., Crespi, N. et al. Cross-domain identity and discovery framework for web calling services. Ann. Telecommun. 72, 459–468 (2017). https://doi.org/10.1007/s12243-017-0587-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12243-017-0587-2