AAA: Vulnerabilities And Limitations

Improved Essays
As discussed in Subsection~\ref{aaavulnerabilities} and~\ref{aaadrawbacks}, the current solution of AAA has various vulnerabilities and limitations. These vulnerabilities has caused user data hijack and breach, identity theft and financial loss. These issues are becoming more common and frequent which has sparked the security concerns over current AAA framework and end-user are becoming more concerned about their digital identity and privacy. Beside these, repeated user registration across different services respectively, to use services is inconvenient as well as increases the vulnerabilities of the user data. Thus, an alternative solution is required to address these challenges.

As discussed in Section~\ref{blockchain}, Blockchain is technology
…show more content…
Also, it is easy to use as it is very easy to generate user's identity and same identity can be used across multiple services. Moreover, since user data is only with the user not with central server, it gives the data ownership to the user than service providers and at same time decrease the chances of user data breach. The breach is only possible with user consent or carelessness, and the providers cannot share data with third party organizations as they do not have user data and no control over their data. However, this technology has its own vulnerability as described in Subsection~\ref{blockchainvulnerabilities}. Also it is not scalable compared to the current system because of the transactions time. But, despite these drawbacks, it is more secure, easy-to-use, trustworthy, reliable, fault-tolerant than current AAA …show more content…
The smart contract are written using high-level solidity which is easy to learn and write and is alike the existing language like Javascript. These contracts can be easily deployed to private, test or main network which is interpreted by the Ethereum Virtual Machine. Therefore, in one hand this platform hides most of the technical depth of the blockchain and allows the developer to concentrate on writing their application logic while on other hand it makes the application deployment painless and the large Ethereum community provides the active support for the possible issues. Hence, Ethereum Blockchain was selected for the prototype development and

Related Documents

  • Great Essays

    Bsc300 Unit 1 Assignment 2

    • 2191 Words
    • 9 Pages

    ASSIGNMENT 2 AUTHOR: ALI AKBAR MIT111558 SUBMITTED TO: MS NAVNEET KAUR Contents Mobile Apps 2 Introduction 2 Vulnerabilities 2 Android main risk: 3 Security vulnerabilities: 4 Bad data storage: 4 Malware: 4 Unauthorized access: 5 Lack of encryption: 5 Data leaks from syncing: 6 Preventive methods for vulnerability: 6 Experience trust product. 6 Work with software reputation service. 7 Layer security.…

    • 2191 Words
    • 9 Pages
    Great Essays
  • Decent Essays

    repository or central database and trusted third party Central authority(CA) are used to revoke, issue and store the keys. There is always a risk that these centralized infrastructure can be violated. Hence, Blochcain can be use to to reduce the risks of storing PKI on centralized infrastructure. Here the Data(Keys) will be distributed across the blochchain network[3] In the 2nd section we will go through the introduction of blockchain,…

    • 625 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    e) Size of the message retrieved id 107 bytes. determined as follows:- Size (message) = number of characters in the message User is asked to send message of this size. Simulation has been done in CloudSim3.0. Shares of file have been constructed in datacenter and these shares have been sent to hosts (servers) available in that datacenter.…

    • 599 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    As a result, deployments are rapid, reducing implementation inefficiencies and improving return on investment and IAM is also very effective in providing out-of-box compliance with HIPAA Security Requirements which ensures compliance by providing user-centric tracking across the enterprise end-points combined with powerful reporting capabilities and the ability to automate sign-off requirements. While so many medical electronic record are being created for good reason, IAM and user provisioning solution for integration and connecting multiple system while limiting an access to the appropriate people to access patient ’s records, health care providers can provide a better care experience. And when records are digital, providers improve operational…

    • 106 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    In its fiscal year 2016 assessment report, ICS-CERT listed the most prevalent critical infrastructure vulnerabilities and potential risk that may result from exploitation of these weaknesses. 1. Boundary protection: Weaker boundaries between industrial control systems and enterprise networks makes it difficult to detect unauthorized activity in critical systems. 2. Least functionality: It is important for organizations to minimize and close unused services, ports, protocols, applications and functions that increases vectors for malicious party to gain access to critical systems.…

