SlideShare a Scribd company logo
Secure and Privacy Enhanced Authentication & Authorization in
Cloud
By
Umer Khalid
2011-NUST-MS-CCS-35
Thesis Supervisor
Dr. Abdul Ghafoor
Department of Computing
A thesis submitted in partial fulfillment of the requirements for the degree
Of Masters of Science in Computer and Communication Security (MS CCS)
In
Department of Computing (DoC)
School of Electrical Engineering & Computer Science (SEECS)
National University of Sciences & Technology (NUST),
Islamabad, Pakistan
(2014)
Abstract.
Cloud computing is a general purpose technology that greatly impacts business owners and
organizations in terms of energy, cost and efficiency. However, organizations are reluctant
about shifting sensitive information such as identity credentials over the cloud environment.
Up till now, legacy security standards have been used by organizations for the protection of
resources which pose unique threats like identity theft and privacy leaks due to the use of
Personally Identifiable Information (PII) during the exchange of authentication and
authorization messages.
This research provides the design and implementation of an anonymous authentication and
authorization protocol as a solution to these problems. The solution consists of carefully
selected components such as, FIPS 196 for a proven and robust authentication mechanism,
whereas, XACML based Policy Enforcement Point (PEP) for authorization. An identity
management system (IDMS) is chosen in order to maintain a record of the registered users.
For anonymity, the designed protocol uses traceable anonymous certificates (TAC’s) instead
of simple public key certificates generated using anonymous identities (AID). A client side
application passes these certificates as initial parameters for authentication to a strong
authentication server (SA server). Certificates are modified further such that they do not leak
any Personal Identifiable Information (PII) about the users. Authorization is provided using
standard XACML based access control policies which are binded to the anonymous identities
of the registered users instead of real identities. Hence using this protocol, threats such as
identity theft and leakage can be mitigated with minimal changes to existing setups. In order
to validate the designed protocol, Scyther is used. After validation, it is verified that our
security protocol resists against man-in-the-middle, replay and attacks on confidentiality of
user’s credentials.

More Related Content

DOCX
Security and privacy preserving challenges of e-health solutions in cloud com...
PPTX
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
PDF
Privacy protection for role based access control in service oriented architec...
PPTX
Database modeling and security
PDF
What is Two Factor Authentication
PDF
Bluedog white paper - Our WebObjects Web Security Model
ODP
Securing The Cloud
PDF
[EMC] Source Code Protection
Security and privacy preserving challenges of e-health solutions in cloud com...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Privacy protection for role based access control in service oriented architec...
Database modeling and security
What is Two Factor Authentication
Bluedog white paper - Our WebObjects Web Security Model
Securing The Cloud
[EMC] Source Code Protection

What's hot (19)

PDF
Database security
PDF
Ingres database and compliance
PPTX
Database Security
PDF
Cybersecurity 101 - Auditing Cyber Security
POT
Automation alley day in the cloud presentation - formatted
PPT
DB security
PDF
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
PDF
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
PPT
Finding Your Lost Keys
DOCX
Cloud assisted mobile-access of health data with privacy and auditability
PDF
Some Studies on Protection for the Hidden Attribute Based Signatures without ...
PDF
Cloud assisted mobile-access of health data with privacy and auditability
PDF
Ppt security-database-overview-11g r2
PPTX
Database security
PPT
Security and information assurance
PDF
Dit yvol3iss33
PPTX
01 database security ent-db
PPTX
Security and Privacy Challenges in Cloud Computing Environments
PDF
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
Database security
Ingres database and compliance
Database Security
Cybersecurity 101 - Auditing Cyber Security
Automation alley day in the cloud presentation - formatted
DB security
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Finding Your Lost Keys
Cloud assisted mobile-access of health data with privacy and auditability
Some Studies on Protection for the Hidden Attribute Based Signatures without ...
Cloud assisted mobile-access of health data with privacy and auditability
Ppt security-database-overview-11g r2
Database security
Security and information assurance
Dit yvol3iss33
01 database security ent-db
Security and Privacy Challenges in Cloud Computing Environments
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
Ad

Viewers also liked (16)

PPT
Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
PPTX
Extending Authentication and Authorization
DOCX
Synopsis for Online Railway Railway Reservation System
PDF
Chat Bot Architecture
PPTX
Chat bot analysis
PPTX
An Introduction To Chat Bots
DOCX
Artificial intelligence report
PPTX
Artificially Intelligent chatbot Implementation
PDF
Introduction to Chatbots
DOCX
Documentation of railway reservation system
PDF
Chatbot Artificial Intelligence
PDF
The Chatbots Are Coming: A Guide to Chatbots, AI and Conversational Interfaces
 
