A Novel Approach for Secure Identity Authentication in Legacy Database Systems

被引:0
|
作者
Blue, Juanita [1 ,2 ]
Furey, Eoghan [1 ]
Condell, Joan [2 ]
机构
[1] Letterkenny Inst Technol, Dept Comp, Letterkenny, County Donegal, Ireland
[2] Univ Ulster, Intelligent Syst Res Ctr, Derry, North Ireland
来源
2017 28TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC) | 2017年
关键词
passwords; salt; encryption; authentication; user-credentials;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Information systems in the digital age have become increasingly dependent on databases to store a multitude of fundamental data. A key function of structured databases is to house authentication credentials that verify identity and allow users to access more salient personal data. Authentication databases are frequently a target of attack as they potentially provide an avenue to commit further, more lucrative crimes. Despite the provision of industry standard best practice recommendations from organisations such as Open Web Application Security Project (OWASP), Payment Card Industry Security Standards Council (PCI-SSC), Internet Engineering Task Force (IETF) and Institute of Electrical and Electronics Engineers (IEEE), often practical security implementations within industry flounder. Lacking or substandard implementations have cultivated an environment where authentication databases and the data stored therein are insecure. This was demonstrated in the 2016 exposure of a breach experienced by Yahoo where approximately one billion user credentials were stolen. The global technology company was found to be using obsolete security mechanisms to protect user passwords. Dated implementations such as these pose serious threat as they render authentication data highly vulnerable to theft and potential misuse. This paper offers a novel solution for securing authentication databases on non-compliant Apache servers. The method applies the recommended best practice mechanisms in the form of salt, one-way encryption (hashing) and iterations to both pre-existing and newly created passwords that are stored on insecure systems. The proposed solution can be implemented server-side, with little alteration to the existing infrastructure, unbeknownst to the user. It possesses the potential to improve system security, aid compliance, preserve privacy and protect users.
引用
收藏
页数:6
相关论文
共 50 条
  • [11] A secure quantum network coding scheme with identity authentication
    Shang, Tao, 1600, American Scientific Publishers (12):
  • [12] Secure AIS with Identity-Based Authentication and Encryption
    Goudosis, A.
    Katsikas, S. K.
    TRANSNAV-INTERNATIONAL JOURNAL ON MARINE NAVIGATION AND SAFETY OF SEA TRANSPORTATION, 2020, 14 (02) : 287 - 298
  • [13] Secure Identity Authentication of Community Medical Internet of Things
    Cheng, Xu
    Zhang, Ziyang
    Chen, Fulong
    Zhao, Chuanxin
    Wang, Taochun
    Sun, Hui
    Huang, Cheng
    IEEE ACCESS, 2019, 7 : 115966 - 115977
  • [14] A Novel Secure Authentication Scheme for VANETs
    Tiwari, Dinesh
    Bhushan, Mayank
    Yadav, Ankit
    Jain, Suman
    2016 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2016, : 287 - 297
  • [15] On privacy in secure biometric authentication systems
    Ignatenko, Tanya
    Willems, Frans
    2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 121 - +
  • [16] SEMOPIAS: A Novel Secure and Efficient Mutual Open PKI Identity Authentication Scheme for Mobile Commerce
    Yue, Wang
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2015, 322 : 373 - 380
  • [17] Secure Authentication Protocol for RFID Systems
    Khan, Gul N.
    Moessner, Markus B.
    2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [18] A secure authentication scheme for RFID systems
    Dass, Prajnamaya
    Om, Hari
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 100 - 106
  • [19] A lightweight, efficient, and secure identity-based authentication scheme for underwater green transport systems
    Yaduvanshi, Ritika
    Mishra, Shivendu
    Yadav, Nimisha
    Rajpoot, Prince
    ANNALS OF TELECOMMUNICATIONS, 2024, 79 (5-6) : 415 - 436
  • [20] A novel efficient and lightweight authentication scheme for secure smart grid communication systems
    Hammami, Hamza
    Ben Yahia, Sadok
    Obaidat, Mohammad S.
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (07): : 7360 - 7376