DOI QR코드

DOI QR Code

무결성이 보장된 블록체인 기술을 활용한 PKI 기반 보안 게이트웨이의 인증 모델

Authentication Model of PKI-based Security Gateway using Blockchain having Integrity

  • 김영수 (한세대학교 IT융합전자공학과) ;
  • 문형진 (성결대학교 정보통신공학과)
  • Kim, Young Soo (Department of IT Convergence, Hansei University) ;
  • Mun, Hyung-Jin (Department of Information & Communication Engineering, Sungkyul University)
  • 투고 : 2021.07.27
  • 심사 : 2021.10.20
  • 발행 : 2021.10.28

초록

최근 국가가 공인하는 인증기관에서 발행하는 공인인증서를 폐지하고 인터넷 기업이 자체적으로 공동인증서를 발급하면서 그 책임을 부여하는 방법으로 전자서명법이 개정되었다. 인터넷 기업이 인증기관으로서 발행하는 공동 인증서의 사용이 허용되면서 공개키 인증서 도용에 따른 사기 피해의 확대가 예상된다. 무결성과 보안성이 내재된 블록체인에 PKI를 결합한 보안 게이트웨이에서 사용할 수 있는 인증 모델을 제안하였다. 제안 모델의 실용성 평가를 위해서 전문가 집단을 활용한 델파이 기법으로 중요도를 도출하고 인간의 주관성을 배제하는 평가방법인 수게노의 계층퍼지적분을 이용한 인증 모델의 보안성을 평가했다. 블록체인 기반 공동인증서는 무분별한 공인인증서의 발행과 오남용을 방지하고 보안성과 편의성이 확보된 서비스의 기반기술로 활용이 기대된다.

Recently, public certificates issued by nationally-recognized certification bodies have been abolished, and internet companies have issued their own common certificates as certification authority. The Electronic Signature Act was amended in a way to assign responsibility to Internet companies. As the use of a joint certificate issued by Internet companies as a certification authority is allowed, it is expected that the fraud damage caused by the theft of public key certificates will increase. We propose an authentication model that can be used in a security gateway that combines PKI with a blockchain with integrity and security. and to evaluate its practicality, we evaluated the security of the authentication model using Sugeno's hierarchical fuzzy integral, an evaluation method that excludes human subjectivity and importance degree using Delphi method by expert group. The blockchain-based joint certificate is expected to be used as a base technology for services that prevent reckless issuance and misuse of public certificates, and secure security and convenience.

키워드

과제정보

This research was supported by the National Research Foundation of Korea(NRF) funded by the Ministry of Education and Ministry of Science and ICT (NRF-2019S1A5B5A07105353) in 2019.

참고문헌

  1. E.S.Jeong.(2014). A Design of the Encrypted File System with PKI Authentication : User Authentication using PKI. Soongsil University, Master's Thesis.
  2. Liu Y, Tome W, Zhang L, Choffnes D, Levin D, Maggs B, Mislove A, Schulman A & Wilson C. (2015). An end-to-end measurement of certificate revocation in the web's PKI. In Proceedings of the 2015 internet measurement conference. ACM, 183-196.
  3. J. Clark & P.C. Van Oorschot. (2013). SoK: SSL and HTTPS: revisiting past challenges and evaluating certificate trust model enhancements. In Proc. IEEE Symposium on Security and Privacy 2013, Berkeley, CA, USA, May 19-22, pp.511-525. IEEE Computer Society.
  4. J. A. Berkowsky & T. Hayajneh.(2017). Security issues with certificate authorities. Proc. IEEE 8th Annu. Ubiquitous Comput. Electron. Mobile Commun. Conf. (UEMCON). 449-455.
  5. S. Santesson, M. Myers, R. Ankney, A. Malpani, S. Galperin, & C. Adams. (2013). X.509 Internet public key infrastructure online certificate status protocol-OCSP, RFC 6960. 1-41. https://www.hjp.at/(en,st_b)/doc/rfc/rfc6960.html
  6. S.C. Park.(2017). A Comparative Analysis of PKI Authentication and FIDO Authentication. Journal of the Korea Institute of Information and Communication Engineering. 21(7), 1411-1419. https://doi.org/10.6109/JKIICE.2017.21.7.1411
  7. C. J. Chae, H. J. Cho & H.M. Jung. (2018). Authentication Method using Multiple Biometric Information in FIDO Environment. Journal of Digital Convergence, 16(1), 159-164. DOI : 10.14400/JDC.2018.16.1.159
  8. A. Balalaie, A. Heydarnoori & P. Jamshidi. (2016). Microservices architecture enables devops: Migration to a cloud-native architecture. IEEE Software, 33(3), 42-52. https://doi.org/10.1109/MS.2016.64
  9. S.H. Lee.(2007). Implementation of Call Service Application Modeling and Performance Measurement in Open API based Gateway System. KWANGWOON UNIVERSITY. Master's Thesis. http://www.riss.kr/link?id=T11101637.
  10. J. W. Lee & H. S. Seo (2021). A Study on the API Gateway for human resources management modules extensions in ERP. Journal of the Korea society of computer and information, 26(2), 79-88. DOI : 10.9708/JKSCI.2021.26.02.079
  11. Y. M. Park, Y. I. Choi, B. S. Lee.(2004). Technology Trend on Open API for Converged Telecommunication Services. Electronics and Telecommunications Trends, 19(6), 105-117. DOI:10.22648/ETRI.2004.J.190611
  12. R. Xu, W. Jin & D. Kim. (2019). Microservice security agent based on API gateway in edge computing. Sensors, 19(22), 4905. https://doi.org/10.3390/s19224905
  13. D. Macrinici, C. Cartofeanu & S. Gao. (2018). Smart contract applications within blockchain technology: A systematic mapping study. Telematics and Informatics, 35(8), 2337-2354. https://doi.org/10.1016/j.tele.2018.10.004
  14. A. Ouaddah, A. Abou Elkalam, A. Ait Ouahman. (2016). FairAccess: a new Blockchain-based access control framework for the Internet of Things. Security and communication networks, 9(18), 5943-5964. https://doi.org/10.1002/sec.1748
  15. M. Risius & K. Spohrer. (2017). A blockchain research framework, Business & Information Systems Engineering. 59(6). 385-409. https://doi.org/10.1007/s12599-017-0506-0
  16. C. Ebert, P. Louridas, T. M. Fernandez-Carames & P. Fraga-Lamas. (2020). Blockchain Technologies in Practice. IEEE Software, 37(4), 17-25. https://doi.org/10.1109/ms.2020.2986253
  17. S. T. Lee. (1994). A Study on the Development of Hierarchical Fuzzy Evaluation Algorithm and Its Application. Korea Maritime & Ocean University. Master's Thesis.
  18. S. J. Shin & I.K. Park.(2000). A New Approach to the Verification of a Message Protocol:Fuzzy Integral. Journal of Korea Information Processing Society. 7(6), pp. 1903-1910. DOI:10.3745/KIPSTE.2000.7.6.1903.