際際滷

際際滷Share a Scribd company logo
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
KTH
Applied
Information
Security
Lab
Cloud based Secure and Privacy
Enhanced Authentication &
Authorization Protocol
Umer Khalid
Dr. Abdul Ghafoor Abbasi
Misbah Irum
Dr. Awais Shibli
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
KTH
Applied
Information
Security
Lab
Outline
1. Introduction
2. Problems with existing security
mechanisms
3. Selection of components
4. Modifications
5. Workflow
6. Conclusion
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
KTH
Applied
Information
Security
Lab
1. Introduction1. Introduction
 Traditional Security Mechanisms
 Authentication System
Password Based Authentication
Kerberos
Zero knowledge Proofs
 Authorization
Access control
OTP
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
KTH
Applied
Information
Security
Lab
2.Problems
 Easily compromised
 Lengthy passwords
 Leakage risks
 Based on a single factor
 No anonymity
 Solution
 Multi factor authentication
 Access control
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
KTH
Applied
Information
Security
Lab
3. Solution
 Multi-factor authentication
 Based on what you have and what you
posses:
 Certificates
 PINs
 Smart cards
 Biometrics
 Flexible Authorization
 Access Control based on:
 Roles
 Attributes
 Combination of multiple conditions
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
KTH
Applied
Information
Security
Lab
2.Problems Revisited
 Lengthy passwords
 Leakage risks
 Based on a single factor
 Anonymity
Identity information binding.
Information only protected in transit.
Still does not cater for anonymity.
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
KTH
Applied
Information
Security
Lab
Current Challenges
 Different organizations are now shifting data
assets to the cloud such as:
 E-Government
 Health Care
 Cloud offers significant cut down in infrastructure
costs at the risk of:
 Privacy (Identity Linking)
 Data leakage
 Problem gets further amplified as data owners
are not the only ones with the data
 Cloud service providers also posses the same data
 Service provider can easily link identity information to this
data
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
KTH
Applied
Information
Security
Lab
Design of a Anonymous
Authentication & Authorization
Protocol
 Choice of components:
 Design a completely new approach
 Build on existing robust protocols
 Separate mechanisms for authentication and
authorization
 Modify the protocols to achieve anonymity
 Authentication:
 Strong authentication based server with support for
anonymity
 Authorization:
 XACML based PDP server for authorization
 PEP at multiple points
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
KTH
Applied
Information
Security
Lab
Authentication
 Strong authentication server with support
for multi-factor authentication:
Certificates
Revocable
Traceable
Partial
Anonymity
Certificates
PINs
Smart cards
Biometrics
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
KTH
Applied
Information
Security
Lab
Anonymous Digital Certificates
Certificate Anonymous
Certificate
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
KTH
Applied
Information
Security
Lab
Anonymous Digital Certificates
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
KTH
Applied
Information
Security
Lab
Certificate based Strong
Authentication
Client
SA Server
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
KTH
Applied
Information
Security
Lab
Improvements
[Cert A]
Tok ID|RND B
LCA
IDMS
Tok ID|RND B|RND A
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
KTH
Applied
Information
Security
Lab
2. Results2. Results
TAG Description Example
@author Identifies the author of a
class.
@author Ali
@exception Identifies an exception
thrown by a method
@exception exception-
name explanation
@param Documents a method's
parameter.
@param parameter-name
explanation
@return Documents a method's
return value.
Documents a method's
return value.
@since States the release when a
specific change was
introduced.
@since release

More Related Content

What's hot (17)

