Improving multi-tier security using redundant authentication

  • Authors:
  • Jodie P. Boyer;Ragib Hasan;Lars E. Olson;Nikita Borisov;Carl A. Gunter;David Raila

  • Affiliations:
  • University of Illinois, Urbana, IL;University of Illinois, Urbana, IL;University of Illinois, Urbana, IL;University of Illinois, Urbana, IL;University of Illinois, Urbana, IL;University of Illinois, Urbana, IL

  • Venue:
  • Proceedings of the 2007 ACM workshop on Computer security architecture
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make lower tiers more secure in the presence of compromised higher tiers. In this paper, we investigate an extension of this technique in which higher tiers are required to provide evidence of the authentication of principals when they make requests of lower tiers. This concept, which we call redundant authentication, enables lower tiers to provide security guarantees that improve significantly over current least privilege strategies. We validate this technique by applying it to a practical Building Automation System (BAS) application, where we explore the use of redundant authentication in conjunction with an authentication proxy to enable interoperation with existing enterprise authentication services.