Model driven security analysis of IDaaS protocols

  • Authors:
  • Apurva Kumar

  • Affiliations:
  • IBM Research - India, New Delhi, India

  • Venue:
  • ICSOC'11 Proceedings of the 9th international conference on Service-Oriented Computing
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Offloading user management functions like authentication and authorization to identity providers is a key enabler for cloud computing based services. Protocols used to provide identity as a service (IDaaS) are the foundation of security for many business transactions on the web and need to be thoroughly analyzed. While analysis of cryptographic protocols has been an active research area over the past three decades, the techniques have not been adapted to analyze security for complex web interactions. In this paper, we identify gaps in the area and propose means to address them. We extend an important belief logic (the so-called BAN logic) used for analyzing security in authentication protocols to support new concepts that are specific to browser based IDaaS protocols. We also address the problem of automating belief based security analysis through a UML based model driven approach which can be easily integrated with existing software engineering tools. We demonstrate benefits of the extended logic and model driven approach by analyzing two of the most commonly used IDaaS protocols.