Cloud based Secure and Privacy Enhanced Authentication & Authorization Protocol
Cloud based Secure and Privacy Enhanced Authentication & Authorization Protocol. Umer Khalid Dr. Abdul Ghafoor Abbasi Misbah Irum Dr. Awais Shibli. Outline. Introduction Problems with existing security mechanisms Selection of components Modifications Workflow Conclusion.
Cloud based Secure and Privacy Enhanced Authentication & Authorization Protocol
E N D
Presentation Transcript
Cloud based Secure and Privacy Enhanced Authentication &Authorization Protocol Umer Khalid Dr. Abdul Ghafoor Abbasi Misbah Irum Dr. Awais Shibli
Outline Introduction Problems with existing security mechanisms Selection of components Modifications Workflow Conclusion
1. Introduction • Traditional Security Mechanisms • Authentication System • Password Based Authentication • Kerberos • Zero knowledge Proofs • Authorization • Access control • OTP
2.Problems • Easily compromised • Lengthy passwords • Leakage risks • Based on a single factor • No anonymity • Solution • Multi factor authentication • Access control
3. Solution • Multi-factor authentication • Based on what you have and what you posses: • Certificates • PINs • Smart cards • Biometrics • Flexible Authorization • Access Control based on: • Roles • Attributes • Combination of multiple conditions
2.Problems Revisited • Identity information binding. • Information only protected in transit. • Still does not cater for anonymity. • Lengthy passwords • Leakage risks • Based on a single factor • Anonymity
Current Challenges • Different organizations are now shifting data assets to the cloud such as: • E-Government • Health Care • Cloud offers significant cut down in infrastructure costs at the risk of: • Privacy (Identity Linking) • Data leakage • Problem gets further amplified as data owners are not the only ones with the data • Cloud service providers also posses the same data • Service provider can easily link identity information to this data
Design of a Anonymous Authentication & Authorization Protocol • Choice of components: • Design a completely new approach • Build on existing robust protocols • Separate mechanisms for authentication and authorization • Modify the protocols to achieve anonymity • Authentication: • Strong authentication based server with support for anonymity • Authorization: • XACML based PDP server for authorization • PEP at multiple points
Authentication • Certificates • Revocable • Traceable • Partial Anonymity • Certificates • PINs • Smart cards • Biometrics Strong authentication server with support for multi-factor authentication:
Anonymous Digital Certificates Anonymous Certificate Certificate
Certificate based Strong Authentication SA Server Client
Improvements [Cert A] LCA Tok ID|RND B Tok ID|RND B|RND A IDMS