Abstract | ||
---|---|---|
When developing the client with the social network service, the OAuth protocol gets to be mostly followed. The OAuth protocol is the protocol which is being most much used in the company providing the social network service as the protocol which doesn’t expose the user certification information in 3rd Party and is developed in order to give the user resources accessible rights like Google or facebook, twitter, and etc. However, when of the authentication information of this user is exposed on network by the attacker, there is the malicious problem that it can be used. It can classify as the replay attack, phishing attack, and impersonation attack as the general security vulnerability which it can happen in this OAuth protocol. Therefore, before the Access Token is issued in order to this solve the security vulnerability in the OAuth protocol. By using E-mail, the resource owner is authenticated and the access token is safely issued. And it distribute the Access Token and stores. When using the proposed method, it uses the E-mail authentication less than 0.8% can confirm the authentication success rate of the attacker to be safer than the existing method. Because of distributes the access token and storing, although the attacker won the some of user information, it would not allow to use for the user authentication. When seven over distributed the access token, it can check that as in the E-mail authentication it can use since the release time of the access Token has 10 min or greater. |
Year | DOI | Venue |
---|---|---|
2019 | 10.1007/s10586-017-1119-6 | Cluster Computing |
Keywords | Field | DocType |
OAuth protocol, Authentication, Authorization, Access token | Computer access control,Access token,Vulnerability (computing),Authentication,Challenge-Handshake Authentication Protocol,Computer security,Computer science,Otway–Rees protocol,Computer network,Authentication protocol,Reflection attack | Journal |
Volume | Issue | ISSN |
22 | SUPnan | 1573-7543 |
Citations | PageRank | References |
0 | 0.34 | 2 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Cheol-Joo Chae | 1 | 26 | 5.27 |
Ki-Bong Kim | 2 | 0 | 0.34 |
Han-Jin Cho | 3 | 4 | 3.15 |