Abstract

Internet has brought a lot of security challenges on the interaction, activities, and transactions that occur online. These include pervasion of privacy of individuals, organizations, and other online actors. Relationships in real life get affected by online mischievous actors with intent to misrepresent or ruin the characters of innocent people, leading to damaged relationships. Proliferation of cybercrime has threatened the value and benefits of internet. Identity theft by fraudsters with intent to steal assets in real space or online has escalated. This study has developed a metrics model based on distance metrics in order to quantify the credential identity attributes used in online services and activities. This is to help address the digital identity challenges, bring confidence to online activities and ownership of assets. The application forms and identity tokens used in the various sectors to identify online users were used as the sources of the identity attributes in this paper. The corpus toolkits were used to mine and extract the identity attributes from the various forms of identity tokens. Term weighting schemes were used to compute the term weight of the identity attributes. Other methods used included Shannon Entropy and the Term Frequency-Inverse Document Frequency scheme (TF*IDF). Standardization of data using data normalization method has been applied. The results show that using the Cosine Similarity Measure, we can identify the identity attributes in any given identity token used to identify individuals and entities. This will help to attach the legitimate ownership to the digital identity attributes. The developed model can be used to uniquely identify an online identity claimant and help address the security challenge in identity management systems. The proposed model can also identify the key identity attributes that could be used to identify an entity in real or cyber spaces.

Highlights

  • Challenges of identifying internet users associated with valuables that are online have become a serious concern to internet users

  • This rating indicates which identity attributes are most important in identifying a digital identity claimant against online interests in this corpus

  • Testing the proposed Cosine Similarity measure as an Identity Attribute Metric Modeling is able to identify the document that uniquely has its identity attributes similar to itself as the highest rated and identify a claimant of the digital identity as the legitimate owner. This model would be able to identify the true owner claimant from one to multiple claimants of the digital identity. This would help in improving security on identifying the legitimate digital identity owner of a specific identity

Read more

Summary

Introduction

Challenges of identifying internet users associated with valuables that are online have become a serious concern to internet users. The adverse challenges on information security regarding identification of real identity ownership on internet and to services and online activities is of great concern. This research has developed a metrics model based on distance metrics in order to quantify the credential identity attributes used in online services and activities. Consideration of what identity would imply on online services and activities has been looked at so as to have a relevant context in this study. A large part of online activities includes communication of information; we had to reflect on communication trust model which would be applicable to our study and see the value that it would add to our study. We have reflected on Shannon’s Communication trust framework from Shannon’s Information theory to guide us in considering digital identity with respect to trust in online activities. To remove errors which at time would be due to measurement units, noise, and estimations, standardizing of data would be important before we use it in our metrics

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.