There are systems ‘guarding’ your data in cyberspace – but who is guarding the guards?


PTI, May 30, 2022, 12:48 PM IST

We use internet-connected devices to access our bank accounts, keep our transport systems moving, communicate with our colleagues, listen to music, undertake commercially sensitive tasks – and order pizza.

Digital security is integral to our lives, every day. And as our IT systems become more complex, the potential for vulnerabilities increases. More and more organizations are being breached, leading to financial loss, interrupted supply chains, and identity fraud.

PlayUnmute
Fullscreen
VDO.AI
The current best practice in secure technology architecture used by major businesses and organizations is a “zero trust” approach. In other words, no person or system is trusted and every interaction is verified through a central entity.

Unfortunately, absolute trust is then placed in the verification system being used. So breaching this system gives an attacker the keys to the kingdom. To address this issue, “decentralization” is a new paradigm that removes any single point of vulnerability.

Our work investigates and develops the algorithms required to set up an effective decentralized verification system.

We hope our efforts will help safeguard digital identities, and bolster the security of the verification processes so many of us rely on.

Never trust, always verify A zero trust system implements verification at every possible step.

Every user is verified, and every action they take is verified, too, before implementation.

Moving towards this approach is considered so important that US President Joe Biden made an executive order last year requiring all US federal government organizations to adopt a zero-trust architecture. Many commercial organizations are following suit.

However, in a zero trust environment, absolute faith is (counter intuitively) placed in the validation and verification system, which in most cases is an Identity and Access Management (IAM) system.

This creates a single trusted entity that, if breached, gives unencumbered access to the entire organization’s systems.

An attacker can use one user’s stolen credentials (such as a username and password) to impersonate that user and do anything they’re authorized to do – whether it’s opening doors, authorizing certain payments, or copying sensitive data.

However, if an attacker gains access to the entire IAM system, they can do anything the system is capable of. For instance, they may grant themselves authority over the entire payroll.

In January, identity management company Okta was hacked. Okta is a single-sign-on service that allows a company’s employees to have one password for all the company’s systems (as large companies often use multiple systems, with each requiring different login credentials).

Following Okta’s hack, the large companies using its services had their accounts compromised – giving hackers control over their systems. So long as IAM systems are a central point of authority over organizations, they will continue to be an attractive target for attackers.

Decentralizing trust In our latest work, we refined and validated algorithms that can be used to create a decentralized verification system, which would make hacking a lot more difficult.

Our industry collaborator, TIDE, has developed a prototype system using the validated algorithms.

Currently, when a user sets up an account on an IAM system, they choose a password that the system should encrypt and store for later use. But even in an encrypted form, stored passwords are attractive targets.

And although multi-factor authentication is useful for confirming a user’s identity, it can be circumvented.

If passwords could be verified without having to be stored like this, attackers would no longer have a clear target. This is where decentralization comes in. Instead of placing trust in a single central entity, decentralization places trust in the network as a whole, and this network can exist outside of the IAM system using it.

The mathematical structure of the algorithms underpinning the decentralized authority ensures that no single node that can act alone.

Moreover, each node on the network can be operated by an independently operating organization, such as a bank, telecommunication company or government department.

So stealing a single secret would require hacking several independent nodes. Even in the event of an IAM system breach, the attacker would only gain access to some user data – not the entire system.

And to award themselves authority over the entire organization, they would need to breach a combination of 14 independently operating nodes. This isn’t impossible, but it’s a lot harder.

But beautiful mathematics and verified algorithms still aren’t enough to make a usable system. There’s more work to be done before we can take decentralized authority from a concept to a functioning network that will keep our accounts safe.

(By Joanne Hall, Senior Lecturer in Mathematics and Cybersecurity, RMIT University, Geetika Verma, Lecturer in Mathematics, RMIT University and Matthew P. Skerritt, Lecturer, RMIT University. The Conversation)

Udayavani is now on Telegram. Click here to join our channel and stay updated with the latest news.

Top News

As Delhi chokes with dangerous pollution levels, doctors warn of health risks for all

Cong may crack whip against Khan for his ‘racist’ slur against Kumaraswamy, indicates Paramaeshwara

Sagara: Deer meat seized from Karnataka Rakshana Vedike leader’s house

Rahul Gandhi mocks PM Modi’s ‘Ek hai toh safe hai’ slogan

Pockets of J’khand converted into hubs of illegal activities by infiltrators: Yogi

Father and two sons drown in Ghataprabha river; search operations underway

Shinde defends rebellion, claims previous Shiv Sena leadership was anti-development

Related Articles More

As AI and megaplatforms take over, the hyperlinks that built the web may face extinction

Plastic waste could double by 2050, researchers find, suggest policies to address issue

Six scholars, including two women, win Infosys Prize 2024

6G technology and intelligent receivers will ease way for army intelligence operations: IIT official

India successfully test-fires long-range cruise missile

MUST WATCH

Swimming pool

| ₹50 LAKH SEIZED FROM TIRE |

New Technology In Kambala

Lakshdeepotsava 2024 Shree Krishna Mutt

Punganur Cow


Latest Additions

Puttur: Engineer translocates trees instead of chopping them down

Sensex drops 241 pts, Nifty falls for 7th day on selling in IT, oil shares

Mahayuti govt rushed to approve Adani Group projects ahead of Maharashtra poll announcement: Congress

As Delhi chokes with dangerous pollution levels, doctors warn of health risks for all

Cong may crack whip against Khan for his ‘racist’ slur against Kumaraswamy, indicates Paramaeshwara

Thanks for visiting Udayavani

You seem to have an Ad Blocker on.
To continue reading, please turn it off or whitelist Udayavani.