Identity Credential Issuance with Trusted Computing

نویسندگان

  • Norazah Abd Aziz
  • Lucyantie Mazalan
چکیده

In a client-server environment that deals with multiple clients, there is a need to provide a mechanism on the server to manage the issuance of the client credentials for security authorization. Credentials created using a particular own platform identities and functions as an authentication credentials to authenticate the platform itself in a network communication. However, these credentials can easily be shared, copied and stolen. This will led to an anonymous service sharing and worst to come when the stolen credentials is using for phishing attacks to the original user. One solution to the problem is to use tamper-resistant hardware to which a credential is bound such that a credential can only be generated and used in connection with the hardware. For that, manufacturers have started to embed into computers a tamperresistant piece of hardware, called trusted platform modules (TPM), as specified by the Trusted Computing Group. This mechanism insures that credentials can only be issued with the TPM existence in the platform thus guarantees the platform origins. This paper describes the component involved in the credential issuance method by the server trusted computing domain. To implement our approach, a client server application is used as an interface through the secure communication channel in credential request. The server acts as a Trusted Third Party to verify authorized users in this environment. Keyword-Credential, Trusted Computing, Trusted Third Party

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trusted Infrastructures for Identities

The establishment of trust relationships across multiple identifier domains in identity management architectures enables a service provider in a certain domain to trust the decisions of an identity provider located in a foreign identifier domain. As a result, users do not have to create new credentials for every identifier domain they communicate with. This trust relationship can be established...

متن کامل

Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2

Digital credentials and certificates can easily be shared and copied. For instance, if a user possesses a credential that allows her to access some service, she can easily share it with her friends and thereby let them use the service as well. While with non-anonymous credentials, this sharing can to some extend be detected by the fact that some credentials get used too often, such detection is...

متن کامل

Decentralized Anonymous Credentials

Anonymous credentials provide a powerful tool for making assertions about identity while maintaining privacy. However, a limitation of today’s anonymous credential systems is the need for a trusted credential issuer — which is both a single point of failure and a target for compromise. Furthermore, the need for such a trusted issuer can make it challenging to deploy credential systems in practi...

متن کامل

An Approach to Identity Management in Clouds without Trusted Third Parties

The management of sensitive data, including identity management (IDM), is an important problem in cloud computing, fundamental for authentication and fine-grained service access control. Our goal is creating an efficient and robust IDM solution that addresses critical issues in cloud computing. The proposed IDM scheme does not rely on trusted third parties (TTPs) or trusted dealers. The scheme ...

متن کامل

User Authentication with Smart Cards in Trusted Computing Architecture

The introduction of smart cards into trusted architectures establishes a clear-cut separation between the roles and responsibilities of both platform and user. On one hand, the Trusted Platform Module (TPM) ensures the platform trustworthiness and secures platform credentials and secrets, while smart cards guarantee user identity and protect user credentials and access authorization. Starting f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009