Secure OpenID Authentication Model by Using Trusted Computing

The growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous acco...

Full description

Saved in:
Bibliographic Details
Main Authors: E. Ghazizadeh, Z. S. Shams Dolatabadi, R. Khaleghparast, M. Zamani, A. A. Manaf, M. S. Abdullah
Format: Article
Language:English
Published: Wiley 2014-01-01
Series:Abstract and Applied Analysis
Online Access:http://dx.doi.org/10.1155/2014/561487
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832554664742092800
author E. Ghazizadeh
Z. S. Shams Dolatabadi
R. Khaleghparast
M. Zamani
A. A. Manaf
M. S. Abdullah
author_facet E. Ghazizadeh
Z. S. Shams Dolatabadi
R. Khaleghparast
M. Zamani
A. A. Manaf
M. S. Abdullah
author_sort E. Ghazizadeh
collection DOAJ
description The growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous accounts have to be managed in a secure and simple way to be protected against identity theft. Single sign-on (SSO) and OpenID have been used to decrease the complexity of managing numerous accounts required in the Internet identity environment. Trusted Platform Module (TPM) and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. Since trust is one of the pillars of security in the cloud, this paper analyzes the existing cloud identity techniques in order to investigate their strengths and weaknesses. This paper proposes a model in which One Time Password (OTP), TPM, and OpenID are used to provide a solution against phishing as a common identity theft in cloud environment.
format Article
id doaj-art-cb6648ac1d3049c38c17261964d7cff3
institution Kabale University
issn 1085-3375
1687-0409
language English
publishDate 2014-01-01
publisher Wiley
record_format Article
series Abstract and Applied Analysis
spelling doaj-art-cb6648ac1d3049c38c17261964d7cff32025-02-03T05:50:58ZengWileyAbstract and Applied Analysis1085-33751687-04092014-01-01201410.1155/2014/561487561487Secure OpenID Authentication Model by Using Trusted ComputingE. Ghazizadeh0Z. S. Shams Dolatabadi1R. Khaleghparast2M. Zamani3A. A. Manaf4M. S. Abdullah5Advanced Informatics School, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, MalaysiaAdvanced Informatics School, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, MalaysiaAdvanced Informatics School, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, MalaysiaAdvanced Informatics School, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, MalaysiaAdvanced Informatics School, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, MalaysiaAdvanced Informatics School, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, MalaysiaThe growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous accounts have to be managed in a secure and simple way to be protected against identity theft. Single sign-on (SSO) and OpenID have been used to decrease the complexity of managing numerous accounts required in the Internet identity environment. Trusted Platform Module (TPM) and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. Since trust is one of the pillars of security in the cloud, this paper analyzes the existing cloud identity techniques in order to investigate their strengths and weaknesses. This paper proposes a model in which One Time Password (OTP), TPM, and OpenID are used to provide a solution against phishing as a common identity theft in cloud environment.http://dx.doi.org/10.1155/2014/561487
spellingShingle E. Ghazizadeh
Z. S. Shams Dolatabadi
R. Khaleghparast
M. Zamani
A. A. Manaf
M. S. Abdullah
Secure OpenID Authentication Model by Using Trusted Computing
Abstract and Applied Analysis
title Secure OpenID Authentication Model by Using Trusted Computing
title_full Secure OpenID Authentication Model by Using Trusted Computing
title_fullStr Secure OpenID Authentication Model by Using Trusted Computing
title_full_unstemmed Secure OpenID Authentication Model by Using Trusted Computing
title_short Secure OpenID Authentication Model by Using Trusted Computing
title_sort secure openid authentication model by using trusted computing
url http://dx.doi.org/10.1155/2014/561487
work_keys_str_mv AT eghazizadeh secureopenidauthenticationmodelbyusingtrustedcomputing
AT zsshamsdolatabadi secureopenidauthenticationmodelbyusingtrustedcomputing
AT rkhaleghparast secureopenidauthenticationmodelbyusingtrustedcomputing
AT mzamani secureopenidauthenticationmodelbyusingtrustedcomputing
AT aamanaf secureopenidauthenticationmodelbyusingtrustedcomputing
AT msabdullah secureopenidauthenticationmodelbyusingtrustedcomputing