Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns
Designing government independent and secure identification- and authentication protocols is a challenging task. Design flaws and missing specifications as well as security- and privacy issues of such protocols pose considerable user risks. Formal methods, such as Colored Petri Nets (CPN), are utilis...
Gespeichert in:
Veröffentlicht in: | Computers & security 2019-09, Vol.86, p.253-269 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 269 |
---|---|
container_issue | |
container_start_page | 253 |
container_title | Computers & security |
container_volume | 86 |
creator | Norta, Alex Matulevičius, Raimundas Leiding, Benjamin |
description | Designing government independent and secure identification- and authentication protocols is a challenging task. Design flaws and missing specifications as well as security- and privacy issues of such protocols pose considerable user risks. Formal methods, such as Colored Petri Nets (CPN), are utilised for the design, development and analysis of such new protocols in order to detect flaws and mitigate identified security risks before deployment. This paper fills the gap, by applying in a novel way a set of security risk-oriented patterns (SRP) to the so-called Authcoin protocol that we formalise using CPN. The initial formal model of Authcoin facilitates the detection and elimination of design flaws, missing specifications as well as security- and privacy issues. The additional risk- and threat analysis based on the Information Systems Security Risk Management (ISSRM) domain model we perform on the formal CPN models of the protocol. The identified risks are mitigated by applying SRPs to the formal model of the Authcoin protocol. SRPs are a means to mitigate common security- and privacy risks in a business-process context by applying thoroughly tested and proven best-practice solutions. The goal of this work is to test the utility of SRPs outside of the the usual application domain, to reduce the risks and vulnerabilities of the Authcoin protocol. |
doi_str_mv | 10.1016/j.cose.2019.05.017 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2287978270</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404818302670</els_id><sourcerecordid>2287978270</sourcerecordid><originalsourceid>FETCH-LOGICAL-c328t-adf39343dad9f8bf2adb3d21b54990e23a3b87d4fc8b97f2b0b52cca931cb3ca3</originalsourceid><addsrcrecordid>eNp9kMtLxDAQxoMouD7-AU8Fz615dLcpeFHxBQse1HOYvHaz1qYmqVD_elPWs6cZht_3zcyH0AXBFcFkdbWrlI-mopi0FV5WmDQHaEF4Q8sVxfwQLTLUlDWu-TE6iXGHM7HifIGmV7BmM0LQrt8UUFgfPqFzP0YXt51XH2oLri9ND7LLI6dNn1yaShjTdm4VJOf7Ygg-eeW7Qk4FDEM3zWbRqDFkuAgufpQ-uCzIHgOkZEIfz9CRhS6a8796it4f7t_unsr1y-Pz3c26VIzyVIK2rGU106Bby6WloCXTlMhl3bbYUAZM8kbXVnHZNpZKLJdUKWgZUZIpYKfocu-bj_waTUxi58fQ55WCUt60DacNzhTdUyr4GIOxYgjuE8IkCBZzxGIn5ojFHLHAS5EDzKLrvcjk-7-dCSKq_KUy2gWjktDe_Sf_BXVkiYo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2287978270</pqid></control><display><type>article</type><title>Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns</title><source>Elsevier ScienceDirect Journals Complete</source><creator>Norta, Alex ; Matulevičius, Raimundas ; Leiding, Benjamin</creator><creatorcontrib>Norta, Alex ; Matulevičius, Raimundas ; Leiding, Benjamin</creatorcontrib><description>Designing government independent and secure identification- and authentication protocols is a challenging task. Design flaws and missing specifications as well as security- and privacy issues of such protocols pose considerable user risks. Formal methods, such as Colored Petri Nets (CPN), are utilised for the design, development and analysis of such new protocols in order to detect flaws and mitigate identified security risks before deployment. This paper fills the gap, by applying in a novel way a set of security risk-oriented patterns (SRP) to the so-called Authcoin protocol that we formalise using CPN. The initial formal model of Authcoin facilitates the detection and elimination of design flaws, missing specifications as well as security- and privacy issues. The additional risk- and threat analysis based on the Information Systems Security Risk Management (ISSRM) domain model we perform on the formal CPN models of the protocol. The identified risks are mitigated by applying SRPs to the formal model of the Authcoin protocol. SRPs are a means to mitigate common security- and privacy risks in a business-process context by applying thoroughly tested and proven best-practice solutions. The goal of this work is to test the utility of SRPs outside of the the usual application domain, to reduce the risks and vulnerabilities of the Authcoin protocol.