Visible to the public Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation

TitleVerifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation
Publication TypeConference Paper
Year of Publication2017
AuthorsFerretti, L., Marchetti, M., Colajanni, M.
Conference Name2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)
KeywordsAccess Control, authenticated data structure protocol, authorisation, Authorization, cloud, cloud computing, composability, correctness, cryptographic protocols, cryptography, data access, Data models, data structures, database updates, identity, integrity, Metrics, oAuth, OAuth2 protocol, Outsourced Database Integrity, outsourcing, privilege revocation, Protocols, pubcrawl, Resiliency, Servers, third party Web services, user-centric architectures, verifiable delegated authorization protocol, web services
Abstract

Delegated authorization protocols have become wide-spread to implement Web applications and services, where some popular providers managing people identity information and personal data allow their users to delegate third party Web services to access their data. In this paper, we analyze the risks related to untrusted providers not behaving correctly, and we solve this problem by proposing the first verifiable delegated authorization protocol that allows third party services to verify the correctness of users data returned by the provider. The contribution of the paper is twofold: we show how delegated authorization can be cryptographically enforced through authenticated data structures protocols, we extend the standard OAuth2 protocol by supporting efficient and verifiable delegated authorization including database updates and privileges revocation.

DOI10.1109/COMPSAC.2017.260
Citation Keyferretti_verifiable_2017