Original scientific paper
https://doi.org/10.17559/TV-20151114105745
A distributed authentication architecture and protocol
Kristian Skračić
; Sveučilište u Zagrebu, Fakultet elektrotehnike i računarstva, Unska 3, 10 000 Zagreb, Croatia
Predrag Pale
orcid.org/0000-0003-2171-7302
; Sveučilište u Zagrebu, Fakultet elektrotehnike i računarstva, Unska 3, 10 000 Zagreb, Croatia
Branko Jeren
; Sveučilište u Zagrebu, Fakultet elektrotehnike i računarstva, Unska 3, 10 000 Zagreb, Croatia
Abstract
Most user authentication methods rely on a single verifier being stored at a central location within the information system. Such information storage presents a single point of compromise from a security perspective. If this system is compromised it poses a direct threat to users’ digital identities if the verifier can be extracted from the system. This paper proposes a distributed authentication environment in which there is no such single point of compromise. We propose an architecture that does not rely on a single verifier to authenticate users, but rather a distributed authentication architecture where several authentication servers are used to authenticate a user. We consider an authentication environment in which the user authentication process is distributed among independent servers. Each server independently performs its own authentication of the user, for example by asking the user to complete a challenge in order to prove his claim to a digital identity. The proposed architecture allows each server to use any authentication factor. We provide a security analysis of the proposed architecture and protocol, which shows they are secure against the attacks chosen in the analysis.
Keywords
authentication factors; digital identity; distributed authentication architecture; distributed authentication protocol; distributed user authentication
Hrčak ID:
186069
URI
Publication date:
2.9.2017.
Visits: 3.390 *