140 likes | 405 Views
Cloud based Secure and Privacy Enhanced Authentication & Authorization Protocol. Umer Khalid Dr. Abdul Ghafoor Abbasi Misbah Irum Dr. Awais Shibli. Outline. Introduction Problems with existing security mechanisms Selection of components Modifications Workflow Conclusion.
E N D
Cloud based Secure and Privacy Enhanced Authentication &Authorization Protocol Umer Khalid Dr. Abdul Ghafoor Abbasi Misbah Irum Dr. Awais Shibli
Outline Introduction Problems with existing security mechanisms Selection of components Modifications Workflow Conclusion
1. Introduction • Traditional Security Mechanisms • Authentication System • Password Based Authentication • Kerberos • Zero knowledge Proofs • Authorization • Access control • OTP
2.Problems • Easily compromised • Lengthy passwords • Leakage risks • Based on a single factor • No anonymity • Solution • Multi factor authentication • Access control
3. Solution • Multi-factor authentication • Based on what you have and what you posses: • Certificates • PINs • Smart cards • Biometrics • Flexible Authorization • Access Control based on: • Roles • Attributes • Combination of multiple conditions
2.Problems Revisited • Identity information binding. • Information only protected in transit. • Still does not cater for anonymity. • Lengthy passwords • Leakage risks • Based on a single factor • Anonymity
Current Challenges • Different organizations are now shifting data assets to the cloud such as: • E-Government • Health Care • Cloud offers significant cut down in infrastructure costs at the risk of: • Privacy (Identity Linking) • Data leakage • Problem gets further amplified as data owners are not the only ones with the data • Cloud service providers also posses the same data • Service provider can easily link identity information to this data
Design of a Anonymous Authentication & Authorization Protocol • Choice of components: • Design a completely new approach • Build on existing robust protocols • Separate mechanisms for authentication and authorization • Modify the protocols to achieve anonymity • Authentication: • Strong authentication based server with support for anonymity • Authorization: • XACML based PDP server for authorization • PEP at multiple points
Authentication • Certificates • Revocable • Traceable • Partial Anonymity • Certificates • PINs • Smart cards • Biometrics Strong authentication server with support for multi-factor authentication:
Anonymous Digital Certificates Anonymous Certificate Certificate
Certificate based Strong Authentication SA Server Client
Improvements [Cert A] LCA Tok ID|RND B Tok ID|RND B|RND A IDMS