Improved OpenID Authorization Registration Process

Article Preview

Abstract:

Cloud technology has undergone significant and rapid growth in recent years, providing users with ever more Cloud resources. The services offered are based on users’ usage habits, so users come to rely ever more on Cloud applications. OpenID Union proposed an authorization method, allowing the authorized transfer of users’ personal data from one Cloud to another, using personal registration information. However, since providers do not protect users’ private information, attackers can easily intercept and tamper with confidential messages. In this paper, we use the characteristics of the blind signature to support user verification of the registering provider, to protect the user’s identity, and to address known vulnerabilities in the system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

924-928

Citation:

Online since:

May 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] D. Svantesson, R. Clarke: Privacy and consumer risks in cloud computing, , Computer Law & Security Review, 26(4) 391-397 (2010).

DOI: 10.1016/j.clsr.2010.05.005

Google Scholar

[2] OpenID, http: /en. wikipedia. org/wiki/OpenID.

Google Scholar

[3] OpenID: introduction and how to for non-techies, http: /www. consumingexperience. com/2006/12/openid-introduction. html.

Google Scholar

[4] Attribute Exchange Security Alert, http: /openid. net/2011/05/05/attribute-exchange-security-alert.

Google Scholar

[5] Cloud Computing and User Authentication, http: /blogs. msdn. com/b/dachou/archive/2008/08/19/cloud-computing-and-user-authentication. aspx.

Google Scholar

[6] Strong user authentication on the web, http: /msdn. microsoft. com/en-us/library/cc838351. aspx.

Google Scholar

[7] B. Ohlman, A. Eriksson, R. Rembarz: What networking of Information can do for cloud computing, "in: IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE, 09, 78-83.

DOI: 10.1109/wetice.2009.27

Google Scholar

[8] R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, I. Brandic: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, , Future Generation Computer Systems, 25(6) 599-616 (2009).

DOI: 10.1016/j.future.2008.12.001

Google Scholar

[9] S. Subashini, V. Kavitha: A survey on security issues in service delivery models of cloud computing, , Journal of Network and Computer Applications, 34(1) 1-11(2011).

DOI: 10.1016/j.jnca.2010.07.006

Google Scholar

[10] F.Y. Yang, C.M. Liao: A Provably Secure and Efficient Strong Designated Verifier Signature Scheme, , International Journal of Network Security, 10(3) 223-227 (2010).

DOI: 10.1109/nbis.2014.20

Google Scholar

[11] M. Rasslan, A. Youssef: Comments on the security of Chen's authenticated encryption scheme, , Computers and Electrical Engineering, 37(1) 71-74 (2011).

DOI: 10.1016/j.compeleceng.2010.09.001

Google Scholar

[12] C.C. Chang, J.S. Lee: An anonymous voting mechanism based on the key exchange protocol, , Computers & Security, 25(4) 307-314 (2006).

DOI: 10.1016/j.cose.2006.02.004

Google Scholar