Home/Opinion/Articles/Identity Management and Privacy: A Rare Opportunity.../Full Text
Privacy and security

Identity Management and Privacy: A Rare Opportunity To Get It Right

By Ari Schwartz
Communications of the ACM, Vol. 54 No. 6, Pages 22-24
Comments (1)
View as: Print Mobile App ACM Digital Library Full Text (PDF) In the Digital Edition Share: Send by email Share on reddit Share on StumbleUpon
Share on Tweeter Share on Facebook
binary code in magnified fingerprint

Since 1976, when Whitfield Diffie and Martin Hellman first surmised the possibilities for the potential uses for digital signatures,1 there has been ongoing discussion of building an online identity management structure. As use of the Internet has become more central to daily life and our financial and physical security has become intertwined with cyber security, the calls to authenticate and identify individual users have increased. However, we still have not seen a single set of answers to these issues that offer a path to an interoperable identity management system that will achieve the goals of authenticating users at different levels of risk, keeping the Internet as an innovative and growing hub for the world's interactions, and building trust among Internet users. Therefore, it is easy to be doubtful and even cynical that we can build an identity management infrastructure that is voluntary, privacy-protective, secure, and interoperable. Over the next few years, we have a rare opportunity to build such a system, and this opportunity may be our last.

NSTIC represents only one pillar in an overall approach to resilient and effective cyber security, but it is an essential component to overall success.

Many countries have put forward online identity management strategies tied to centralized databases and national ID cards, but another path was clearly laid out in an important 2004 article entitled "The Accountable Net." The authors, John Palfrey, David Johnson, and Susan Crawford, suggest the current threats on the Internet create an unsustainable situation where we risk losing the benefits of the Internet's decentralized structure. They urge us to find ways of building an Internet governance that makes peers accountable to one another as that risk is lower than the risk of empowering either an existing government or building a centralized global authority. Instead of fearing the change that will take place as the Internet becomes more accountable, those of us that love its current structure must embrace change, but also "keep the fundamental architecture and values of the Internet in mind as we do so."2

President Obama recognized these concerns in the release of the May 2009 Cyberspace Policy Review (CPR), which outlined the steps the public and private sector should take to overcome the risks associated with online transactions. These actions included improving identity solutions, services and privacy-enhancing technologies, and enhancing protection for individuals' online information. In response to the short-term actions laid out in the CPR, the National Strategy for Trusted Identities in Cyberspace (NSTIC) was created and was signed by the President earlier this year; see http://www.nist.gov/nstic for details.

As the President and his Cyber Security Coordinator have noted, NSTIC represents only one pillar in an overall approach to resilient and effective cyber security, but it is an essential component to overall success. It seeks to enhance online trust by focusing on establishing identity solutions that improve our ability to identify and authenticate the organizations, individuals, and underlying infrastructure (such as routers, servers, desktops, mobile devices, software, data) involved in online transactions. NSTIC is not only about credentials and authentication. It also seeks to limit the amount of identifying information that is collected and transmitted during the course of online transactions. This concept is clearly articulated in the NSTIC vision statement: "individuals and organizations utilize secure, efficient, easy-to-use, and interoperable identity solutions to access online services in a manner that promotes confidence, privacy, choice, and innovation."

Back to Top

The Identity Ecosystem

In order to realize the vision, the strategy outlines a next generation of a trusted identity environment, the Identity Ecosystem, where individuals and organizations can operate with trust and confidence through abiding by standards and policies for identifying and authenticating their digital identities.

Four Guiding Principles establish the framework for participation in the Identity Ecosystem and form the foundation for the strategy:

In order to reach these goals, not only does the government need the help of the private sector, but also the private sector must lead its implementation. In January 2011, the U.S. Department of Commerce was named the head of a National Program Office for NSTIC. As a non-regulatory agency, Commerce's job as the lead on NSTIC is to promote voluntary private sector cooperation to facilitate the growth of this Identity Ecosystem in a peer governance model similar to that recommended in "The Accountable Net."2

To do so, the U.S. Department of Commerce will promote private-sector involvement and engagement, build consensus on legal and policy frameworks works necessary to achieve the vision, including ways to enhance privacy, free expression, and open markets; work with industry to identify where new standards or collaborative efforts may be needed; support interagency collaboration and coordinate interagency efforts associated with achieving programmatic goals; and promote important pilot programs and other implementations.

In the age of identity theft, any project regarding identity bears close watching no matter who is running it or how it is run.

There is no panacea or magic bullet to solve all cyber security issues, but leadership on an identity management infrastructure can build trust, can improve security and, if done properly, can enhance privacy, but it must be led by the same type of innovators that have made the Internet what it is today. There will be an opportunity for anyone interested to participate and, it is essential that those of us that care about the future of the Internet do so if we are to be successful.

