A Novel Approach for Secure Identity Authentication in Legacy Database Systems

被引:0
|
作者
Blue, Juanita [1 ,2 ]
Furey, Eoghan [1 ]
Condell, Joan [2 ]
机构
[1] Letterkenny Inst Technol, Dept Comp, Letterkenny, County Donegal, Ireland
[2] Univ Ulster, Intelligent Syst Res Ctr, Derry, North Ireland
来源
2017 28TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC) | 2017年
关键词
passwords; salt; encryption; authentication; user-credentials;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Information systems in the digital age have become increasingly dependent on databases to store a multitude of fundamental data. A key function of structured databases is to house authentication credentials that verify identity and allow users to access more salient personal data. Authentication databases are frequently a target of attack as they potentially provide an avenue to commit further, more lucrative crimes. Despite the provision of industry standard best practice recommendations from organisations such as Open Web Application Security Project (OWASP), Payment Card Industry Security Standards Council (PCI-SSC), Internet Engineering Task Force (IETF) and Institute of Electrical and Electronics Engineers (IEEE), often practical security implementations within industry flounder. Lacking or substandard implementations have cultivated an environment where authentication databases and the data stored therein are insecure. This was demonstrated in the 2016 exposure of a breach experienced by Yahoo where approximately one billion user credentials were stolen. The global technology company was found to be using obsolete security mechanisms to protect user passwords. Dated implementations such as these pose serious threat as they render authentication data highly vulnerable to theft and potential misuse. This paper offers a novel solution for securing authentication databases on non-compliant Apache servers. The method applies the recommended best practice mechanisms in the form of salt, one-way encryption (hashing) and iterations to both pre-existing and newly created passwords that are stored on insecure systems. The proposed solution can be implemented server-side, with little alteration to the existing infrastructure, unbeknownst to the user. It possesses the potential to improve system security, aid compliance, preserve privacy and protect users.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] An Approach to Secure Legacy Software Systems
    Jasser, Stefanie
    Kelbert, Jonas
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 299 - 309
  • [2] Host Oriented Factor Normalizing Authentication Resource: More Secure Authentication for Legacy Systems
    Hofnar, Aurel-Dragon
    Joldos, Marius
    2019 IEEE 15TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING (ICCP 2019), 2019, : 169 - 174
  • [3] DynamicPIN: A Novel Approach towards Secure ATM Authentication
    Kim, Jong-Hoon
    Sharma, Gokarna
    Cardenas, Irvin Steve
    Kim, Do Yeon
    Prabakar, Nagarajan
    Iyengar, S. S.
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 68 - 73
  • [4] A Novel Graphical Authentication System for Secure Banking Systems
    Aravindh, B.
    Kumar, V. D. Ambeth
    Harish, G.
    Siddartth, V.
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), 2017, : 177 - 183
  • [5] Secure identity authentication and logical access control for airport information systems
    David, MW
    Hussein, GA
    Sakurai, K
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 314 - 320
  • [6] A Novel Approach for Protecting Legacy Authentication Databases in Consideration of GDPR
    Blue, Juanita
    Furey, Eoghan
    2018 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2018), 2018,
  • [7] A novel approach to building secure systems
    Vidakovic, Dragan
    Simic, Dejan
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 1074 - 1081
  • [8] Secure identity key and blockchain-based authentication approach for secure data communication in multi-WSN
    Ganeshan, Arulkumaran
    Jayagopalan, Santhosh
    Perumal, Balamurugan
    Sarveshwaran, Velliangiri
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (28):
  • [9] A Secure Certificateless Identity Authentication Scheme Based on Blockchain
    Ao, Weijun
    Fu, Shaojing
    Zhang, Chao
    Xu, Ming
    TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 251 - 266
  • [10] An Efficient and Provably Secure Identity Authentication Scheme for VANET
    Zhou, Yanwei
    Wang, Zhaolong
    Qiao, Zirui
    Yang, Bo
    Zhang, Mingwu
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (19) : 17170 - 17183