Browse > Article
http://dx.doi.org/10.14400/JDC.2021.19.10.287

Authentication Model of PKI-based Security Gateway using Blockchain having Integrity  

Kim, Young Soo (Department of IT Convergence, Hansei University)
Mun, Hyung-Jin (Department of Information & Communication Engineering, Sungkyul University)
Publication Information
Journal of Digital Convergence / v.19, no.10, 2021 , pp. 287-293 More about this Journal
Abstract
Recently, public certificates issued by nationally-recognized certification bodies have been abolished, and internet companies have issued their own common certificates as certification authority. The Electronic Signature Act was amended in a way to assign responsibility to Internet companies. As the use of a joint certificate issued by Internet companies as a certification authority is allowed, it is expected that the fraud damage caused by the theft of public key certificates will increase. We propose an authentication model that can be used in a security gateway that combines PKI with a blockchain with integrity and security. and to evaluate its practicality, we evaluated the security of the authentication model using Sugeno's hierarchical fuzzy integral, an evaluation method that excludes human subjectivity and importance degree using Delphi method by expert group. The blockchain-based joint certificate is expected to be used as a base technology for services that prevent reckless issuance and misuse of public certificates, and secure security and convenience.
Keywords
Blockchain; PKI; Authentication; Security Gateway; Fuzzy Integral; Joint Certificate;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Balalaie, A. Heydarnoori & P. Jamshidi. (2016). Microservices architecture enables devops: Migration to a cloud-native architecture. IEEE Software, 33(3), 42-52.   DOI
2 S. J. Shin & I.K. Park.(2000). A New Approach to the Verification of a Message Protocol:Fuzzy Integral. Journal of Korea Information Processing Society. 7(6), pp. 1903-1910. DOI:10.3745/KIPSTE.2000.7.6.1903.   DOI
3 J. Clark & P.C. Van Oorschot. (2013). SoK: SSL and HTTPS: revisiting past challenges and evaluating certificate trust model enhancements. In Proc. IEEE Symposium on Security and Privacy 2013, Berkeley, CA, USA, May 19-22, pp.511-525. IEEE Computer Society.
4 S.C. Park.(2017). A Comparative Analysis of PKI Authentication and FIDO Authentication. Journal of the Korea Institute of Information and Communication Engineering. 21(7), 1411-1419.   DOI
5 R. Xu, W. Jin & D. Kim. (2019). Microservice security agent based on API gateway in edge computing. Sensors, 19(22), 4905.   DOI
6 M. Risius & K. Spohrer. (2017). A blockchain research framework, Business & Information Systems Engineering. 59(6). 385-409.   DOI
7 J. A. Berkowsky & T. Hayajneh.(2017). Security issues with certificate authorities. Proc. IEEE 8th Annu. Ubiquitous Comput. Electron. Mobile Commun. Conf. (UEMCON). 449-455.
8 S.H. Lee.(2007). Implementation of Call Service Application Modeling and Performance Measurement in Open API based Gateway System. KWANGWOON UNIVERSITY. Master's Thesis. http://www.riss.kr/link?id=T11101637.
9 E.S.Jeong.(2014). A Design of the Encrypted File System with PKI Authentication : User Authentication using PKI. Soongsil University, Master's Thesis.
10 Liu Y, Tome W, Zhang L, Choffnes D, Levin D, Maggs B, Mislove A, Schulman A & Wilson C. (2015). An end-to-end measurement of certificate revocation in the web's PKI. In Proceedings of the 2015 internet measurement conference. ACM, 183-196.
11 S. Santesson, M. Myers, R. Ankney, A. Malpani, S. Galperin, & C. Adams. (2013). X.509 Internet public key infrastructure online certificate status protocol-OCSP, RFC 6960. 1-41. https://www.hjp.at/(en,st_b)/doc/rfc/rfc6960.html
12 C. J. Chae, H. J. Cho & H.M. Jung. (2018). Authentication Method using Multiple Biometric Information in FIDO Environment. Journal of Digital Convergence, 16(1), 159-164. DOI : 10.14400/JDC.2018.16.1.159   DOI
13 A. Ouaddah, A. Abou Elkalam, A. Ait Ouahman. (2016). FairAccess: a new Blockchain-based access control framework for the Internet of Things. Security and communication networks, 9(18), 5943-5964.   DOI
14 S. T. Lee. (1994). A Study on the Development of Hierarchical Fuzzy Evaluation Algorithm and Its Application. Korea Maritime & Ocean University. Master's Thesis.
15 J. W. Lee & H. S. Seo (2021). A Study on the API Gateway for human resources management modules extensions in ERP. Journal of the Korea society of computer and information, 26(2), 79-88. DOI : 10.9708/JKSCI.2021.26.02.079   DOI
16 Y. M. Park, Y. I. Choi, B. S. Lee.(2004). Technology Trend on Open API for Converged Telecommunication Services. Electronics and Telecommunications Trends, 19(6), 105-117. DOI:10.22648/ETRI.2004.J.190611   DOI
17 D. Macrinici, C. Cartofeanu & S. Gao. (2018). Smart contract applications within blockchain technology: A systematic mapping study. Telematics and Informatics, 35(8), 2337-2354.   DOI
18 C. Ebert, P. Louridas, T. M. Fernandez-Carames & P. Fraga-Lamas. (2020). Blockchain Technologies in Practice. IEEE Software, 37(4), 17-25.   DOI