COMPTIA COLLEGE CEU
COMPTIA COLLEGE CEUCOMPTIA COLLEGE CEU
COMPTIA COLLEGE CEU
David Ault
A Defense-in-depth Cybersecurity for Smart Substations
A Defense-in-depth Cybersecurity for Smart SubstationsA Defense-in-depth Cybersecurity for Smart Substations
A Defense-in-depth Cybersecurity for Smart Substations
IJECEIAES
CCD_2013_Preguntas_REVIEW
CCD_2013_Preguntas_REVIEWCCD_2013_Preguntas_REVIEW
CCD_2013_Preguntas_REVIEW
Gregory Anders
4
44
4
aniketnimaje
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET -  	  A Review on Crypto-Algorithm using Different HardwareIRJET -  	  A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET Journal
35 9142 it s-execution evaluation of end-to-end edit septian
35 9142  it  s-execution evaluation of end-to-end edit septian35 9142  it  s-execution evaluation of end-to-end edit septian
35 9142 it s-execution evaluation of end-to-end edit septian
IAESIJEECS
IRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET- Design to Secure Data by using DNA Cryptography in Cloud ComputingIRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET Journal
CV
CVCV
CV
Yang Yang
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET Journal
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
IJECEIAES
Nano Communication
Nano Communication Nano Communication
Nano Communication
Behnaz Motavali
Artificial neural network for misuse detection
Artificial neural network for misuse detectionArtificial neural network for misuse detection
Artificial neural network for misuse detection
Sajan Sahu
Shridhar_Resume_Embedded
Shridhar_Resume_EmbeddedShridhar_Resume_Embedded
Shridhar_Resume_Embedded
Shridhar Kulkarni
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET-  	  Latency and Power Optimized AES Cryptography System using Scan Cha...IRJET-  	  Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET Journal
Artificial neural networks
Artificial neural networks Artificial neural networks
Artificial neural networks
Tharushi Ruwandika
IRJET- Analysis on the Open Security Issues in 802.1x EAP Security Standa...
IRJET-  	  Analysis on the Open Security Issues in 802.1x EAP Security Standa...IRJET-  	  Analysis on the Open Security Issues in 802.1x EAP Security Standa...
IRJET- Analysis on the Open Security Issues in 802.1x EAP Security Standa...
IRJET Journal
Behavior rule specification based intrusion
Behavior rule specification based intrusionBehavior rule specification based intrusion
Behavior rule specification based intrusion
jpstudcorner
COMPTIA COLLEGE CEU
COMPTIA COLLEGE CEUCOMPTIA COLLEGE CEU
COMPTIA COLLEGE CEU
David Ault
A Defense-in-depth Cybersecurity for Smart Substations
A Defense-in-depth Cybersecurity for Smart SubstationsA Defense-in-depth Cybersecurity for Smart Substations
A Defense-in-depth Cybersecurity for Smart Substations
IJECEIAES
CCD_2013_Preguntas_REVIEW
CCD_2013_Preguntas_REVIEWCCD_2013_Preguntas_REVIEW
CCD_2013_Preguntas_REVIEW
Gregory Anders
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET -  	  A Review on Crypto-Algorithm using Different HardwareIRJET -  	  A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET Journal
35 9142 it s-execution evaluation of end-to-end edit septian
35 9142  it  s-execution evaluation of end-to-end edit septian35 9142  it  s-execution evaluation of end-to-end edit septian
35 9142 it s-execution evaluation of end-to-end edit septian
IAESIJEECS
IRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET- Design to Secure Data by using DNA Cryptography in Cloud ComputingIRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET Journal
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET Journal
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
IJECEIAES
Artificial neural network for misuse detection
Artificial neural network for misuse detectionArtificial neural network for misuse detection
Artificial neural network for misuse detection
Sajan Sahu
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET-  	  Latency and Power Optimized AES Cryptography System using Scan Cha...IRJET-  	  Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET Journal
Artificial neural networks
Artificial neural networks Artificial neural networks
Artificial neural networks
Tharushi Ruwandika
IRJET- Analysis on the Open Security Issues in 802.1x EAP Security Standa...
IRJET-  	  Analysis on the Open Security Issues in 802.1x EAP Security Standa...IRJET-  	  Analysis on the Open Security Issues in 802.1x EAP Security Standa...
IRJET- Analysis on the Open Security Issues in 802.1x EAP Security Standa...
IRJET Journal
Behavior rule specification based intrusion
Behavior rule specification based intrusionBehavior rule specification based intrusion
Behavior rule specification based intrusion
jpstudcorner

Viewers also liked (9)