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/j.cose.2019.05.017</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Access control ; Authcoin ; Authentication ; Blockchain ; Colored petri net ; Cryptography ; Cybersecurity ; Flaw detection ; Formal verification ; Identity ; Information management ; Patterns ; Petri nets ; Privacy ; Protocol ; Risk analysis ; Risk management ; Security ; Smart contract ; Specifications ; Threat evaluation ; Vulnerability</subject><ispartof>Computers & security, 2019-09, Vol.86, p.253-269</ispartof><rights>2019 Elsevier Ltd</rights><rights>Copyright Elsevier Sequoia S.A. Sep 2019</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c328t-adf39343dad9f8bf2adb3d21b54990e23a3b87d4fc8b97f2b0b52cca931cb3ca3</citedby><cites>FETCH-LOGICAL-c328t-adf39343dad9f8bf2adb3d21b54990e23a3b87d4fc8b97f2b0b52cca931cb3ca3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0167404818302670$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65534</link.rule.ids></links><search><creatorcontrib>Norta, Alex</creatorcontrib><creatorcontrib>Matulevičius, Raimundas</creatorcontrib><creatorcontrib>Leiding, Benjamin</creatorcontrib><title>Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns</title><title>Computers & security</title><description>Designing government independent and secure identification- and authentication protocols is a challenging task. Design flaws and missing specifications as well as security- and privacy issues of such protocols pose considerable user risks. Formal methods, such as Colored Petri Nets (CPN), are utilised for the design, development and analysis of such new protocols in order to detect flaws and mitigate identified security risks before deployment. This paper fills the gap, by applying in a novel way a set of security risk-oriented patterns (SRP) to the so-called Authcoin protocol that we formalise using CPN. The initial formal model of Authcoin facilitates the detection and elimination of design flaws, missing specifications as well as security- and privacy issues. The additional risk- and threat analysis based on the Information Systems Security Risk Management (ISSRM) domain model we perform on the formal CPN models of the protocol. The identified risks are mitigated by applying SRPs to the formal model of the Authcoin protocol. SRPs are a means to mitigate common security- and privacy risks in a business-process context by applying thoroughly tested and proven best-practice solutions. The goal of this work is to test the utility of SRPs outside of the the usual application domain, to reduce the risks and vulnerabilities of the Authcoin protocol.</description><subject>Access control</subject><subject>Authcoin</subject><subject>Authentication</subject><subject>Blockchain</subject><subject>Colored petri net</subject><subject>Cryptography</subject><subject>Cybersecurity</subject><subject>Flaw detection</subject><subject>Formal verification</subject><subject>Identity</subject><subject>Information management</subject><subject>Patterns</subject><subject>Petri nets</subject><subject>Privacy</subject><subject>Protocol</subject><subject>Risk analysis</subject><subject>Risk management</subject><subject>Security</subject><subject>Smart contract</subject><subject>Specifications</subject><subject>Threat evaluation</subject><subject>Vulnerability</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><recordid>eNp9kMtLxDAQxoMouD7-AU8Fz615dLcpeFHxBQse1HOYvHaz1qYmqVD_elPWs6cZht_3zcyH0AXBFcFkdbWrlI-mopi0FV5WmDQHaEF4Q8sVxfwQLTLUlDWu-TE6iXGHM7HifIGmV7BmM0LQrt8UUFgfPqFzP0YXt51XH2oLri9ND7LLI6dNn1yaShjTdm4VJOf7Ygg-eeW7Qk4FDEM3zWbRqDFkuAgufpQ-uCzIHgOkZEIfz9CRhS6a8796it4f7t_unsr1y-Pz3c26VIzyVIK2rGU106Bby6WloCXTlMhl3bbYUAZM8kbXVnHZNpZKLJdUKWgZUZIpYKfocu-bj_waTUxi58fQ55WCUt60DacNzhTdUyr4GIOxYgjuE8IkCBZzxGIn5ojFHLHAS5EDzKLrvcjk-7-dCSKq_KUy2gWjktDe_Sf_BXVkiYo</recordid><startdate>201909</startdate><enddate>201909</enddate><creator>Norta, Alex</creator><creator>Matulevičius, Raimundas</creator><creator>Leiding, Benjamin</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201909</creationdate><title>Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns</title><author>Norta, Alex ; Matulevičius, Raimundas ; Leiding, Benjamin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c328t-adf39343dad9f8bf2adb3d21b54990e23a3b87d4fc8b97f2b0b52cca931cb3ca3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Access control</topic><topic>Authcoin</topic><topic>Authentication</topic><topic>Blockchain</topic><topic>Colored petri net</topic><topic>Cryptography</topic><topic>Cybersecurity</topic><topic>Flaw detection</topic><topic>Formal verification</topic><topic>Identity</topic><topic>Information management</topic><topic>Patterns</topic><topic>Petri nets</topic><topic>Privacy</topic><topic>Protocol</topic><topic>Risk analysis</topic><topic>Risk management</topic><topic>Security</topic><topic>Smart contract</topic><topic>Specifications</topic><topic>Threat evaluation</topic><topic>Vulnerability</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Norta, Alex</creatorcontrib><creatorcontrib>Matulevičius, Raimundas</creatorcontrib><creatorcontrib>Leiding, Benjamin</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers & security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Norta, Alex</au><au>Matulevičius, Raimundas</au><au>Leiding, Benjamin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns</atitle><jtitle>Computers & security</jtitle><date>2019-09</date><risdate>2019</risdate><volume>86</volume><spage>253</spage><epage>269</epage><pages>253-269</pages><issn>0167-4048</issn><eissn>1872-6208</eissn><abstract>Designing government independent and secure identification- and authentication protocols is a challenging task. Design flaws and missing specifications as well as security- and privacy issues of such protocols pose considerable user risks. Formal methods, such as Colored Petri Nets (CPN), are utilised for the design, development and analysis of such new protocols in order to detect flaws and mitigate identified security risks before deployment. This paper fills the gap, by applying in a novel way a set of security risk-oriented patterns (SRP) to the so-called Authcoin protocol that we formalise using CPN. The initial formal model of Authcoin facilitates the detection and elimination of design flaws, missing specifications as well as security- and privacy issues. The additional risk- and threat analysis based on the Information Systems Security Risk Management (ISSRM) domain model we perform on the formal CPN models of the protocol. The identified risks are mitigated by applying SRPs to the formal model of the Authcoin protocol. SRPs are a means to mitigate common security- and privacy risks in a business-process context by applying thoroughly tested and proven best-practice solutions. The goal of this work is to test the utility of SRPs outside of the the usual application domain, to reduce the risks and vulnerabilities of the Authcoin protocol.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.cose.2019.05.017</doi><tpages>17</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0167-4048 |
ispartof | Computers & security, 2019-09, Vol.86, p.253-269 |
issn | 0167-4048 1872-6208 |
language | eng |
recordid | cdi_proquest_journals_2287978270 |
source | Elsevier ScienceDirect Journals Complete |
subjects | Access control Authcoin Authentication Blockchain Colored petri net Cryptography Cybersecurity Flaw detection Formal verification Identity Information management Patterns Petri nets Privacy Protocol Risk analysis Risk management Security Smart contract Specifications Threat evaluation Vulnerability |
title | Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-20T20%3A41%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Safeguarding%20a%20formalized%20Blockchain-enabled%20identity-authentication%20protocol%20by%20applying%20security%20risk-oriented%20patterns&rft.jtitle=Computers%20&%20security&rft.au=Norta,%20Alex&rft.date=2019-09&rft.volume=86&rft.spage=253&rft.epage=269&rft.pages=253-269&rft.issn=0167-4048&rft.eissn=1872-6208&rft_id=info:doi/10.1016/j.cose.2019.05.017&rft_dat=%3Cproquest_cross%3E2287978270%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2287978270&rft_id=info:pmid/&rft_els_id=S0167404818302670&rfr_iscdi=true |