sayI: Trusted User Authentication at Internet Scale
نویسندگان
چکیده
With Internet-scale user authentication, an organization authenticates users with which it has no prior association. Of necessity, the organization must rely on third parties, which make up the authentication infrastructure and can vouch for these users. These third parties are trusted. And since different organizations have different adversaries and different security needs, it is up to the organization to determine which third parties to trust. Unfortunately authentication infrastructures which meet the above trust requirements have been inefficient, suffering from high latency, excessive bandwidth, and high CPU load. These inefficiencies significantly impede wide-scale deployment. We introduce sayI, a Public-Key based authentication Infrastructure (PKI). It is the first PKI which is efficient at Internet scale and enables organizations to determine their risk from third parties. It protects privacy and provides security. It is designed to minimize bandwidth and latency through a careful and novel integration of authorization and authentication. In sayI, irrelevant certificates do not negatively impact performance. An Internet user authentication is guaranteed to complete in a single Internet round trip, significantly faster than alternative authentication infrastructures.
منابع مشابه
A Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا
The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases, the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...
متن کاملAn Authentication Mechanism to Enhance Security in the Cloud Environment
Cloud is a term defined as a pool of configurable computing resources that can be accessed by users based on a pay-asyou-go principle. Cloud computing is otherwise termed as internet computing because of its availability and that will be feasible only with the internet connection. Therefore, security plays a major role in cloud computing. Some of the important security services including encryp...
متن کاملMobile Devices to the Identity Rescue
Identity management is defined as the set of processes related to identity and access information for the whole identity life cycle in a system. In the open internet users need new methods for identity management that supply reliable authentication and sufficient user control. Currently applied methods often lack a proper level of security (e.g., passwords) and privacy (e.g., diverse processing...
متن کاملTAaaS: Trustworthy Authentication as a Service
Authentication as a Service (AaaS) provides ondemand delivery of multi-factor authentication (MFA). However, current AaaS has left out of consideration the trustworthiness of user inputs at client devices and the risk of privacy exposure at the AaaS providers. To solve these concerns, we present TAaaS, Trustworthy Authentication as a Service, which offers a trusted path-based MFA service to the...
متن کامل