AMFA Company profile . !BS shw
AMFA Company profile . !BS shwAMFA Company profile . !BS shw
AMFA Company profile . !BS shw
AMFA ClimaTech Solutions Pvt Ltd
AngularJS Authentication Secure Your App with Auth0
AngularJS Authentication Secure Your App with Auth0AngularJS Authentication Secure Your App with Auth0
AngularJS Authentication Secure Your App with Auth0
ayman diab
How to Take Cloud Access Control to the Next Level
How to Take Cloud Access Control to the Next LevelHow to Take Cloud Access Control to the Next Level
How to Take Cloud Access Control to the Next Level
OneLogin
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
Ramesh Nagappan
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
Editor IJCATR
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
Ronnie Isherwood
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Chad Lawler
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
Venkatesh Chary
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Ninh Nguyen
AngularJS Authentication Secure Your App with Auth0
AngularJS Authentication Secure Your App with Auth0AngularJS Authentication Secure Your App with Auth0
AngularJS Authentication Secure Your App with Auth0
ayman diab
How to Take Cloud Access Control to the Next Level
How to Take Cloud Access Control to the Next LevelHow to Take Cloud Access Control to the Next Level
How to Take Cloud Access Control to the Next Level
OneLogin
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
Ramesh Nagappan
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
Editor IJCATR
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
Ronnie Isherwood
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Chad Lawler
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Ninh Nguyen

Similar to Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud (20)

Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
Awais Shibli
Developing an Effective
Developing an Effective Developing an Effective
Developing an Effective
webhostingguy
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In Delhi
CRAW CYBER SECURITY PVT LTD
ENHANCING EFFICIENCY OF EAP-TTLS PROTOCOL THROUGH THE SIMULTANEOUS USE OF ENC...
ENHANCING EFFICIENCY OF EAP-TTLS PROTOCOL THROUGH THE SIMULTANEOUS USE OF ENC...ENHANCING EFFICIENCY OF EAP-TTLS PROTOCOL THROUGH THE SIMULTANEOUS USE OF ENC...
ENHANCING EFFICIENCY OF EAP-TTLS PROTOCOL THROUGH THE SIMULTANEOUS USE OF ENC...
IJNSA Journal
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
Desmond Devendran
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Inductive Automation
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Inductive Automation
Study of campus network security
Study of campus network securityStudy of campus network security
Study of campus network security
Trishla Thakur
DGRZETICH_TDC531_Presentation
DGRZETICH_TDC531_PresentationDGRZETICH_TDC531_Presentation
DGRZETICH_TDC531_Presentation
Deron Grzetich, CISSP, CISM, GCIH
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks
CompTIA Security+ All in One Exam Guide, Fifth Edition (Exam SY0 501) 5th Edi...
CompTIA Security+ All in One Exam Guide, Fifth Edition (Exam SY0 501) 5th Edi...CompTIA Security+ All in One Exam Guide, Fifth Edition (Exam SY0 501) 5th Edi...
CompTIA Security+ All in One Exam Guide, Fifth Edition (Exam SY0 501) 5th Edi...
hadorngamid60
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
Awais Shibli
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive ComputingJPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
chennaijp
ATIPS - Advanced Technology Information Processing Systems
ATIPS  - Advanced Technology Information Processing SystemsATIPS  - Advanced Technology Information Processing Systems
ATIPS - Advanced Technology Information Processing Systems
Wael Badawy
Ccsk course content v1
Ccsk course content v1Ccsk course content v1
Ccsk course content v1
ShivamSharma909
CV_English
CV_EnglishCV_English
CV_English
George Rafaelov
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYU
NYU Tandon Online
A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol
Nishmitha B
PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)
Pace IT at Edmonds Community College
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PROIDEA
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
Awais Shibli
Developing an Effective
Developing an Effective Developing an Effective
Developing an Effective
webhostingguy
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In Delhi
CRAW CYBER SECURITY PVT LTD
ENHANCING EFFICIENCY OF EAP-TTLS PROTOCOL THROUGH THE SIMULTANEOUS USE OF ENC...
ENHANCING EFFICIENCY OF EAP-TTLS PROTOCOL THROUGH THE SIMULTANEOUS USE OF ENC...ENHANCING EFFICIENCY OF EAP-TTLS PROTOCOL THROUGH THE SIMULTANEOUS USE OF ENC...
ENHANCING EFFICIENCY OF EAP-TTLS PROTOCOL THROUGH THE SIMULTANEOUS USE OF ENC...
IJNSA Journal
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
Desmond Devendran
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Inductive Automation
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Inductive Automation
Study of campus network security
Study of campus network securityStudy of campus network security
Study of campus network security
Trishla Thakur
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks
CompTIA Security+ All in One Exam Guide, Fifth Edition (Exam SY0 501) 5th Edi...
CompTIA Security+ All in One Exam Guide, Fifth Edition (Exam SY0 501) 5th Edi...CompTIA Security+ All in One Exam Guide, Fifth Edition (Exam SY0 501) 5th Edi...
CompTIA Security+ All in One Exam Guide, Fifth Edition (Exam SY0 501) 5th Edi...
hadorngamid60
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
Awais Shibli
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive ComputingJPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
chennaijp
ATIPS - Advanced Technology Information Processing Systems
ATIPS  - Advanced Technology Information Processing SystemsATIPS  - Advanced Technology Information Processing Systems
ATIPS - Advanced Technology Information Processing Systems
Wael Badawy
Ccsk course content v1
Ccsk course content v1Ccsk course content v1
Ccsk course content v1
ShivamSharma909
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYU
NYU Tandon Online
A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol
Nishmitha B
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PROIDEA

Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud

  • 1. Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Cloud based Secure and Privacy Enhanced Authentication & Authorization Protocol Umer Khalid Dr. Abdul Ghafoor Abbasi Misbah Irum Dr. Awais Shibli
  • 2. Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Outline 1. Introduction 2. Problems with existing security mechanisms 3. Selection of components 4. Modifications 5. Workflow 6. Conclusion
  • 3. Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab 1. Introduction1. Introduction Traditional Security Mechanisms Authentication System Password Based Authentication Kerberos Zero knowledge Proofs Authorization Access control OTP
  • 4. Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab 2.Problems Easily compromised Lengthy passwords Leakage risks Based on a single factor No anonymity Solution Multi factor authentication Access control
  • 5. Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab 3. Solution Multi-factor authentication Based on what you have and what you posses: Certificates PINs Smart cards Biometrics Flexible Authorization Access Control based on: Roles Attributes Combination of multiple conditions
  • 6. Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab 2.Problems Revisited Lengthy passwords Leakage risks Based on a single factor Anonymity Identity information binding. Information only protected in transit. Still does not cater for anonymity.
  • 7. Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Current Challenges Different organizations are now shifting data assets to the cloud such as: E-Government Health Care Cloud offers significant cut down in infrastructure costs at the risk of: Privacy (Identity Linking) Data leakage Problem gets further amplified as data owners are not the only ones with the data Cloud service providers also posses the same data Service provider can easily link identity information to this data
  • 8. Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Design of a Anonymous Authentication & Authorization Protocol Choice of components: Design a completely new approach Build on existing robust protocols Separate mechanisms for authentication and authorization Modify the protocols to achieve anonymity Authentication: Strong authentication based server with support for anonymity Authorization: XACML based PDP server for authorization PEP at multiple points
  • 9. Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Authentication Strong authentication server with support for multi-factor authentication: Certificates Revocable Traceable Partial Anonymity Certificates PINs Smart cards Biometrics
  • 10. Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Anonymous Digital Certificates Certificate Anonymous Certificate
  • 11. Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Anonymous Digital Certificates
  • 12. Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Certificate based Strong Authentication Client SA Server
  • 13. Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Improvements [Cert A] Tok ID|RND B LCA IDMS Tok ID|RND B|RND A
  • 14. Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab 2. Results2. Results TAG Description Example @author Identifies the author of a class. @author Ali @exception Identifies an exception thrown by a method @exception exception- name explanation @param Documents a method's parameter. @param parameter-name explanation @return Documents a method's return value. Documents a method's return value. @since States the release when a specific change was introduced. @since release