Authentication Algorithm Based on Hash-Tree for Web Single Sign-On

Article Preview

Abstract:

During the authentication process of web-based single sign-on system, it is insecure that all authentication messages are forwarded by the browser, and its integrity protection is not comprehensive. This vulnerability can be exploited by attackers to bypass the authentication systems, login any account. In this work we analyze the vulnerability threat model and its root causes in detail, and propose an authentication algorithm based on Hash-tree. This algorithm can not only improve the security of the system, but the processing efficiency of the system is also acceptable according to the simulation results.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1368-1373

Citation:

Online since:

January 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Rui Wang, Shuo Chen, XiaoFeng Wang. Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services[C]. /The 2012 IEEE Symposium on Security and Privacy, IEEE Computer Society Washington, DC, USA; 2012: 365-379.

DOI: 10.1109/sp.2012.30

Google Scholar

[2] Florencio D, Herley C. A large-scale study of web password habits[C]. /The 16th International Conference on World Wide Web, ACM New York, NY, USA; 2007: 657-669.

DOI: 10.1145/1242572.1242661

Google Scholar

[3] Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuellar, G. Pellegrino. From Multiple Credentials to Browser-based Single Sign-On: Are We More Secure[C]. / The 6th international conference on Tests and Proofs, Springer-Verlag Berlin, Heidelberg; 2012: 3-18.

DOI: 10.1007/978-3-642-21424-0_6

Google Scholar

[4] San-Tsai Sun, Eric Pospisil, Eric Pospisil, etc al. What Makes Users Refuse Web Single Sign-On? An Empirical Investigation of OpenID[C]. /The 7th Symposium on Usable Privacy and Security, ACM New York, NY, USA; 2011: 4-16.

DOI: 10.1145/2078827.2078833

Google Scholar

[5] Andreas Leicher, Andreas U., Yogendra Shah. Schmidt Trusted computing enhanced user authentication with OpenID and trustworthy user interface[J]. International Journal of Internet Technology and Secured Transactions archive. 2011: 3(4): 331-353.

DOI: 10.1504/ijitst.2011.043133

Google Scholar

[6] Harnik D, Kolodner E K, Shulman-Peleg A. Secure access mechanism for cloud storage[J]. Scalable Computing: Practice and Experience, 2011(12): 317-336.

Google Scholar

[7] Halevi S, Danny H , Shulman-Peleg A . Proofs of ownership in remote storage systems[C]. /The 18th ACM conference on Computer and communications security, New York: ACM, 2011: 491-500.

DOI: 10.1145/2046707.2046765

Google Scholar

[8] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores[C]. /The 14th ACM conference on Computer and communications security, New York: ACM, 2007: 598-609.

DOI: 10.1145/1315245.1315318

Google Scholar

[9] Dolev D, Yao A. On the securi ty of public key pro tocols[J]. IEEE Transactions on Informat ion Theory Mar. 1983: 29(2): 198-208.

Google Scholar

[10] W. Dai. Crypto++ Library, 5. 6. 1, Jan, 2011. http: /www. cryptopp. com.

Google Scholar