首页> 外文期刊>Computers & Security >Unified authentication factors and fuzzy service access using interaction provenance
【24h】

Unified authentication factors and fuzzy service access using interaction provenance

机译:使用交互源统一身份验证因素和模糊服务访问

获取原文
获取原文并翻译 | 示例

摘要

Authentication in service oriented computing is vulnerable to various security concerns. The core concept of authentication is dependent on credentials offered at the present moment without verifying how or when the credential was obtained by the subject. Secure authentication techniques with multi-factor and cross-platform technologies are adopted by service providers. Unfortunately, such systems require a complex integration procedure of the security frameworks. Moreover, the trend of rapid service development via service composition architectures are impeded due to the diverse models of authentication factors. Hence, the adoptability of newer authentication models are limited and constrained by the feature specifications of the external cross-platform and decentralized authentication and access control frameworks. In general, authentication models are generally based on binary successes and failures, regardless of the level of access required for a given request. The combined outcome of the above complexities results in rigid policies and complex management. Our work in this paper is characterized by notions of real-life social authentication based on the nature, quality, and length of previous encounters. We delineate the fundamental similarity of authentication factors using previous interactions. We introduce the concept of interaction provenance as a unified representation model for all existing authentication factors. We present a standardized representation model for secure interaction provenance based on the W3C Provenance Working Group (PROV) model. We illustrate the practical feasibility of creating interaction provenance graphs for various interactive events in service oriented computing. The paper also presents formal security propositions toward defining secure interaction provenance schemes. We demonstrate how interaction provenance can utilize the causal relationship of past events to leverage service composition, cross-platform integration, and timeline authentication. We posit that our generic interaction provenance model also allows easier adoption of newer authentication and access control schemes. Hence, we apply fuzzy control logic for interaction provenance records to create a novel authentication and threshold based access control model. The paper presents an interaction provenance recording and authentication protocol and a proof-of-concept implementation. We demonstrate the suitability of fuzzy rules to create innovative and flexible security frameworks using linguistic policies and visualization of contour maps. We also performed extensive experiments and comparative evaluation of various provenance preservation schemes to justify the applicability for different service models.
机译:面向服务的计算中的身份验证易受各种安全问题的影响。身份验证的核心概念取决于当前提供的凭据,而无需验证受试者如何或何时获取凭据。服务提供商采用了具有多因素和跨平台技术的安全身份验证技术。不幸的是,这样的系统需要安全框架的复杂集成过程。此外,由于身份验证因素的模型多种多样,阻碍了通过服务组合体系结构快速服务开发的趋势。因此,较新的身份验证模型的可采用性受到外部跨平台的功能规范以及分散式身份验证和访问控制框架的限制和约束。通常,身份验证模型通常基于二进制的成功和失败,而不管给定请求所需的访问级别如何。上述复杂性的综合结果导致了严格的政策和复杂的管理。我们在本文中的工作基于现实生活中的社会身份验证的概念,该概念基于先前遭遇的性质,质量和持续时间。我们使用先前的交互来描述认证因子的基本相似性。我们将交互源的概念引入为所有现有身份验证因素的统一表示模型。我们基于W3C来源工作组(PROV)模型提出了用于安全交互来源的标准化表示模型。我们说明了在面向服务的计算中为各种交互事件创建交互出处图的实际可行性。本文还提出了用于定义安全交互出处方案的正式安全提议。我们演示了交互出处如何利用过去事件的因果关系来利用服务组合,跨平台集成和时间轴认证。我们认为,我们的通用交互出处模型还可以更轻松地采用更新的身份验证和访问控制方案。因此,我们将模糊控制逻辑应用于交互出处记录,以创建一种新颖的基于身份验证和阈值的访问控制模型。本文提出了一种交互源记录和认证协议以及概念验证的实现。我们证明了模糊规则适用于使用语言策略和等高线图可视化来创建创新且灵活的安全框架。我们还对各种出处保存方案进行了广泛的实验和比较评估,以证明适用于不同服务模型的合理性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号