Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Digital Identity Modelling for Digital Financial Services in Zambia


Affiliations
1 Department of Computer Science, Mulungushi University, Zambia
2 Department of Computer science, University of Zambia, Zambia
     

   Subscribe/Renew Journal


Identification and verification have always been at the heart of financial services and payments, which is even more the case in the digital age. So, while banks have long been trusted to keep money safe, is there a new role for them as stewards of digital identity? Governments should, in consultation with the private sector, develop a national identity strategy based on a federated-style model in which public and private sector identity providers would compete to supply trusted digital identities to individuals and businesses. Back then, when the world seemed smaller, slower and more local, physical identity documents were adequate for face-to-face transactions. However, the Internet changed everything. It shrank distances, created new business models and generally sped everything up. From the innovation lifecycle to access to information, processes and the clock-speed on risk, the Internet has accelerated everything. The use of Internet in doing business has grown over the years in Africa and Zambia in particular. As such, the incidences of online identity theft have grown too. Identity theft is becoming a prevalent and increasing problem in Zambia. An identity thief only requires certain identity information to decimate a victim's life and credit. This research proposes to identify and extract various forms of identity attributes from various sources used in the physical and cyberspace to identity users accessing the financial services through extracting identity attributes from the various forms of identity credentials and application forms. Finally, design a digital identity model based on Shannon’s Information theory and Euclidean metric based Euclidean Distance Geometry (EDG) to be used for quantifying, implementation and validating of extracted identity attributes from various forms of identity credentials and application forms, in an effective way.

Keywords

Identity Theft, Identity Credential Attributes, Security, Digital Identity Model, Business.
Subscription Login to verify subscription
User
Notifications
Font Size

