Friday, August 9, 2019

Model for Integrating Physical and Virtual Identity Management Systems Thesis

Model for Integrating Physical and Virtual Identity Management Systems - Thesis Example This research will begin with the presentation of theories in the field of security and identity. Secure authentication protocol for the multi-server environment using dynamic ID. This theory relies on the nonce-based (a value or counter) mechanism rather than timestamp. The authentication key of the user is based on two factors such that the theft of one cannot be used to recreate the other, thereby improving the level of security. The theft of the past session key cannot serve to provide access to any individual twice since the key is nonce-based and unique every time. User anonymity is protected with the dynamicity of the variables of the login session. The user Ui sends the following login message to the desired server Sj: (CIDi, Pij, Qi, Ni) where CIDi is the dynamic and ID of Ui, Pij and Qij are nonce-based variables and Ni is the nonce value. The above-mentioned variables are computed by hash functions in accordance with the uniquely generated nounce. This technique not only p rovides a unique session but also hides the identity of the user.   Its attributes: Two-factor authentication; Single registration for multi-server access; User anonymity; Avoidance of time-synchronization problem. These authors have not implemented their approach in the physical environments; however, the attributes of their theory seem effective enough to facilitate a secure service in multi-server environments.... Several laws and security measures are deployed to protect the identity of individuals in the physical world but minimal efforts have been witnessed for the provision of such laws in online spaces. Control of personal information Clear mapping between physical and virtual identity Conceal information This theory is relevant since it provides an individual certain rights to control the exposure of his personal information. This enhances the level of privacy and security of the data. The authors explain the implementation of the concept of e-ID federation which provides access across multiple platforms [21]. e-ID federation implements a security token service (STS) that is based on the Windows Identity Framework. The authentication mechanism is based on security certificates, login forms, Windows Authentication and OpenID credentials [22]. A common platform is established by the STS that can be accessed by different sources to authenticate the individuals. The interoperability takes pl ace on an intermediate layer that serves as an abstraction of the authentication mechanism. The federated authentication mechanism of STS can be seen in Appendix A.2 Security certificates OpenID credentials WS Federation Specification The STS authentication mechanism has been explained in a comprehensive manner with the aid of a diagram. Windows Identity framework can serve as the basis of the authentication mechanism for the chosen research study. Perspectives Theory name Definition of the theory The reason for selecting this theory Its attributes If the theory and attributes can be applied in virtual or physical environments Acceptability and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.