Towards Secure and Dependable Authentication and Authorization Infrastructures
Title | Towards Secure and Dependable Authentication and Authorization Infrastructures |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Kreutz, D., Bessani, A., Feitosa, E., Cunha, H. |
Conference Name | Dependable Computing (PRDC), 2014 IEEE 20th Pacific Rim International Symposium on |
Date Published | Nov |
Keywords | authentication, authentication and authorization services, authentication dependability, authentication infrastructures, authentication security, authorisation, authorization infrastructures, Dependability, diverse computing environments, enterprise environments, fault-free executions, intrusion tolerance, intrusion-tolerant replication, IT infrastructures, Logic gates, OpenID, Protocols, Public key, RADIUS, resilience architecture, security, Servers, software fault tolerance, trusted components, untrusted gateways |
Abstract | We propose a resilience architecture for improving the security and dependability of authentication and authorization infrastructures, in particular the ones based on RADIUS and OpenID. This architecture employs intrusion-tolerant replication, trusted components and entrusted gateways to provide survivable services ensuring compatibility with standard protocols. The architecture was instantiated in two prototypes, one implementing RADIUS and another implementing OpenID. These prototypes were evaluated in fault-free executions, under faults, under attack, and in diverse computing environments. The results show that, beyond being more secure and dependable, our prototypes are capable of achieving the performance requirements of enterprise environments, such as IT infrastructures with more than 400k users. |
DOI | 10.1109/PRDC.2014.14 |
Citation Key | 6974750 |
- intrusion-tolerant replication
- untrusted gateways
- trusted components
- software fault tolerance
- Servers
- security
- resilience architecture
- RADIUS
- Public key
- Protocols
- OpenID
- Logic gates
- IT infrastructures
- authentication
- intrusion tolerance
- fault-free executions
- enterprise environments
- diverse computing environments
- dependability
- authorization infrastructures
- authorisation
- authentication security
- authentication infrastructures
- authentication dependability
- authentication and authorization services