Beyond the Hype: On Using Blockchains in Trust Management for Authentication
Title | Beyond the Hype: On Using Blockchains in Trust Management for Authentication |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Alexopoulos, N., Daubert, J., Mühlhäuser, M., Habib, S. M. |
Conference Name | 2017 IEEE Trustcom/BigDataSE/ICESS |
Publisher | IEEE |
ISBN Number | 978-1-5090-4906-6 |
Keywords | attacks and defences, authentication, bitcoin, blockchain technology, composability, Electronic mail, formal modeling, interactive systems, ODL, online interactions security, open distributed ledgers, Organizations, PKI Trust Models, pubcrawl, Public key, resilience, Resiliency, TM systems, Trust management, Trust Management for authentication, Trusted Computing, ubiquitous computing, ubiquitous system, web of trust |
Abstract | Trust Management (TM) systems for authentication are vital to the security of online interactions, which are ubiquitous in our everyday lives. Various systems, like the Web PKI (X.509) and PGP's Web of Trust are used to manage trust in this setting. In recent years, blockchain technology has been introduced as a panacea to our security problems, including that of authentication, without sufficient reasoning, as to its merits.In this work, we investigate the merits of using open distributed ledgers (ODLs), such as the one implemented by blockchain technology, for securing TM systems for authentication. We formally model such systems, and explore how blockchain can help mitigate attacks against them. After formal argumentation, we conclude that in the context of Trust Management for authentication, blockchain technology, and ODLs in general, can offer considerable advantages compared to previous approaches. Our analysis is, to the best of our knowledge, the first to formally model and argue about the security of TM systems for authentication, based on blockchain technology. To achieve this result, we first provide an abstract model for TM systems for authentication. Then, we show how this model can be conceptually encoded in a blockchain, by expressing it as a series of state transitions. As a next step, we examine five prevalent attacks on TM systems, and provide evidence that blockchain-based solutions can be beneficial to the security of such systems, by mitigating, or completely negating such attacks. |
URL | http://ieeexplore.ieee.org/document/8029486/ |
DOI | 10.1109/Trustcom/BigDataSE/ICESS.2017.283 |
Citation Key | alexopoulos_beyond_2017 |
- PKI Trust Models
- web of trust
- ubiquitous system
- ubiquitous computing
- Trusted Computing
- Trust Management for authentication
- Trust management
- TM systems
- Resiliency
- resilience
- Public key
- pubcrawl
- attacks and defences
- Organizations
- open distributed ledgers
- online interactions security
- ODL
- interactive systems
- formal modeling
- Electronic mail
- composability
- blockchain technology
- bitcoin
- authentication