Secure OpenID Authentication Model by Using Trusted Computing
The growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous acco...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2014-01-01
|
Series: | Abstract and Applied Analysis |
Online Access: | http://dx.doi.org/10.1155/2014/561487 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832554664742092800 |
---|---|
author | E. Ghazizadeh Z. S. Shams Dolatabadi R. Khaleghparast M. Zamani A. A. Manaf M. S. Abdullah |
author_facet | E. Ghazizadeh Z. S. Shams Dolatabadi R. Khaleghparast M. Zamani A. A. Manaf M. S. Abdullah |
author_sort | E. Ghazizadeh |
collection | DOAJ |
description | The growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous accounts have to be managed in a secure and simple way to be protected against identity theft. Single sign-on (SSO) and OpenID have been used to decrease the complexity of managing numerous accounts required in the Internet identity environment. Trusted Platform Module (TPM) and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. Since trust is one of the pillars of security in the cloud, this paper analyzes the existing cloud identity techniques in order to investigate their strengths and weaknesses. This paper proposes a model in which One Time Password (OTP), TPM, and OpenID are used to provide a solution against phishing as a common identity theft in cloud environment. |
format | Article |
id | doaj-art-cb6648ac1d3049c38c17261964d7cff3 |
institution | Kabale University |
issn | 1085-3375 1687-0409 |
language | English |
publishDate | 2014-01-01 |
publisher | Wiley |
record_format | Article |
series | Abstract and Applied Analysis |
spelling | doaj-art-cb6648ac1d3049c38c17261964d7cff32025-02-03T05:50:58ZengWileyAbstract and Applied Analysis1085-33751687-04092014-01-01201410.1155/2014/561487561487Secure OpenID Authentication Model by Using Trusted ComputingE. Ghazizadeh0Z. S. Shams Dolatabadi1R. Khaleghparast2M. Zamani3A. A. Manaf4M. S. Abdullah5Advanced Informatics School, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, MalaysiaAdvanced Informatics School, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, MalaysiaAdvanced Informatics School, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, MalaysiaAdvanced Informatics School, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, MalaysiaAdvanced Informatics School, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, MalaysiaAdvanced Informatics School, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, MalaysiaThe growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous accounts have to be managed in a secure and simple way to be protected against identity theft. Single sign-on (SSO) and OpenID have been used to decrease the complexity of managing numerous accounts required in the Internet identity environment. Trusted Platform Module (TPM) and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. Since trust is one of the pillars of security in the cloud, this paper analyzes the existing cloud identity techniques in order to investigate their strengths and weaknesses. This paper proposes a model in which One Time Password (OTP), TPM, and OpenID are used to provide a solution against phishing as a common identity theft in cloud environment.http://dx.doi.org/10.1155/2014/561487 |
spellingShingle | E. Ghazizadeh Z. S. Shams Dolatabadi R. Khaleghparast M. Zamani A. A. Manaf M. S. Abdullah Secure OpenID Authentication Model by Using Trusted Computing Abstract and Applied Analysis |
title | Secure OpenID Authentication Model by Using Trusted Computing |
title_full | Secure OpenID Authentication Model by Using Trusted Computing |
title_fullStr | Secure OpenID Authentication Model by Using Trusted Computing |
title_full_unstemmed | Secure OpenID Authentication Model by Using Trusted Computing |
title_short | Secure OpenID Authentication Model by Using Trusted Computing |
title_sort | secure openid authentication model by using trusted computing |
url | http://dx.doi.org/10.1155/2014/561487 |
work_keys_str_mv | AT eghazizadeh secureopenidauthenticationmodelbyusingtrustedcomputing AT zsshamsdolatabadi secureopenidauthenticationmodelbyusingtrustedcomputing AT rkhaleghparast secureopenidauthenticationmodelbyusingtrustedcomputing AT mzamani secureopenidauthenticationmodelbyusingtrustedcomputing AT aamanaf secureopenidauthenticationmodelbyusingtrustedcomputing AT msabdullah secureopenidauthenticationmodelbyusingtrustedcomputing |