Abstract
Password managers make it easy for users to choose stronger and more random passwords without the burden of memorizing them. While the majority of our passwords should be kept secret, sharing passwords and access codes is necessary in some cases. In this paper, we present GPASS—a password manager architecture that allows groups to share passwords via an untrusted server. GPASS provides its own cryptographic access control mechanism in which all the information is transparent to the clients so that they can detect any misbehavior of the server. We implemented a proof-of-concept prototype to demonstrate the feasibility and effectiveness of the architecture.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
References
1Password, December 2016. https://agilebits.com/onepassword
F-secure key, December 2016. https://www.f-secure.com/en/web/home_global/key
LastPass: Password manager, autoform filter, random password generator & secure digital wallet app, December 2016. https://lastpass.com/
Basin, D., Cremers, C., Kim, T.H.J., Perrig, A., Sasse, R., Szalachowski, P.: ARPKI: attack resilient public-key infrastructure. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 382–393. ACM (2014)
Blaze, M.: A cryptographic file system for UNIX. In: Proceedings of the 1st ACM conference on Computer and communications security, pp. 9–16. ACM (1993)
Bojinov, H., Bursztein, E., Boyen, X., Boneh, D.: Kamouflage: loss-resistant password management. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 286–302. Springer, Heidelberg (2010). doi:10.1007/978-3-642-15497-3_18
Bonneau, J.: Guessing human-chosen secrets. Ph.D. thesis, University of Cambridge (2012)
Chatterjee, R., Bonneau, J., Juels, A., Ristenpart, T.: Cracking-resistant password vaults using natural language encoders. In: IEEE Symposium on Security and Privacy, pp. 481–498. IEEE (2015)
Electronic Frontier Foundation: National security letters, July 2016. https://www.eff.org/issues/national-security-letters
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI certificate theory. RFC 2693, IETF (1999)
Ellison, C.M.: The nature of a usable PKI. Elsevier Comput. Netw. 31(9), 823–830 (1999)
Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, pp. 657–666. ACM (2007)
Fu, K.E.: Group sharing and random access in cryptographic storage file systems. Ph.D. thesis, Massachusetts Institute of Technology (1999)
Gellman, B.: The FBI’s secret scrutiny, July 2015. http://www.washingtonpost.com/wp-dyn/content/article/2005/11/05/AR2005110501366.html
Goh, E.J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: securing remote untrusted storage. NDSS 3, 131–145 (2003)
Golla, M., Beuscher, B., Dürmuth, M.: On the security of cracking-resistant password vaults. In: Proceedings of the 23rd ACM Conference on Computer and Communications Security. ACM (2016)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and communications security, pp. 89–98. ACM (2006)
Housley, R., Ford, W., Polk, W., Solo, D.: Internet X. 509 public key infrastructure certificate and CRL profile. RFC 2459, IETF (1998)
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: scalable secure file sharing on untrusted storage. In: Fast, vol. 3, pp. 29–42 (2003)
Kim, T.H.J., Huang, L.S., Perring, A., Jackson, C., Gligor, V.: Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 679–690. International World Wide Web Conferences Steering Committee (2013)
Laurie, B., Langley, A., Kasper, E.: Certificate transparency. RFC 6962 (2013)
Li, J., Krohn, M.N., Mazières, D., Shasha, D.: Secure untrusted data repository (SUNDR). In: OSDI, vol. 4, p. 9 (2004)
Li, Z., He, W., Akhawe, D., Song, D.: The emperor’s new password manager: security analysis of web-based password managers. In: USENIX Security, pp. 465–479 (2014)
Lichtblau, E.: Judge tells Apple to help unlock iPhone used by San Bernardino Gunman, July 2016. http://www.nytimes.com/2016/02/17/us/judge-tells-apple-to-help-unlock-san-bernardino-gunmans-iphone.html
Mazires, D., Shasha, D.: Don’t trust your file server. In: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, pp. 113–118. IEEE (2001)
McCarney, D., Barrera, D., Clark, J., Chiasson, S., van Oorschot, P.C.: Tapas: design, implementation, and usability evaluation of a password manager. In: Proceedings of the 28th Annual Computer Security Applications Conference, pp. 89–98. ACM (2012)
Miller, E., Long, D., Freeman, W., Reed, B.: Strong security for distributed file systems. In: IEEE International Conference on Performance, Computing, and Communications, pp. 34–40. IEEE (2001)
Silver, D., Jana, S., Boneh, D., Chen, E.Y., Jackson, C.: Password managers: attacks and defenses. In: Usenix Security, pp. 449–464 (2014)
Vigo, M.: Even the LastPass will be stolen, deal with it! February 2017. http://www.martinvigo.com/even-the-lastpass-will-be-stolen-deal-with-it/
Whitney, L.: LastPass CEO reveals details on security breach, December 2016. http://www.cnet.com/news/lastpass-ceo-reveals-details-on-security-breach/
Yu, J., Cheval, V., Ryan, M.: DTKI: a new formalized PKI with no trusted parties. IACR Cryptol. ePrint Arch. 2014, 600 (2014)
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp. 1–9. IEEE (2010)
Zadok, E., Badulescu, I., Shender, A.: Cryptfs: A stackable vnode level encryption file system. Technical report, Technical report CUCS-021-98, Computer Science Department, Columbia University (1998)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Bui, T., Aura, T. (2017). GPASS: A Password Manager with Group-Based Access Control. In: Lipmaa, H., Mitrokotsa, A., Matulevičius, R. (eds) Secure IT Systems. NordSec 2017. Lecture Notes in Computer Science(), vol 10674. Springer, Cham. https://doi.org/10.1007/978-3-319-70290-2_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-70290-2_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70289-6
Online ISBN: 978-3-319-70290-2
eBook Packages: Computer ScienceComputer Science (R0)