Skip to main content

2017 | OriginalPaper | Buchkapitel

GPASS: A Password Manager with Group-Based Access Control

verfasst von : Thanh Bui, Tuomas Aura

Erschienen in: Secure IT Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Password managers make it easy for users to choose stronger and more random passwords without the burden of memorizing them. While the majority of our passwords should be kept secret, sharing passwords and access codes is necessary in some cases. In this paper, we present GPASS—a password manager architecture that allows groups to share passwords via an untrusted server. GPASS provides its own cryptographic access control mechanism in which all the information is transparent to the clients so that they can detect any misbehavior of the server. We implemented a proof-of-concept prototype to demonstrate the feasibility and effectiveness of the architecture.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Basin, D., Cremers, C., Kim, T.H.J., Perrig, A., Sasse, R., Szalachowski, P.: ARPKI: attack resilient public-key infrastructure. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 382–393. ACM (2014) Basin, D., Cremers, C., Kim, T.H.J., Perrig, A., Sasse, R., Szalachowski, P.: ARPKI: attack resilient public-key infrastructure. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 382–393. ACM (2014)
5.
Zurück zum Zitat Blaze, M.: A cryptographic file system for UNIX. In: Proceedings of the 1st ACM conference on Computer and communications security, pp. 9–16. ACM (1993) Blaze, M.: A cryptographic file system for UNIX. In: Proceedings of the 1st ACM conference on Computer and communications security, pp. 9–16. ACM (1993)
6.
Zurück zum Zitat Bojinov, H., Bursztein, E., Boyen, X., Boneh, D.: Kamouflage: loss-resistant password management. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 286–302. Springer, Heidelberg (2010). doi:10.1007/978-3-642-15497-3_18 CrossRef Bojinov, H., Bursztein, E., Boyen, X., Boneh, D.: Kamouflage: loss-resistant password management. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 286–302. Springer, Heidelberg (2010). doi:10.​1007/​978-3-642-15497-3_​18 CrossRef
7.
Zurück zum Zitat Bonneau, J.: Guessing human-chosen secrets. Ph.D. thesis, University of Cambridge (2012) Bonneau, J.: Guessing human-chosen secrets. Ph.D. thesis, University of Cambridge (2012)
8.
Zurück zum Zitat Chatterjee, R., Bonneau, J., Juels, A., Ristenpart, T.: Cracking-resistant password vaults using natural language encoders. In: IEEE Symposium on Security and Privacy, pp. 481–498. IEEE (2015) Chatterjee, R., Bonneau, J., Juels, A., Ristenpart, T.: Cracking-resistant password vaults using natural language encoders. In: IEEE Symposium on Security and Privacy, pp. 481–498. IEEE (2015)
10.
Zurück zum Zitat Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI certificate theory. RFC 2693, IETF (1999) Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI certificate theory. RFC 2693, IETF (1999)
11.
Zurück zum Zitat Ellison, C.M.: The nature of a usable PKI. Elsevier Comput. Netw. 31(9), 823–830 (1999)CrossRef Ellison, C.M.: The nature of a usable PKI. Elsevier Comput. Netw. 31(9), 823–830 (1999)CrossRef
12.
Zurück zum Zitat Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, pp. 657–666. ACM (2007) Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, pp. 657–666. ACM (2007)
13.
Zurück zum Zitat Fu, K.E.: Group sharing and random access in cryptographic storage file systems. Ph.D. thesis, Massachusetts Institute of Technology (1999) Fu, K.E.: Group sharing and random access in cryptographic storage file systems. Ph.D. thesis, Massachusetts Institute of Technology (1999)
15.
Zurück zum Zitat Goh, E.J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: securing remote untrusted storage. NDSS 3, 131–145 (2003) Goh, E.J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: securing remote untrusted storage. NDSS 3, 131–145 (2003)
16.
Zurück zum Zitat Golla, M., Beuscher, B., Dürmuth, M.: On the security of cracking-resistant password vaults. In: Proceedings of the 23rd ACM Conference on Computer and Communications Security. ACM (2016) Golla, M., Beuscher, B., Dürmuth, M.: On the security of cracking-resistant password vaults. In: Proceedings of the 23rd ACM Conference on Computer and Communications Security. ACM (2016)
17.
Zurück zum Zitat Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and communications security, pp. 89–98. ACM (2006) Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and communications security, pp. 89–98. ACM (2006)
