ABSTRACT
Blockchain and verifiable identities have a lot of potential in future distributed software applications e.g. smart cities, eHealth, autonomous vehicles, networks, etc. In this paper, we proposed a novel technique, namely VeidBlock, to generate verifiable identities by following a reliable authentication process. These entities are managed by using the concepts of blockchain ledger and distributed through an advance mechanism to protect them against tampering. All identities created using VeidBlock approach are verifiable and anonymous therefore it preserves user's privacy in verification and authentication phase. As a proof of concept, we implemented and tested the VeidBlock protocols by integrating it in a SDN based infrastructure. Analysis of the test results yield that all components successfully and autonomously performed initial authentication and locally verified all the identities of connected components.
- Z. Khan, Z. Pervez, A. G. Abbasi, "Towards a secure service provisioning framework in a Smart city environment", published in the journal of Future Generation Computer Systems, Volume 77, December 2017, Pages 112--135 Google ScholarDigital Library
- Fei Hu ; Qi Hao ; Ke Bao, "A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation", published in IEEE Communications Surveys & Tutorials, Vol. 16, pp. 2181--2206, 2014Google ScholarCross Ref
- Panos P, et al. "Vehicular Communication Systems: Enabling Technologies, Applications, and Future Outlook on Intelligent Transportation" published in IEEE Communications Magazine, November 2009 Google ScholarDigital Library
- Mobile SDN: The future is virtual, published by Informa UK Limited, http://www.nec.com/en/global/ad/insite/feature/pdf/SDNandNFV.pdf accessed on March 21, 2017Google Scholar
- SDN & NFV : The Future for Telecoms by Telecom.com http://www.nec.com /en/global/ad/insite/feature/pdf/SDNandNFV.pdf accessed on March 24, 2017Google Scholar
- David R. "SDN a game changer but slow out of the gate, survey shows", https://gcn.com/Articles/2015/01/13/SDN-adoption.aspx, Jan 13, 2015Google Scholar
- H. König, R. Cwalinski, F. Kargl, Sven Dietrich, Security Challenges and Opportunities of Software-Defined Networking, Published in IEEE Security & Privacy, Volume: 15, Issue: 2, pp 96--100, March-April 2017 Google ScholarDigital Library
- Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance, http://www.etsi.org/deliver/etsi_gs/NFV-EVE/001_099/005/01.01.01_60/gs_NFV-EVE005v010101p.pdfGoogle Scholar
- Security Analysis of the Open Networking Foundation (ONF) OpenFlow Switch Specification file:///C:/Acreo/OpenFlow%20Security/Open%20 Networking%20Foundation%20(ONF)%20OpenFlow%20Switch%20Specification.html, Oct, 2012Google Scholar
- P1915.1 - Standard for Software Defined Networking and Network Function Virtualization Security, working group SVE - Security for Virtualized Environments, http://standards.ieee.org/develop/project/1915.1.htmlGoogle Scholar
- C. Banse ; S. Rangarajan, "A Secure Northbound Interface for SDN Applications" published in the proceeding of IEEE Trustcom/BigDataSE/ISPA, 2015, Helsinki, Finland. Google ScholarDigital Library
- White paper (Juniper Networks), Network Transformation with NFV and SDN: A journey toward sustainable competitive advantage, http://www.juniper.net/assets/us/en/local/pdf/whitepapers/2000628-en.pdf, published in March, 2017Google Scholar
- S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, downloaded from https://bitcoin.org/bitcoin.pdf, 06 September, 2016.Google Scholar
- P. A. Grassi, M. E. Garcia, J. L. Fenton, "Digital Identity Guidelines", standardized by NIST in NIST Special Publication 800-63-3 and published in June 2017Google Scholar
- J. Reschke, "RFC-7617 : The 'Basic' HTTP Authentication Scheme", published on September 2015Google Scholar
- R. Shekh-Yusef, Avaya, D. Ahrens, etl, "RFC-7616 : HTTP Digest Access Authentication", published in September 2015Google Scholar
- D. Hardt, Ed., "RFC-6749 : The OAuth 2.0 Authorization Framework", published in October 2012Google Scholar
- Federal Information Processing Standard (FIPS) 196, "Entity Authentication Using Public Key Cryptography" published bu NIST, February 18, 1997Google Scholar
- U Khalid, A Ghafoor, M Irum, MA Shibli, "Cloud based secure and privacy enhanced authentication & authorization protocol", published by Procedia Computer Science, 2013, Vol 22, pp. 680--688Google Scholar
- Patrick P. Tsang, Sean W. Smith, PPAA: Peer-to-Peer Anonymous Authentication Published in the proceeding of International Conference on Applied Cryptography and Network Security ACNS, pp 55--74, 2008 Google ScholarDigital Library
- Yehuda Lindell, Anonymous Authentication, published in the Journal of Privacy and Confidentiality, Vol. 2,Number 2, pp. 35--63, 2010.Google Scholar
- Yunchuan Sun, Junsheng Zhang, Yongping Xiong, Guangyu Zhu, Data Security and Privacy in Cloud Computing, Published in the International Journal of Distributed Sensor Networks by Hindawi Publishing Corporation, Volume 2014, Article ID 190903.Google Scholar
- Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance, http://www.etsi.org/deliver/etsi_gs/NFV-EVE/001_099/005/01.01. 01_60/gs_NFV-EVE005v010101p.pdfGoogle Scholar
- Network Functions Virtualisation (NFV);NFV Security; Problem Statement, http://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/001/01.01.01_60/gs_NFV-SEC001v010101p.pdfGoogle Scholar
- Xitao Wen, Yan Chen, Chengchen Hu, Chao Shi, Yi Wang, "Towards a secure controller platform for openflow applications" published in the Proceeding of 2nd ACM SIGCOMM workshop on Hot topics in Software Defined Networking (HotSDN '13), Hong Kong, China, Pages 171--172, August 16 - 16, 2013 Google ScholarDigital Library
- Security Analysis of the Open Networking Foundation (ONF) OpenFlow Switch Specification file:///C:/Acreo/OpenFlow%20Security/Open%20 Networking%20Foundation%20(ONF)%20OpenFlow%20Switch%20Specification.html, Oct, 2012Google Scholar
- Blockchain Header, "Bitcoin Developer Reference", https://bitcoin.org/en/ developer-reference#block-headers, accessed on 06 September, 2016Google Scholar
- M. Jones, J. Bradley, N. Sakimura, RFC: 7515, "JSON Web Signature (JWS)" by Microsoft, May 2015Google Scholar
Index Terms
- VeidBlock: Verifiable Identity using Blockchain and Ledger in a Software Defined Network
Recommendations
On Elliptic Curve Based Untraceable RFID Authentication Protocols
IH&MMSec '15: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia SecurityAn untraceable RFID authentication scheme allows a legitimate reader to authenticate a tag, and at the same time it assures the privacy of the tag against unauthorized tracing. In this paper, we revisit three elliptic-curve based untraceable RFID ...
An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication
WI '19: IEEE/WIC/ACM International Conference on Web IntelligencePersonally Identifiable Information (PII) is often used to perform authentication and acts as a gateway to personal and organizational information. One weak link in the architecture of identity management services is sufficient to cause exposure and ...
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
Since the introduction of the concept of grouping proofs by Juels, which permit RFID tags to generate evidence that they have been scanned simultaneously, various new schemes have been proposed. Their common property is the use of symmetric-key ...
Comments