SUPA: Strewn User-Preserved Authentication

Ahmed, Monjur (2017) SUPA: Strewn User-Preserved Authentication. Reasearch in Action, Waikato Institute of Technology, Hamilton, New Zealand., 20 November 2017. (Unpublished)

[img]
Preview
PDF (Power point presentation) - Presentation
Available under License Creative Commons Attribution Non-commercial No Derivatives.

381Kb

Abstract or Summary

Central storage and management of user credentials or passwords leave a single tempting repository for the attackers. If the credentials are not stored by a system at all, there will be no stored ‘vault’ to allure the attackers. At the same time, there will be no single resource that holds the credentials of all users of a system. This paper presents the high level conceptual architecture of SUPA, an authentication system that would allow a system to authenticate users without having its own repository of users’ secret identification related data. SUPA enables a system to authenticate its users without having their secret credentials stored in it. The proposed authentication system uses the features of asymmetric encryption as part of its authentication process.

Item Type:Item presented at a conference, workshop or other event which was not published in the proceedings
Keywords that describe the item:Authentication, Cloud Computing, Credential, Distribution, IoT, Password, Security.
Subjects:Q Science > QA Mathematics > QA76 Computer software
Divisions:Schools > Centre for Business, Information Technology and Enterprise > School of Information Technology
ID Code:5752
Deposited By:
Deposited On:19 Jan 2018 02:34
Last Modified:19 Jan 2018 02:34

Repository Staff Only: item control page