A Novel Approach for Secure Identity Authentication in Legacy Database Systems

被引:0
|
作者
Blue, Juanita [1 ,2 ]
Furey, Eoghan [1 ]
Condell, Joan [2 ]
机构
[1] Letterkenny Inst Technol, Dept Comp, Letterkenny, County Donegal, Ireland
[2] Univ Ulster, Intelligent Syst Res Ctr, Derry, North Ireland
来源
2017 28TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC) | 2017年
关键词
passwords; salt; encryption; authentication; user-credentials;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Information systems in the digital age have become increasingly dependent on databases to store a multitude of fundamental data. A key function of structured databases is to house authentication credentials that verify identity and allow users to access more salient personal data. Authentication databases are frequently a target of attack as they potentially provide an avenue to commit further, more lucrative crimes. Despite the provision of industry standard best practice recommendations from organisations such as Open Web Application Security Project (OWASP), Payment Card Industry Security Standards Council (PCI-SSC), Internet Engineering Task Force (IETF) and Institute of Electrical and Electronics Engineers (IEEE), often practical security implementations within industry flounder. Lacking or substandard implementations have cultivated an environment where authentication databases and the data stored therein are insecure. This was demonstrated in the 2016 exposure of a breach experienced by Yahoo where approximately one billion user credentials were stolen. The global technology company was found to be using obsolete security mechanisms to protect user passwords. Dated implementations such as these pose serious threat as they render authentication data highly vulnerable to theft and potential misuse. This paper offers a novel solution for securing authentication databases on non-compliant Apache servers. The method applies the recommended best practice mechanisms in the form of salt, one-way encryption (hashing) and iterations to both pre-existing and newly created passwords that are stored on insecure systems. The proposed solution can be implemented server-side, with little alteration to the existing infrastructure, unbeknownst to the user. It possesses the potential to improve system security, aid compliance, preserve privacy and protect users.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] A novel efficient and lightweight authentication scheme for secure smart grid communication systems
    Hamza Hammami
    Sadok Ben Yahia
    Mohammad S. Obaidat
    The Journal of Supercomputing, 2023, 79 : 7360 - 7376
  • [22] A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography
    Ao, Weijun
    Fu, Shaojing
    Zhang, Chao
    Huang, Yuzhou
    Xia, Fei
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY (CCET), 2019, : 90 - 95
  • [23] A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems
    Khan, Rafiullah
    McLaughlin, Kieran
    Kang, BooJoong
    Laverty, David
    Sezer, Sakir
    2020 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2020,
  • [24] Implementing strong authentication interoperability with legacy systems
    Zibuschka, Jan
    Rossnagel, Heiko
    POLICIES AND RESEARCH IN IDENTITY MANAGEMENT, 2008, 261 : 149 - 160
  • [25] Quantum secure direct communication scheme with identity authentication br
    Zhou, Xian-Tao
    Jiang, Ying-Hua
    ACTA PHYSICA SINICA, 2023, 72 (02)
  • [26] A Secure Identity-based Deniable Authentication Protocol for MANETs
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 91 - 95
  • [27] A novel secure group RFID authentication protocol
    GUO Cong
    ZHANG Zi-jian
    ZHU Lie-huang
    TAN Yu-an
    YANG Zhen
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2014, 21 (01) : 94 - 103
  • [28] A secure and robust approach to scalable video authentication
    Sun, QB
    He, DJ
    Zhang, ZS
    Tian, Q
    2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL II, PROCEEDINGS, 2003, : 209 - 212
  • [29] A novel secure group RFID authentication protocol
    GUO Cong
    ZHANG Zi-jian
    ZHU Lie-huang
    TAN Yu-an
    YANG Zhen
    The Journal of China Universities of Posts and Telecommunications, 2014, (01) : 94 - 103
  • [30] Secure ubiquitous authentication protocols for RFID systems
    Morshed, Md Monzur
    Atkins, Anthony
    Yu, Hongnian
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2012,