Identifying an OpenID anti-phishing scheme for cyberspace

被引:7
|
作者
Abbas, Haider [1 ,2 ]
Mahmoodzadeh, Moeen Qaemi [2 ]
Khan, Farrukh Aslam [1 ,3 ]
Pasha, Maruf [4 ]
机构
[1] King Saud Univ, Riyadh, Saudi Arabia
[2] Natl Univ Sci & Technol, Islamabad, Pakistan
[3] Natl Univ Comp & Emerging Sci, Islamabad, Pakistan
[4] Bahauddin Zakariya Univ, Dept Informat Technol, Multan, Pakistan
关键词
OpenID; phishing; password-less authentication; secure OpenID provider; cyber security innovations;
D O I
10.1002/sec.1027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
OpenID is widely being used for user centric identity management in many Web applications. OpenID provides Web users with the ability to manage their identities through third party identity providers while remaining independent of the subject that actually uses the identities to authenticate individuals. Starting from the early stages of its inception, OpenID has received a large amount of acceptance and use in the current Web community because of its flexibility and ease of use. However, in addition to its benefits and flexibilities, OpenID faces its own share of vulnerabilities and threats, which have made its future and large-scale use in cyberspace questionable. OpenID Phishing is one such attack that has received much attention and that requires a comprehensive solution. This paper aims at identifying and discussing a solution to OpenID Phishing by proposing a user authentication scheme that allows OpenID providers to identify a user using publicly known entities. The research will help in next-generation cyber security innovations by reducing the authentication dependency on user credentials, that is, login name/password. The authentication scheme is also validated through detailed descriptions of use cases and prototype implementation. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:481 / 491
页数:11
相关论文
共 50 条
  • [41] PhishTackle—a web services architecture for anti-phishing
    R. Gowtham
    Ilango Krishnamurthi
    Cluster Computing, 2014, 17 : 1051 - 1068
  • [42] An Anti-Phishing Method based on Feature Analysis
    Rajab, Majed
    2ND INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND SOFT COMPUTING (ICMLSC 2018), 2015, : 133 - 139
  • [43] How Effective is Anti-Phishing Training for Children?
    Lastdrager, Elmer
    Gallardo, Ines Carvajal
    Hartel, Pieter
    Junger, Marianne
    PROCEEDINGS OF THIRTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY (SOUPS 2017), 2017, : 229 - 239
  • [44] An Anti-Phishing System Employing Diffused Information
    Chen, Teh-Chung
    Stepan, Torin
    Dick, Scott
    Miller, James
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 16 (04)
  • [45] 2 Years in the anti-phishing group of a large company
    Gallo, Luigi
    Maiello, Alessandro
    Botta, Alessio
    Ventre, Giorgio
    COMPUTERS & SECURITY, 2021, 105
  • [46] Efficacy of Anti-phishing Measures and Strategies - A research Analysis
    Bindra, Gundeep Singh
    World Academy of Science, Engineering and Technology, 2010, 69 : 366 - 372
  • [47] Survey paper: Taxonomy of website anti-phishing solutions
    Zaimi, Rania
    Hafidi, Mohamed
    Lamia, Mahnane
    2020 SEVENTH INTERNATIONAL CONFERENCE ON SOCIAL NETWORK ANALYSIS, MANAGEMENT AND SECURITY (SNAMS), 2020, : 101 - 108
  • [48] A Survey on Anti-phishing techniques in Mobile Phones.
    Chorghe, Sharvari Prakash
    Shekokar, Narendra
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 556 - 560
  • [49] Anti-phishing technique based on dynamic image captcha using multi secret sharing scheme
    Arora, Akanksha
    Garg, Hitendra
    Shivani, Shivendra
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2022, 88
  • [50] An information-sharing based anti-phishing system
    Cheng, Yueqing
    Yuan, Zhen
    Ma, Lei
    Deng, Robert H.
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 265 - +