Affiliation:
1. FORTH-ICS/University of Crete, Heraklion, Crete GR, Greece
2. University of Crete, Heraklion, Heraklion Crete, Greece
3. Brave Software, London UK
4. University of Illinois at Chicago, Chicago, IL, USA
5. University of Crete, Heraklion Crete, Greece
Abstract
Trust in Secure Sockets Layer–based communications is traditionally provided by Certificate (or Certification) Authorities (CAs) in the form of signed certificates. Checking the validity of a certificate involves three steps: (i) checking its expiration date, (ii) verifying its signature, and (iii) ensuring that it is not revoked. Currently, such certificate revocation checks (i.e., step (iii) above) are done either via Certificate Revocation Lists (CRLs), or Online Certificate Status Protocol (OCSP) servers. Unfortunately, despite the existence of these revocation checks, sophisticated cyber-attackers can still trick web browsers to trust a
revoked
certificate, believing that it is still valid.
Although frequently
updated
,
nonced
, and
timestamped
certificates can reduce the frequency and impact of such cyber-attacks, they add a huge burden to the CAs and OCSP servers. Indeed, CAs and/or OCSP servers need to
timestamp
and
sign
on a regular basis all the responses, for every certificate they have issued, resulting in a very high overhead. To mitigate this and provide a solution to the described cyber-attacks, we present CCSP : a new approach to provide timely information regarding the status of certificates, which capitalizes on a newly introduced notion called
Signed Collections
. In this article, we present in detail the notion of
Signed Collections
and the complete design, implementation, and evaluation of our approach. Performance evaluation shows that CCSP (i) reduces space requirements by more than an order of magnitude, (ii) lowers the number of signatures required by six orders of magnitude compared to OCSP-based methods, and (iii) adds only a few milliseconds of overhead in the overall user latency.
Funder
Marie Sklodowska-Curie
European Commission
European Union's Horizon 2020 research and innovation programme
SHARCS
Prevention of and Fight against Crime Programme of the European Commission-Directorate-General Home Affairs
FP7 project iSocial ITN
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications
Reference48 articles.
1. APNIC Labs. 2019. Use of DNSSEC Validation for World (XA). Retrieved from https://stats.labs.apnic.net/dnssec/XA?c=XA8x=18g=18r=18w=78g=0. APNIC Labs. 2019. Use of DNSSEC Validation for World (XA). Retrieved from https://stats.labs.apnic.net/dnssec/XA?c=XA8x=18g=18r=18w=78g=0.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献