DOCX
Online railway reservation system
PDF
chatbot and messenger as a platform
PPTX
Data security in cloud computing
PPTX
Presentation on Railway Reservation System
Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
Extending Authentication and Authorization
Synopsis for Online Railway Railway Reservation System
Chat Bot Architecture
Chat bot analysis
An Introduction To Chat Bots
Artificial intelligence report
Artificially Intelligent chatbot Implementation
Introduction to Chatbots
Documentation of railway reservation system
Chatbot Artificial Intelligence
The Chatbots Are Coming: A Guide to Chatbots, AI and Conversational Interfaces
 
Online railway reservation system
chatbot and messenger as a platform
Data security in cloud computing
Presentation on Railway Reservation System
Ad

Similar to Umer Khalid Thesis Abstract (20)

PDF
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
PDF
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
PDF
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
PDF
Design and implementation of a privacy preserved off premises cloud storage
DOCX
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
DOCX
School of Computer & Information SciencesITS-532 Cloud C.docx
PDF
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
PPTX
I am sharing 'unit 3' with youuuuuu.PPTX
PPTX
I am sharing 'unit 3' with youuuuuu.PPTX
DOCX
Security policy case study
PDF
Cyber security and cyber law
PDF
50120140502015
PPTX
2024 Most Influential Cyber Security Technologies_ A Detailed Recap.pptx
PDF
A Survey on Different Techniques Used in Decentralized Cloud Computing
PDF
Kx3518741881
PDF
Latest Cybersecurity Trends
PDF
Crush Cloud Complexity, Simplify Security - Shield X
PDF
Microsoft 365 eEnterprise E5 Overview
PDF
TYPES OF AUTHENTICATIONS IN WEB BASED FRONTEND
PDF
TYPES OF AUTHENTICATIONS IN WEB BASED FRONTEND
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
Design and implementation of a privacy preserved off premises cloud storage
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
School of Computer & Information SciencesITS-532 Cloud C.docx
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
I am sharing 'unit 3' with youuuuuu.PPTX
I am sharing 'unit 3' with youuuuuu.PPTX
Security policy case study
Cyber security and cyber law
50120140502015
2024 Most Influential Cyber Security Technologies_ A Detailed Recap.pptx
A Survey on Different Techniques Used in Decentralized Cloud Computing
Kx3518741881
Latest Cybersecurity Trends
Crush Cloud Complexity, Simplify Security - Shield X
Microsoft 365 eEnterprise E5 Overview
TYPES OF AUTHENTICATIONS IN WEB BASED FRONTEND
TYPES OF AUTHENTICATIONS IN WEB BASED FRONTEND

Umer Khalid Thesis Abstract

  • 1. Secure and Privacy Enhanced Authentication & Authorization in Cloud By Umer Khalid 2011-NUST-MS-CCS-35 Thesis Supervisor Dr. Abdul Ghafoor Department of Computing A thesis submitted in partial fulfillment of the requirements for the degree Of Masters of Science in Computer and Communication Security (MS CCS) In Department of Computing (DoC) School of Electrical Engineering & Computer Science (SEECS) National University of Sciences & Technology (NUST), Islamabad, Pakistan (2014)
  • 2. Abstract. Cloud computing is a general purpose technology that greatly impacts business owners and organizations in terms of energy, cost and efficiency. However, organizations are reluctant about shifting sensitive information such as identity credentials over the cloud environment. Up till now, legacy security standards have been used by organizations for the protection of resources which pose unique threats like identity theft and privacy leaks due to the use of Personally Identifiable Information (PII) during the exchange of authentication and authorization messages. This research provides the design and implementation of an anonymous authentication and authorization protocol as a solution to these problems. The solution consists of carefully selected components such as, FIPS 196 for a proven and robust authentication mechanism, whereas, XACML based Policy Enforcement Point (PEP) for authorization. An identity management system (IDMS) is chosen in order to maintain a record of the registered users. For anonymity, the designed protocol uses traceable anonymous certificates (TAC’s) instead of simple public key certificates generated using anonymous identities (AID). A client side application passes these certificates as initial parameters for authentication to a strong authentication server (SA server). Certificates are modified further such that they do not leak any Personal Identifiable Information (PII) about the users. Authorization is provided using standard XACML based access control policies which are binded to the anonymous identities of the registered users instead of real identities. Hence using this protocol, threats such as identity theft and leakage can be mitigated with minimal changes to existing setups. In order to validate the designed protocol, Scyther is used. After validation, it is verified that our security protocol resists against man-in-the-middle, replay and attacks on confidentiality of user’s credentials.