  • A. Soleimani, B.N. Araabi and K. Fouladi, “Deep Multitask Metric Learning for Offline Signature Verification”, Pattern Recognition Letter, Vol. 80, pp. 84-90, 2016.
  • Alliance for Financial Inclusion, “Mobile Financial Services: Mobile-Enabled Cross-Border Payments,” Available at: https://www.afi-global.org/sites/default/files/publications/mfswg_guideline_note_no_14_en9-2.pdf.
  • K. Nyati, “Mobile Money Accelerating Digital Financial Inclusion”, Available at: http://www.daily-mail.co.zm/mobile-money-accelerating-digital-financial-inclusion/.
  • Y. Yang, M. Manoharan and S.K. Barber, “Modelling and Analysis of Identity Threat Behaviors Through Text Mining of Identity Theft Stories”, Proceedings of IEEE Joint Intelligence and Security Informatics Conference, pp. 24-26, 2015.
  • E.B. Berroukech, E.B.Y. El Idrissi, R. Ajhoun and H. Lamrani, “Identity Management Systems: Laws of Identity for Models0 Evaluation”, Proceedings of 4th IEEE International Colloquium on Information Science and Technology, Vol. 16, No. 6, pp. 746-740, 2016.
  • D. Giles, “Constructing Identities in Cyberspace: The Case of Eating Disorders”, British Journal of Social Psychology, Vol. 45, No. 21, pp. 463-477, 2007.
  • D. Berbecaru and A. Lioy, “On the Design, Implementation and Integration of an Attribute Provider in the Pan-European eID Infrastructure”, Proceedings of IEEE Symposium on Computers and Communication, pp. 27-31, 2016.
  • M. Veeningen, B. De Weger and N. Zanno, “Modeling Identity-Related Properties and their Privacy Strength”, Available at: https://security1.win.tue.nl/~zannone/publication/veen-dewe-zann-10-FAST.pdf.
  • E.A. Fischer, “Cybersecurity Issues and Challenges: In Brief”, Available at: https://fas.org/sgp/crs/misc/R43831.pdf.
  • X. Zoua, B. Chen and B. Jina, “Cloud-based Identity Attribute Service with Privacy Protection in Cyberspace”, Proceedings of International Workshop on Information and Electronics Engineering, 2012.
  • W.T. Chee, C.L. Chen and M. Govindarasu, “Vulnerability Assessment of Cybersecurity for SCADA Systems”, IEEE Transactions on Power Systems, Vol. 23, No. 4, pp. 1836-1846, 2008.
  • Jackson Phiri, Tiejun Zhao and Jameson Mbale, “Identity Attributes Mining, Metrics Composition and Information Fusion Implementation using Fuzzy Inference System”, Journal of Software, Vol. 6, No. 6, pp. 1025-1033, 2011.
  • J.Phiri and Tiejun Zhao, “Identity Attributes Quantitative Analysis and the Development of a Metrics Model using Text Mining Techniques and Information Theory”, Proceedings of IEEE International Conference on Information Theory and Information Security, pp. 390-393, 2010.
  • Jackson Phiri, Tie-Jun Zhao and Johnson I. Agbinya, “Biometrics Device Metrics and Pseudo METRICS in a Multifactor Authentication with Artificial Intelligence”, Proceedings of 6th International Conference on Broadband and Biomedical Communications, pp. 157-162, 2011.
  • C. Kabuya, J. Phiri, T. Zhao and Y. Zhang, “Metric Based Technique in Multi-factor Authentication System with Artificial Intelligence Technologies”, Proceedings of International Conference on Future Wireless Networks and Information Systems, pp. 89-97, 2012.
  • L. Hansen and H. Nissenbaum, “Digital Disaster, Cyber Security, and Copenhagen School”, International Studies Quarterly, Vol. 53, pp. 1155-1174, 2009.
  • Z.D.O. Immigration, “E-Visa”, Available at: http://www.zambiaimmigration.gov.zm.
  • T.R. Society, “Progress and Research in Cybersecurity Supporting a Resilient and Trustworthy System for the UK, Available at: https://royalsociety.org/~/media/policy/projects/cybersecurity-research/cybersecurity-research-report.pdf.
  • R.A. Kemmerer, “Cybersecurity”, Proceedings of 25th International Conference on Software Engineering, pp. 1-11, 2003.
  • L. Dandurand and S.O. Serrano, “Towards Improved Cyber Security Information Sharing”, Proceedings of 5th International Conference on Cyber Conflict, pp. 1-16, 2013.
  • N.J.D.O.C. Affairs, “The Cybersecurity Handbook”, Available at:https://www.njconsumeraffairs.gov/News/Brochures/Cyber-Security-Handbook.pdf.
  • A.T.W. Paper, “New Paradigms of Digital Identity: Authentication and Authorization as a Service (AuthaaS)”, Available at: https://www.elevenpaths.com/wp-content/uploads/2015/10/Telefonica_LVTI2N.pdf.
  • R. Derakhshani and A. Ross, “Fast Automatic Retinal Vessel Segmentation and Vascular Landmarks Extraction Method for biometric Applications”, Proceedings of International Conference on Biometrics, Identity and Security, pp. 1-7, 2010.
  • W. T. Chee, C. L. Chen and M. Govindarasu, “Cybersecurity for Critical Infrastructures: Attack and Defense Modeling”, IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, pp. 853-865, 2010.
  • L. Huffman, “Exploring a National Cybersecurity Exercise for University”, IEEE Security and Privacy, Vol. 3, No. 5, pp. 27-33, 2012.
  • A.E. Joshi, “Student Centric Design for Cybersecurity Knowledge Empowerment”, Proceedings of IEEE International Conference on Technology Enhanced Education, pp. 1-4, 2012.
  • S. Cheang, “Conceptual Model for Cyber-security Readiness Assessment for Public Institutions in Developing Countries: Cabodia”, Proceedings of 4th International Conference on Computer Sciences and Convergence Information Technology, pp. 1411-1418, 2009.
  • H. Koshutanski, M. Ion and L. Telesca, “Distributed Identity Management Model for Digital Ecosystems”, Proceedings of International Conference on Emerging Security Information, Systems and Technologies, pp 1223-1229, 2007.
  • D.J. MacKay, “Information Theory, Inference, and Learning Algorithms”, Available at: http://www.inference.org.uk/itprnn/book.pdf.
  • N. Kshetri, “Indian's Cybersecurity Landscape: The role of Private Sector and Public-Private Partnership”, IEEE Computer and Reliability Society, Vol. 13, No. 3, pp. 1-8, 2015.
  • S.M. Ferdous, G. Norman and R. Poet, “Mathematical Modelling of Identity, Identity Management and Other Related Topics”, Proceedings of 7th International Conference on Security of Information and Networks, pp. 1-5, 2011.
  • S.M. Ferdous, G. Norman and R. Poet, “Mathematical Modelling of Identity, Identity Management and Other Related Topics”, Proceedings of 7th International Conference on Security of Information and Networks, pp. 1-6, 2014.
  • J. Wayman, “Biometrics in Identity Management Systems”, IEEE Security and Privacy, Vol. 8, pp. 30-37, 2008.
  • J. Vossaert, B. Lapon, De Decker and V. Naessens, “User-Centric Identity Management using Trusted Modules”, Mathematical and Computer Modelling, Vol. 57, No. 57, pp. 1592-1605, 2013.
  • F.G. Marmol, J. Girao and G.M. Perez, “TRIMS, A Privacy-Aware Trust and Reputation Model for Identity”, Computer Networks, Vol. 54, pp. 2899-2912, 2010.
  • D. Rutitis, A. Batragab and D. Ski, “Evaluation of the Conceptual Model for Corporate Identity Management in Health Care”, Proceedings of 19th International Scientific Conference; Economics and Management, pp. 23-27, 2014.
  • D. Rutitis and A. Batraga, “The Conceptual Framework of Corporate Identity in Health Care Industry”, Proceedings of International Symposium of Economic Crisis: Time for a Paradigm Shift-Towards A Systems Approach, pp. 1-6, 2013.
  • J. Wener, C.M. Westphall and C.B. Westphall, “Cloud Identity Management: A Survey on Privacy Strategies”, Computer Networks, Vol. 122, pp. 29-42, 2017.
  • R. Jamieson, P.L. Wee Land, D. Winchester, G. Stephens, A. Steel, A. Maurushat and R. Sarre, “Addressing Identity Crime in Crime Management Information System: Definitions, Classification, and Empirics”, Computer Law and Security Review, Vol. 28, No. 4, pp. 381-395, 2012.
  • H.R. Khedmatgozar and M.A. Hafezi, “The Role of Digital Identifier System in the Digital Objects”, International Journal of Information Management, Vol. 37, pp. 162-165, 2017.
  • P. Vartiainen, “On the Principles of Comparative Evaluation”, Evaluation, Vol. 3, No. 8, pp. 359-371, 2002.
  • T. J. Smedinghoff, “Solving the Legal Challenges of Trustworthy Online Identity”, Computer Law and Security Review, Vol. 28, No. 5, pp. 532-541, 2012.
  • R.M. Davison and C.X. Ou, “Digital Work in Digitally Challenged Organization”, Information and Management, Vol. 54, No. 1, pp. 129-137, 2017.
  • C. Sullivan, “Protecting Digital Identity in the Cloud: Regulating Cross Boarder Data Disclosure”, Computer Law and Security Review, Vol. 32, No. 2, pp. 137-152, 2014.
  • S. Aleem, L.F. Capretz and F. Ahmed, “A Digital Game Maturity Model (DGMM)”, Entertainment Computing, Vol. 17, pp. 55-73, 2016.
  • C. Sullivan, “Digital Identity-The Legal Person?”, Computer Law and Security Review, Vol. 25, No. 4, pp. 227-236, 2009.
  • L.E. Wang and L. Xianxian, “A Graph-based Multifold Model for Anonymizing Data with Attributes of Multiple Types”, Computers and Security, Vol. 72, pp. 122-135, 2018.
  • Y. Xu, K. Wang, A. Fu and P. Yu, “Anonymizing Transaction Databases for Publication”, Proceedings of 14th ACM International Conference on Knowledge Discovery and Data Mining, pp. 1219-1227, 2008.
  • G. Poulis, G. Loukides, A. Gkoulalas Divanis and S. Skiadopoulos, “Anonymizing Data with Relational and Transaction Attributes”, Proceedings of International Conference on Machine Learning and Knowledge Discovery in Databases, pp. 353-369, 2013.
  • T. Takahashi, K. Sobataka, T. Takenouchi, Y. Toyoda, T. Mori and T. Kohro, “Top-Down Item Set Recording for Releasing Privacy Complex Data”, Proceedings of International Conference on Privacy, Security and Trust, pp. 1-5, 2013.
  • E. Torroglosa, J. Ortiz and A. Skarmeta, “Matching-Federation-Identities, the-eduGAIN and STORK Approach”, Future Generation Computer System, Vol. 80, pp. 126-138, 2018.
  • I. Gomaa, A.M. Said, E. Abd-Elrahman, A. Hamdy and E.M. Saad, “Performance Evaluation of Virtual Identity Approaches for Anonymous Communication in Distributed Environments”, Procedia Computer Science, Vol. 109, pp. 710-717, 2017.
  • J. Rell, “Mobile Cloud Security: Attribute-Based Access Control”, Mobile Cloud Computing, Vol. 12, pp. 181-211, 2018.