    • 301 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    A thorough analysis was made on the VeriSign Certification Practice Statement (CPS) document to identify the type of security services addressed and if the document enforces and support the FISMA security controls. The CPS presentation of the capabilities demonstrated on the security services were equated to the security controls and how the security services can reduce risk impact. The CPS details the authentication and identification, access controls and the audit VeriSign’s certificate policies mainly on the endurance of digital certificates and key management enforcing the CIA. The details of the findings that meets the standard of FISMA according to the NIST are: Identification and Authentication for Rekey Requests: this security service addresses the IA-4 Identifier Management security control whereby it ensures user identifier to the intended party by distinctively verifying and identifying each user. The organization is enabled to manage these functionalities and in addition disabling users and enable decline to…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Pony Express is a technology. This is because they were working towards dealing with issues that affected the society communication to create a more efficient way of communication that time. Switching from slow train to quick horses was a technology that helped in reducing the time taken to send a letter from one month to ten days. This is an idea put to its practical use, thus making it qualify as a technology. Jeff Thompson foresaw the demise of the technology that was launched by Pony Express by saying that things were to change for the better.…

    • 195 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Public Key Infrastructure is a comprehensive subject that is constantly developing to meet high growing demands of the business word. PKI is one of the most effective way for securing networks. The encrypted information that is sent is delivered using a public key. An individual is able to provide the public key to the sender, or the key can be retrieved from the directory from where it was published. PKI works in concert of other security mechanisms to help protect vital information (Weise, 2001).…

    • 680 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    When they say selecting a digital wallet is easy, they are actually right. It all boils down to knowing what you want out of your digital wallet. There are hundreds of options for a reason, but today, let us examine some of the two heavy hitters in the game. Coinbase and Blockchain Wallet are great for a variety of reasons, but if you really want to see which one is best for your situation, keep reading. BLOCKCHAIN WALLET FEATURES VS.…

    • 356 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Technology is the accumulation of methods and techniques used in the construction of goods or the accomplishment of a goal. Solving a scientific investigation would be considered a goal that can use these types of processes. The information on methods or the knowledge embedded in a computer or a machine can both be considered technology. These devices can be operated by people that do not have previous knowledge of the information that is being searched. The initial development of technological devices dates all the way back to 1440 when Johannes Gutenberg invented the printing press.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Biometric Analysis Paper

    • 791 Words
    • 4 Pages

    Introduction This paper includes a memorandum requesting consideration of a blended biometric solution for a specific company. Included in the memorandum is an analysis of the blended attacks that have occurred against the organization and the risks associated with the attacks. This memorandum is to include recommendations for best practices for blended biometric solutions that should be implemented both foreign and domestic by the security administrators for marginalization and prevention. December 04, 2016 MEMORANDUM TO: Executive Leadership FROM: Samanthea L. Price, Information Security Manager DATE: December 10, 2016 SUBJECT:…

    • 791 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    eHealth, the future of health care system, is gaining popularity in quick succession in the context of Australia. The core of eHealth is the Electronic Health Record (eHR) system which functions to record patient health information. In the era of the current communication networks, healthcare systems should utilise the advantages of storing, fetching and distributing the information between different healthcare stakeholders efficiently. To make the system secure in respect to the access to eHRs, the Personally Controlled Electronic Health Record (PCEHR) has recently been proposed. Despite the claim of PCEHR being controlled by the patients, vulnerabilities of disclosing credentials by the healthcare professionals and system operators are still present in the system.…

    • 484 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    I selected Apple as my company for final project Information technology strategic plan (ITSP), in first milestone, I will give the brief overview about the company’s organizational structure, which is developed for Apple based on the IT values, vision and mission statement. Structure and Organization: Apple is an American based multinational company which manufactures electronic devices, software products for the consumers. IPad, IPod, IPhone, Mac books and Macintosh computers are the products manufacture by Apple. ITunes, OS X operating systems are the software’s which are included in products list of Apple.…

    • 905 Words
    • 4 Pages
    Improved Essays