Abstract
Owning to the widely deployment of OpenID Connect protocol in the important applications, in order to provide a strong confidence in its security for the people, in this study, we firstly review OpenID Connect protocol. And then, we use the formal language: Applied PI calculus to model OpenID Connect protocol and provide a security analysis with the automatic tool ProVerif. Finally, we find it does not have the secrecy and have some authentications. We present some approaches to address the security problems in OpenID Connect protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ronak R.Patel,Bhavesh O.Enhance OpenID Protocol in identity Management.International Journal of Application or Innovation in Engineering &Management.Vol.2,No.4,Apr. 2013: 248-252
Nat S., John B., Michael J.,Breno D M.,Mortimore C.. OpenID Connect Core 1.0, 2014.http://OpenID.net/specs/OpenID-connect-core-1_0.html.
Dick Hardt. The OAuth 2.0 authorization framework. October 2012.http://tools.ietf.org/html/rfc6749.
David R.,Brad F. . OpenID Authentication 2.0 - Final, 2007. http://OpenID.net/specs/OpenID-authentication-2_0.html
Alireza P S., Joao P S. Authentication, authorization and auditing for ubiquitous computing: a survey and vision. International Journal of Space-Based and Situated Computing.Vol.1 No.1,2011:59-67
Google OpenID Connect 1.0, 2015. https://developers.google.com/accounts/docs/OpenIDConnect.
Microsoft OpenID Connect, 2014. https://msdn.microsoft.com/en-us/library/azure/dn6455
PayPal OpenID Connect 1.0, 2014. https://developer.paypal.com/docs/integration/direct/identity/log-in-with-paypal
Blanchet B. Automatic proof of strong secrecy for security protocols//Proceeding of the 2004 IEEE Symposium on Security and privacy,California,2004:86-100
Wanpeng L. and Chris J M. Analysing the Security of Google’s implementation of OpenID Connect. Information Security Group, Royal Holloway, University of LondonTW20 0EX.Aug.2015:1-27
Guangye S., Mohamed M. FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA algebra with test. International Journal of Grid and Utility Computing.Vol4,No.2-3,2013:204-211
Blanchet B. An efficient cryptographic protocol verifier based on prolog rules//Proceeding of the 14th IEEE Computer Security Foundations Workshop, Cape Breton,2011:82-96
OpenID Connect Core 1.0 incorporating errata set 1. http://OpenID.net/specs/OpenID-connect-core-1_0.html#toc
Terry B., Brian L., Thomas S., John S.,Gautam K.. An example of the use of Public Health Grid (PHGrid) technology during the 2009 H1N1 influenza pandemic. International Journal of Grid and Utility Computing.Vol.4,No.2-3,(2013):148-155
Abadi M.,Fournet C.Mobile values,new names, and secure communication//Proceeding of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages,London,2001:104-115
Alessandro B. Gerardo. Federico T. Secure and efficient design of software block cipher implementations on microcontrollers. International Journal of Grid and Utility Computing.vol.4,No.2-3,2013:110-118
N. Bharadiya B.,Soumyadev M., R.C. Hansdah. An authentication protocol for vehicular ad hoc networks with heterogeneous anonymity requirements. International Journal of Space-Based and Situated Computing.Vol.4,No.1,2014:1-14
David M.,Herve G. Security in wireless sensor networks: a survey of attacks and countermeasures. International Journal of Space-Based and Situated Computing.Vol.1,No.2-3,2011:151-162
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Lu, J., Zhang, J., Li, J., Wan, Z., Meng, B. (2017). Automatic Verification of Security of OpenID Connect Protocol with ProVerif. In: Xhafa, F., Barolli, L., Amato, F. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 1. Springer, Cham. https://doi.org/10.1007/978-3-319-49109-7_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-49109-7_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49108-0
Online ISBN: 978-3-319-49109-7
eBook Packages: EngineeringEngineering (R0)