Identifying an OpenID anti-phishing scheme for cyberspace

被引:7
|
作者
Abbas, Haider [1 ,2 ]
Mahmoodzadeh, Moeen Qaemi [2 ]
Khan, Farrukh Aslam [1 ,3 ]
Pasha, Maruf [4 ]
机构
[1] King Saud Univ, Riyadh, Saudi Arabia
[2] Natl Univ Sci & Technol, Islamabad, Pakistan
[3] Natl Univ Comp & Emerging Sci, Islamabad, Pakistan
[4] Bahauddin Zakariya Univ, Dept Informat Technol, Multan, Pakistan
关键词
OpenID; phishing; password-less authentication; secure OpenID provider; cyber security innovations;
D O I
10.1002/sec.1027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
OpenID is widely being used for user centric identity management in many Web applications. OpenID provides Web users with the ability to manage their identities through third party identity providers while remaining independent of the subject that actually uses the identities to authenticate individuals. Starting from the early stages of its inception, OpenID has received a large amount of acceptance and use in the current Web community because of its flexibility and ease of use. However, in addition to its benefits and flexibilities, OpenID faces its own share of vulnerabilities and threats, which have made its future and large-scale use in cyberspace questionable. OpenID Phishing is one such attack that has received much attention and that requires a comprehensive solution. This paper aims at identifying and discussing a solution to OpenID Phishing by proposing a user authentication scheme that allows OpenID providers to identify a user using publicly known entities. The research will help in next-generation cyber security innovations by reducing the authentication dependency on user credentials, that is, login name/password. The authentication scheme is also validated through detailed descriptions of use cases and prototype implementation. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:481 / 491
页数:11
相关论文
共 50 条
  • [1] MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones
    Wu, Longfei
    Du, Xiaojiang
    Wu, Jie
    2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2014,
  • [2] An Anti-Phishing Kit Scheme for Secure Web Transactions
    Orunsolu, A. A.
    Sodiya, A. S.
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 15 - 24
  • [3] Classification of Anti-phishing Solutions
    Chanti S.
    Chithralekha T.
    SN Computer Science, 2020, 1 (1)
  • [4] A Secured Methodology for Anti-Phishing
    Churi, Tanvi
    Sawardekar, Pranay
    Pardeshi, Abhijeet
    Vartak, Pallavi
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [5] Anti-phishing: A comprehensive perspective
    Varshney, Gaurav
    Kumawat, Rahul
    Varadharajan, Vijay
    Tupakula, Uday
    Gupta, Chandranshu
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 238
  • [6] Anti-Phishing in Offense and Defense
    Yue, Chuan
    Wang, Haining
    24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 345 - 354
  • [7] Provably Secure Anti-Phishing Scheme for Medical Information in Smart Healthcare
    Liu, Shuangshuang
    Wang, Zhi
    Kumari, Saru
    Lv, Jianhui
    Chen, Chien-Ming
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (23): : 38086 - 38097
  • [8] NoPhish: An anti-phishing education app
    Canova, Gamze
    Volkamer, Melanie
    Bergmann, Clemens
    Borza, Roland
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8743 : 88 - 192
  • [9] NoPhish: An Anti-Phishing Education App
    Canova, Gamze
    Volkamer, Melanie
    Bergmann, Clemens
    Borza, Roland
    SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 188 - 192
  • [10] Some thoughts about anti-phishing
    Jenq, John
    Cheng, Rex
    3RD INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS, AND APPLICAT/4TH INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, 2006, : 181 - 185