A Scalable Model for Secure Multiparty Authentication

被引:0
|
作者
Al-Aqrabi, Hussain [1 ]
Hill, Richard [1 ]
机构
[1] Univ Huddersfield, Ctr Ind Analyt, Huddersfield HD1 3DH, W Yorkshire, England
关键词
Cloud computing; distributed systems; security; authentication; trust; multiparty; Internet of Things; CLOUD; ARCHITECTURE;
D O I
10.1109/SmartWorld.2018.00039
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed system architectures such as cloud computing or the emergent architectures of the Internet Of Things, present significant challenges for security and privacy. Specifically, in a complex application there is a need to securely delegate access control mechanisms to one or more parties, who in turn can govern methods that enable multiple other parties to be authenticated in relation to the services that they wish to consume. We identify shortcomings in an existing proposal by Xu et al for multiparty authentication and evaluate a novel model from Al-Aqrabi et al that has been designed specifically for complex multiple security realm environments. The adoption of a Session Authority Cloud ensures that resources for authentication requests are scalable, whilst permitting the necessary architectural abstraction for myriad hardware IoT devices such as actuators and sensor networks, etc. In addition, the ability to ensure that session credentials are confirmed with the relevant resource principles means that the essential rigour for multiparty authentication is established.
引用
收藏
页码:17 / 22
页数:6
相关论文
共 50 条
  • [1] Scalable secure multiparty computation
    Damgard, Ivan
    Ishai, Yuval
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 501 - 520
  • [2] A Secure and Scalable Behavioral Dynamics Authentication Model
    Oladipo, Idowu Dauda
    Awotunde, Joseph Bamidele
    Nicho, Mathew
    Buari, Jemima Omotola
    Abdulraheem, Muyideen
    Gaber, Tarek
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (08) : 21 - 32
  • [3] Scalable and unconditionally secure multiparty computation
    Damgard, Ivan
    Nielsen, Jesper Buns
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 572 - 590
  • [4] Secure and Scalable RFID Authentication Protocol
    Fernandez-Mir, Albert
    Castella-Roca, Jordi
    Viejo, Alexandre
    [J]. DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2011, 6514 : 231 - 243
  • [5] A secure and robust approach to scalable video authentication
    Sun, QB
    He, DJ
    Zhang, ZS
    Tian, Q
    [J]. 2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL II, PROCEEDINGS, 2003, : 209 - 212
  • [6] Provably Secure Scalable Distributed Authentication for Clouds
    Huszti, Andrea
    Olah, Norbert
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2020, 2020, 12579 : 188 - 210
  • [7] A Scalable Robust Authentication Protocol for Secure Vehicular Communications
    Zhang, Lei
    Wu, Qianhong
    Solanas, Agusti
    Domingo-Ferrer, Josep
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (04) : 1606 - 1617
  • [8] Secure multiparty access and authentication based on advanced fuzzy extractor in smart home
    Uppuluri, Sirisha
    Lakshmeeswari, G.
    [J]. SOFT COMPUTING, 2024, 28 (06) : 4899 - 4914
  • [9] Secure multiparty access and authentication based on advanced fuzzy extractor in smart home
    Sirisha Uppuluri
    G. Lakshmeeswari
    [J]. Soft Computing, 2024, 28 (6) : 4899 - 4914
  • [10] Multiparty Simultaneous Quantum Identity Authentication Secure against Fake Signal Attacks
    Waseda, Atsushi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 166 - 170