A Scalable Model for Secure Multiparty Authentication

被引:0
|
作者
Al-Aqrabi, Hussain [1 ]
Hill, Richard [1 ]
机构
[1] Univ Huddersfield, Ctr Ind Analyt, Huddersfield HD1 3DH, W Yorkshire, England
关键词
Cloud computing; distributed systems; security; authentication; trust; multiparty; Internet of Things; CLOUD; ARCHITECTURE;
D O I
10.1109/SmartWorld.2018.00039
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed system architectures such as cloud computing or the emergent architectures of the Internet Of Things, present significant challenges for security and privacy. Specifically, in a complex application there is a need to securely delegate access control mechanisms to one or more parties, who in turn can govern methods that enable multiple other parties to be authenticated in relation to the services that they wish to consume. We identify shortcomings in an existing proposal by Xu et al for multiparty authentication and evaluate a novel model from Al-Aqrabi et al that has been designed specifically for complex multiple security realm environments. The adoption of a Session Authority Cloud ensures that resources for authentication requests are scalable, whilst permitting the necessary architectural abstraction for myriad hardware IoT devices such as actuators and sensor networks, etc. In addition, the ability to ensure that session credentials are confirmed with the relevant resource principles means that the essential rigour for multiparty authentication is established.
引用
收藏
页码:17 / 22
页数:6
相关论文
共 50 条
  • [31] Secure Multiparty Computation of Approximations
    Feigenbaum, Joan
    Ishai, Yuval
    Malkin, Tal
    Nissim, Kobbi
    Strauss, Martin J.
    Wright, Rebecca N.
    ACM TRANSACTIONS ON ALGORITHMS, 2006, 2 (03) : 435 - 472
  • [32] Secure multiparty quantum summation
    Du Jian-Zhong
    Chen Xiu-Bo
    Wen Qiao-Yan
    Zhu Fu-Chen
    ACTA PHYSICA SINICA, 2007, 56 (11) : 6214 - 6219
  • [33] An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment
    Izza, Sarah
    Benssalah, Mustapha
    Drouiche, Karim
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [34] ESAP: Efficient and Scalable Authentication Protocol with Conditional Privacy for Secure Vehicular Communications
    Weerasinghe, Hesiri
    Fu, Huirong
    2010 IEEE GLOBECOM WORKSHOPS, 2010, : 1729 - 1734
  • [35] A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET
    Lim, Kiho
    Tuladhar, Kastuv M.
    Wang, Xiwei
    Liu, Weihua
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017,
  • [36] A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things
    Naeem, Muhammad
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Karuppiah, Marimuthu
    Kumari, Saru
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (13)
  • [37] Secure Multiparty Graph Computation
    Kukkala, Varsha Bhat
    Iyengar, S. R. S.
    Saini, Jaspal Singh
    2016 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2016,
  • [38] Scalable Lightweight Blockchain-Based Authentication Mechanism for Secure VoIP Communication
    El Azzaoui, Abir
    Choi, Min Yeong
    Lee, Chang Hoon
    Park, Jong Hyuk
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2022, 12
  • [39] Secure multiparty quantum summation
    Du, Jian-Zhong
    Chen, Xiu-Bo
    Wen, Qiao-Yan
    Zhu, Fu-Chen
    Wuli Xuebao/Acta Physica Sinica, 2007, 56 (11): : 6214 - 6219
  • [40] Assessment of Two Privacy Preserving Authentication Methods Using Secure Multiparty Computation Based on Secret Sharing
    Falamas, Diana-Elena
    Marton, Kinga
    Suciu, Alin
    SYMMETRY-BASEL, 2021, 13 (05):