1. How to submit my research paper? What’s the process of publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: jait@etpub.com.
2.Can I submit an abstract?
The journal publishes full research papers. So only full paper submission should be considered for possible publication. Papers with insufficient content may be rejected as well, make sure your paper is sufficient enough to be published...[Read More]

Analysis of Open Environment Sign-in Schemes- Privacy Enhanced & Trustworthy Approach

Zubair Ahmad Khattak1, Jamalul-Lail Ab Manan2, and Suziah Sulaiman 1
1. Department of Computer Information Science, Universiti Teknologi PETRONAS, Tronoh, Malaysia
2. Advanced Information Security Cluster, MIMOS Berhad, Technology Park Malaysia, Kuala Lumpur, Malaysia
Abstract—The third party based authentication possess users privacy concerns in an open environment such as links and traces user identities across various services. The cryptographic schemes for selective discloser of user information cannot adopt in practices, the common digital signature scheme public key have similar problem. In addition, trustworthy online computing formation is an important advance in security research that aims to use trusted computing remote attestation to overcome trust creation issues. In this paper, we propose a privacy enhanced and trustworthy authentication scheme, with underlying sign-in protocol solution for an open environment that guarantees users’ privacy using blind signature scheme to be anonymous and unlinkable during sign-in to the third party service ‘Identification Service Provider’ (ISP). In our proposed approach, the relying party platforms should verify the integrity of ISP at user platform before redirecting the user to the Identity Service Provider (IdSP), and user system must verify the integrity of relying party platform before delivering a user identifier. Our solution is based on blind digital signature scheme to achieve our first goal, i.e. user anonymity and unlinkability at ISP. The Trusted Computing Group (TCG) hardware root-of-trust establishes trust between interacting platforms within Open Environment to achieve our second goal, i.e. measuring integrity of relying party platforms.

Index Terms—Privacy, Single-sign-on, Platform attestation, Trust, Open environment, credential system

Cite: Zubair Ahmad Khattak, Jamalul-Lail Ab Manan, and Suziah Sulaiman, "Analysis of Open Environment Sign-in Schemes- Privacy Enhanced & Trustworthy Approach," Journal of Advances in Information Technology, Vol. 2, No. 2, pp. 109-121, May, 2011.doi:10.4304/jait.2.2.109-121
Copyright © 2013-2019. JAIT. All Rights Reserved
Creative Commons LicenseThis work is licensed under a Creative Commons Attribution 3.0 Unported License.