Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation
Title | Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Ferretti, L., Marchetti, M., Colajanni, M. |
Conference Name | 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) |
Keywords | Access Control, authenticated data structure protocol, authorisation, Authorization, cloud, cloud computing, composability, correctness, cryptographic protocols, cryptography, data access, Data models, data structures, database updates, identity, integrity, Metrics, oAuth, OAuth2 protocol, Outsourced Database Integrity, outsourcing, privilege revocation, Protocols, pubcrawl, Resiliency, Servers, third party Web services, user-centric architectures, verifiable delegated authorization protocol, web services |
Abstract | Delegated authorization protocols have become wide-spread to implement Web applications and services, where some popular providers managing people identity information and personal data allow their users to delegate third party Web services to access their data. In this paper, we analyze the risks related to untrusted providers not behaving correctly, and we solve this problem by proposing the first verifiable delegated authorization protocol that allows third party services to verify the correctness of users data returned by the provider. The contribution of the paper is twofold: we show how delegated authorization can be cryptographically enforced through authenticated data structures protocols, we extend the standard OAuth2 protocol by supporting efficient and verifiable delegated authorization including database updates and privileges revocation. |
DOI | 10.1109/COMPSAC.2017.260 |
Citation Key | ferretti_verifiable_2017 |
- integrity
- web services
- verifiable delegated authorization protocol
- user-centric architectures
- third party Web services
- Servers
- Resiliency
- pubcrawl
- Protocols
- privilege revocation
- outsourcing
- Outsourced Database Integrity
- OAuth2 protocol
- OAuth
- Metrics
- Access Control
- identity
- database updates
- data structures
- Data models
- data access
- Cryptography
- Cryptographic Protocols
- correctness
- composability
- Cloud Computing
- cloud
- authorization
- authorisation
- authenticated data structure protocol