Back to Top

Possible Future Scenarios

I realize many will read this call to participate in NSTIC and think they have heard this concern before, but in this case, I urge everyone involved in related areas to think long and hard about the future of identity management, privacy, and the Internet. There are only a few possible future scenarios.

Presidential calls on IT issues, with pilot funds behind them, do not come every day.

First, we continue on our current path. In other words, we stumble along. The market may have some good ideas on authentication that address some important Internet values: they probably will be voluntary; they may or may not protect privacy; they may be open or may be completely proprietary. In the meantime, we can expect at least a few more decades of inefficiencies, lost opportunity costs, and heavy fraud losses.

Another vision would be that governments will not wait decades and will work together or separately to begin to require identity management solutions. Although these solutions are likely to be more privacy protective, they are also likely to be more prescriptive schemes that may raise costs and make it more difficult to deliver products and services consumers want to use.

Finally, there is the NSTIC, an organized attempt to address as many issues as possible before they arise taking the leadership of the private sector and teaming it with consumer protection input from the government. It also may succeed or fail. Success has clear benefits to those who would like to ensure important aspects of today's Internet and protect privacy. Failure will put us back into one of the other scenarios.

With these options, it is clear which path is better for innovation, better for privacy, and better for openness. Certainly, in the age of identity theft, any project regarding identity bears close watching no matter who is running it or how it is run and NSTIC is no different in that respect.

Presidential calls on IT issues, with pilot funds behind them, do not come every day. There may indeed be other opportunities to develop a similar means to address related security issues while maintaining the critical values of Internet openness and privacy, but that is not a wager I am willing to make. In short, we have a chance to make a difference now. I hope you will join me and work with the U.S. Commerce Department and private sector leaders to take advantage of what may just be the last best chance to get the governance for the future of online authentication right.

Back to Top


1. Diffie, W. and Hellman, M. New directions in cryptography. IEEE Transactions on Information Theory IT-22, 6 (Nov. 1976), 644–654.

2. Johnson, D. R., Crawford, S. P., and Palfrey, J. G. The accountable Net: Peer production of Internet governance. Berkman Center for Internet & Society at Harvard Law School Virginia Journal of Law and Technology 9, 9 (2004); http://ssrn.com/abstract=529022 or DOI:10.2139/ssrn.529022.

Back to Top


Ari Schwartz (ari.schwartz@nist.gov) is Senior Internet Policy Advisor at the U.S. National Institute of Standards and Technology in Gaithersburg, MD.

Back to Top


a. See a discussion of modern Fair Information Practice Principles in the U. S. Department of Commerce Green Paper entitled "Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework" at http://www.ntia.doc.gov/reports/2010/IPTF_Privacy_GreenPaper_12162010.pdf

DOI: http://doi.acm.org/10.1145/1953122.1953134

Back to Top


UF1Figure. Multiple trust frameworks built on the foundation of the Identity Ecosystem Framework.

Back to top

Copyright held by author.

The Digital Library is published by the Association for Computing Machinery. Copyright © 2011 ACM, Inc.


June 16, 2011 06:05

The news industry has much at stake here. A system for information commerce must support the sharing of atomized, disaggregated content. This requires an universal identity protocol for the web, so stateful microaccounting is possible. Please note the circulate draft white paper at http://www.papertopersona.org

-- Bill Densmore
Consulting Fellow
Reynolds Journalism Institute
Missouri School of Journalism

Displaying 1 comment

Comment on this article

Signed comments submitted to this site are moderated and will appear if they are relevant to the topic and not abusive. Your comment will appear with your username if published. View our policy on comments

(Please sign in or create an ACM Web Account to access this feature.)

Create an Account

Log in to Submit a Signed Comment

Sign In »

Sign In

Signed comments submitted to this site are moderated and will appear if they are relevant to the topic and not abusive. Your comment will appear with your username if published. View our policy on comments
Forgot Password?

Create a Web Account

An email verification has been sent to youremail@email.com
ACM veriŞes that you are the owner of the email address you've provided by sending you a veriŞcation message. The email message will contain a link that you must click to validate this account.
You must click the link within the message in order to complete the process of creating your account. You may click on the link embedded in the message, or copy the link and paste it into your browser.
Log in to Read the Full Article

Sign in using your ACM Web Account username and password to access premium content if you are an ACM member, Communications subscriber or Digital Library subscriber.

Create an ACM Web Account Forgot Password?

Article Contents:
  • Introduction
  • The Identity Ecosystem
  • Possible Future Scenarios
  • References
  • Author
  • Footnotes
  • Figures
  • Read CACM in a mobile app!
    ACM Logo
    • ACM CACM apps for iPad, iPhone, and Android
    • ACM Digital Library app for iOS, Android, and Windows
    • Download free and sign in with ACM Web Account
    Find the app for your mobile device
    ACM DL Logo