2014
DOI: 10.1155/2014/561487
|View full text |Cite
|
Sign up to set email alerts
|

Secure OpenID Authentication Model by Using Trusted Computing

Abstract: The growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous accounts have to be managed in a secure and simple way to be protected against identity theft. Single sign-on (SSO) and OpenID have been used to decrease the complexity of managing numerous accounts required in the Inte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 50 publications
0
4
0
Order By: Relevance
“…This paper basically analyzed existing cloud computing techniques strengths and weakness. In this paper, an anticipated model is the one in which One Time Password (OTP), Trusted Platform Module (TPM), and OpenID are used for avoiding phishing attacks in the cloud-based environment [35].…”
Section: Related Workmentioning
confidence: 99%
“…This paper basically analyzed existing cloud computing techniques strengths and weakness. In this paper, an anticipated model is the one in which One Time Password (OTP), Trusted Platform Module (TPM), and OpenID are used for avoiding phishing attacks in the cloud-based environment [35].…”
Section: Related Workmentioning
confidence: 99%
“…Similarly Trusted Platform Module (TPM), One Time Password (OTP) and Trust Multitenancy were applied along with OpenId [7] to stop phishing and identity theft. Thus using hardware-based activation and all of the above, a robust authentication module for cloud applications were created successfully.…”
Section: Literature Reviewmentioning
confidence: 99%
“…With the prevalence of growing security breaches, workable solutions -such as OpenID digital signatures with user names and passwords, digital signatures including encryption techniques and certain authentication services were introduced [20]. But not all of these served well in every environment.…”
Section: Trusted Mobile Cloud Environmentmentioning
confidence: 99%