Abstract Views: 196

PDF Views: 0




  • Digital Identity Modelling for Digital Financial Services in Zambia

Abstract Views: 196  |  PDF Views: 0

Authors

Wakwinji Inambao
Department of Computer Science, Mulungushi University, Zambia
Jackson Phiri
Department of Computer Science, Mulungushi University, Zambia
Douglas Kunda
Department of Computer science, University of Zambia, Zambia

Abstract


Identification and verification have always been at the heart of financial services and payments, which is even more the case in the digital age. So, while banks have long been trusted to keep money safe, is there a new role for them as stewards of digital identity? Governments should, in consultation with the private sector, develop a national identity strategy based on a federated-style model in which public and private sector identity providers would compete to supply trusted digital identities to individuals and businesses. Back then, when the world seemed smaller, slower and more local, physical identity documents were adequate for face-to-face transactions. However, the Internet changed everything. It shrank distances, created new business models and generally sped everything up. From the innovation lifecycle to access to information, processes and the clock-speed on risk, the Internet has accelerated everything. The use of Internet in doing business has grown over the years in Africa and Zambia in particular. As such, the incidences of online identity theft have grown too. Identity theft is becoming a prevalent and increasing problem in Zambia. An identity thief only requires certain identity information to decimate a victim's life and credit. This research proposes to identify and extract various forms of identity attributes from various sources used in the physical and cyberspace to identity users accessing the financial services through extracting identity attributes from the various forms of identity credentials and application forms. Finally, design a digital identity model based on Shannon’s Information theory and Euclidean metric based Euclidean Distance Geometry (EDG) to be used for quantifying, implementation and validating of extracted identity attributes from various forms of identity credentials and application forms, in an effective way.

Keywords


Identity Theft, Identity Credential Attributes, Security, Digital Identity Model, Business.

References