An Internet Authorization Scheme Using Smart-Card-Based Security Kernels
نویسندگان
چکیده
Today, most Internet applications are based on the client-server model. In this model, typically, the server distrusts clients, and grants each client access rights according to the client’s identity. This enables the server to record a lot of personal information about clients: identity, usual IP address, postal address, credit card number, purchase habits, etc. Such a model is thus necessarily privacy intrusive. Moreover, the client-server model is not rich enough to cope with complex transactions involving more than two participants. For example, an electronic commerce transaction requires usually the cooperation of a customer, a merchant, a credit card company, a bank, a delivery company, etc. Each of these participants has different interests, and thus distrusts the other participants. Within the MAFTIA1 project, we are developing authorization schemes that can grant to each participant fair rights, while distributing to each one only the information strictly needed to execute its own task, i.e., a proof that the task has to be executed and the parameters needed for this execution, without unnecessary information such as participant identities. These schemes are based on two levels of protection: • An authorization server is in charge of granting or denying rights for high-level operations involving several participants; if a high-level operation is authorized, the authorization server distributes capabilities for all the elementary operations that are needed to carry it out. • On each participating host, a security kernel is responsible for fine-grain authorization, i.e., for controlling the access to all local resources and objects according to the capabilities that accompany each request. To enforce hack-proofing of such security kernels on off-the-shelf computers connected to the Internet, critical parts of the security kernel will be implemented on a Java Card. In the following sections, the general authorization architecture and the security kernel are presented.
منابع مشابه
A Simple Password Authentication Scheme Based on Geometric Hashing Function
Password authentication protocol is one of most important mechanisms to prevent resources from accessing by unauthorized users. Many password authentication schemes have been developed in last decades, and many of them are based on the use of smart card. However, nowadays it is not applicable for many applications on the Internet to adopt the smart card in their authentication scheme due to its...
متن کاملA Smart Card-based Authentication Scheme Using User Identify Cryptography
The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user over insecure network environments. Recently, smart card-based user authentication schemes have been used in a wide range of applications, such as Internet commerce, electronic mail system, and voice over Internet protocol. However, most existing authentication schemes cannot protect the privacy o...
متن کاملNetwork Security Analysis Based on Authentication Techniques
Network Security issues are now becoming important as society is moving to digital information age. Data security is the utmost critical component in ensuring safe transmission of information through the internet. It comprises authorization of access to information in a network, controlled by the network administrator. The task of Network security not only requires ensuring the security of end ...
متن کاملA Smart Card Solution for Access Control and Trust Management for Nomadic Users
Increasing efforts are placed on security solutions for nomadic users. Solutions based on smart cards offer physical and logical portability, robustness, low cost, and high security. Nevertheless, such solutions concentrate only on offering the cryptographical capabilities of the smart card, together with key and user certificate storage. Advanced trust management and access control are not add...
متن کاملA Novel Smart Card Authentication Scheme using Image Watermarking
One of the primary issues of information technology and communication is the security of information from unwanted frauds. For every transaction over insecure channel authentication is required. Since the rise of the Internet smart card authentication schemes have been widely used to avoid the problems related to traditional password based authentication schemes. However, most of the smart card...
متن کامل