A Scalable Model for Secure Multiparty Authentication

01/10/2019
by   Hussain Al-Aqrabi, et al.
0

Distributed system architectures such as cloud computing or the emergent architectures of the Internet Of Things, present significant challenges for security and privacy. Specifically, in a complex application there is a need to securely delegate access control mechanisms to one or more parties, who in turn can govern methods that enable multiple other parties to be authenticated in relation to the services that they wish to consume. We identify shortcomings in an existing proposal by Xu et al for multiparty authentication and evaluate a novel model from Al-Aqrabi et al that has been designed specifically for complex multiple security realm environments. The adoption of a Session Authority Cloud ensures that resources for authentication requests are scalable, whilst permitting the necessary architectural abstraction for myriad hardware IoT devices such as actuators and sensor networks, etc. In addition, the ability to ensure that session credentials are confirmed with the relevant resource principles means that the essential rigour for multiparty authentication is established.

READ FULL TEXT

page 3

page 4

research
01/10/2019

Dynamic Multiparty Authentication of Data Analytics Services within Cloud Environments

Business analytics processes are often composed from orchestrated, colla...
research
10/23/2017

A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications

Cloud computing is significantly reshaping the computing industry built ...
research
06/13/2023

Cryptanalysis on Secure ECC based Mutual Authentication Protocol for Cloud-Assisted TMIS

The creation of TMIS (Telecare Medical Information System) makes it simp...
research
06/20/2019

Cryptanalysis of Khatoon et al.'s ECC-based Authentication Protocol for Healthcare Systems

Telecare medical information systems are gaining rapid popularity in ter...
research
09/04/2021

Conceptualising Cloud Migration Lifecycle

Many enterprise software systems supporting IT services are characterise...
research
09/26/2018

Brokering Policies and Execution Monitors for IoT Middleware

Event-based systems lie at the heart of many cloud-based Internet-of-Thi...
research
01/25/2022

From Data Leverage to Data Co-Ops: An Institutional Model for User Control over Information Access

Internet companies derive value from users by recording and influencing ...

Please sign up or login with your details

Forgot password? Click here to reset