18.
Zurück zum Zitat Housley, R., Ford, W., Polk, W., Solo, D.: Internet X. 509 public key infrastructure certificate and CRL profile. RFC 2459, IETF (1998) Housley, R., Ford, W., Polk, W., Solo, D.: Internet X. 509 public key infrastructure certificate and CRL profile. RFC 2459, IETF (1998)
19.
Zurück zum Zitat Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: scalable secure file sharing on untrusted storage. In: Fast, vol. 3, pp. 29–42 (2003) Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: scalable secure file sharing on untrusted storage. In: Fast, vol. 3, pp. 29–42 (2003)
20.
Zurück zum Zitat Kim, T.H.J., Huang, L.S., Perring, A., Jackson, C., Gligor, V.: Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 679–690. International World Wide Web Conferences Steering Committee (2013) Kim, T.H.J., Huang, L.S., Perring, A., Jackson, C., Gligor, V.: Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 679–690. International World Wide Web Conferences Steering Committee (2013)
21.
Zurück zum Zitat Laurie, B., Langley, A., Kasper, E.: Certificate transparency. RFC 6962 (2013) Laurie, B., Langley, A., Kasper, E.: Certificate transparency. RFC 6962 (2013)
22.
Zurück zum Zitat Li, J., Krohn, M.N., Mazières, D., Shasha, D.: Secure untrusted data repository (SUNDR). In: OSDI, vol. 4, p. 9 (2004) Li, J., Krohn, M.N., Mazières, D., Shasha, D.: Secure untrusted data repository (SUNDR). In: OSDI, vol. 4, p. 9 (2004)
23.
Zurück zum Zitat Li, Z., He, W., Akhawe, D., Song, D.: The emperor’s new password manager: security analysis of web-based password managers. In: USENIX Security, pp. 465–479 (2014) Li, Z., He, W., Akhawe, D., Song, D.: The emperor’s new password manager: security analysis of web-based password managers. In: USENIX Security, pp. 465–479 (2014)
25.
Zurück zum Zitat Mazires, D., Shasha, D.: Don’t trust your file server. In: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, pp. 113–118. IEEE (2001) Mazires, D., Shasha, D.: Don’t trust your file server. In: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, pp. 113–118. IEEE (2001)
26.
Zurück zum Zitat McCarney, D., Barrera, D., Clark, J., Chiasson, S., van Oorschot, P.C.: Tapas: design, implementation, and usability evaluation of a password manager. In: Proceedings of the 28th Annual Computer Security Applications Conference, pp. 89–98. ACM (2012) McCarney, D., Barrera, D., Clark, J., Chiasson, S., van Oorschot, P.C.: Tapas: design, implementation, and usability evaluation of a password manager. In: Proceedings of the 28th Annual Computer Security Applications Conference, pp. 89–98. ACM (2012)
27.
Zurück zum Zitat Miller, E., Long, D., Freeman, W., Reed, B.: Strong security for distributed file systems. In: IEEE International Conference on Performance, Computing, and Communications, pp. 34–40. IEEE (2001) Miller, E., Long, D., Freeman, W., Reed, B.: Strong security for distributed file systems. In: IEEE International Conference on Performance, Computing, and Communications, pp. 34–40. IEEE (2001)
28.
Zurück zum Zitat Silver, D., Jana, S., Boneh, D., Chen, E.Y., Jackson, C.: Password managers: attacks and defenses. In: Usenix Security, pp. 449–464 (2014) Silver, D., Jana, S., Boneh, D., Chen, E.Y., Jackson, C.: Password managers: attacks and defenses. In: Usenix Security, pp. 449–464 (2014)
31.
Zurück zum Zitat Yu, J., Cheval, V., Ryan, M.: DTKI: a new formalized PKI with no trusted parties. IACR Cryptol. ePrint Arch. 2014, 600 (2014) Yu, J., Cheval, V., Ryan, M.: DTKI: a new formalized PKI with no trusted parties. IACR Cryptol. ePrint Arch. 2014, 600 (2014)
32.
Zurück zum Zitat Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp. 1–9. IEEE (2010) Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp. 1–9. IEEE (2010)
33.
Zurück zum Zitat Zadok, E., Badulescu, I., Shender, A.: Cryptfs: A stackable vnode level encryption file system. Technical report, Technical report CUCS-021-98, Computer Science Department, Columbia University (1998) Zadok, E., Badulescu, I., Shender, A.: Cryptfs: A stackable vnode level encryption file system. Technical report, Technical report CUCS-021-98, Computer Science Department, Columbia University (1998)
Metadaten
Titel
GPASS: A Password Manager with Group-Based Access Control
verfasst von
Thanh Bui
Tuomas Aura
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-70290-2_14