Affiliation:
1. