Iris: Third-Party Authentication Service
نویسندگان
چکیده
Existing centralized identification systems, such as Facebook or Google, offer convenient services for authentication and storing user information that third-party services leverage to reduce friction and streamline the process of creating user profiles and logging in. However, these systems present conflict of interests, and users may be interested in a third-party service that focuses exclusively on authentication. To this end, we present Iris, a web-based, secure solution that resolves the single-point-of-failure concern and provides secure protocols of data transmission and transparency of data usage. Iris consists of two components: a database that holds users’ information encrypted with their passphrases along with a public API to retreive this data, and a client-side browser extension that handles encryption and decryption of the user’s information so that the passphrase never leaves the user’s local computer. In this paper, we detail how using Iris reduces friction for the website and user, and how a high level of security and authentication is achieved. In addition, we examine the potential threat model and present directions for future work.
منابع مشابه
Robat-c2: Robustness Oriented Biometric Authentication Tryout on Cloud Computing
Broadened service based computing in the cloud environment makes nowadays rapid computations easier. The cloud forms the structure for security and authentication mechanism which provides the privacy equipped cloud and storage that concentrates more on biometric authentication services which enhances the provable security in the persistence environment. In this paper the major focussing area is...
متن کاملPassphone: Outsourcing Phone-Based Web Authentication While Protecting User Privacy
This work introduces Passphone, a new smartphone-based authentication scheme that outsources user verification to a trusted third party without sacrificing privacy: neither can the trusted third party learn the relation between users and service providers, nor can service providers learn those of their users to others. When employed as a second factor in conjunction with, for instance, password...
متن کاملA New Approach To Provide Security for MANETS with 4G techniques
The security of MANET is one of the major problems for researchers and scholars. While using the Trusted Third Party and non Trusted Third Party schemes to provide communication and authentication, it results in lot of security attacks like missing packets, denial of service attacks, modify packets, Theft of nodes, error in packets etc. One of the TTP schemes addressed these issues effectively ...
متن کاملHome-based Authentication Protocol for Nomadic Users
We are witnessing the increasing need for pervasive Internet access from public places, such as airports and hotels. However, the inherent untrusted nature of public places makes deployment of public area wireless networks challenging. We have proposed the Home-based Authentication Protocol (HAP) that provides a framework by which to establish trust between a nomadic client and a service provid...
متن کاملPreserving User Privacy with Anonymous Authentication in Cloud Computing
Cloud computing offers its flexibility and dynamic nature in terms of its access to resources anytime and anywhere. All data and other resources in cloud storage are managed and controlled by the Cloud Service Provider. They provide security and ensure that the data is protected and free from any vulnerability. However, providing privacy through authentication mechanism is a big challenge. Most...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015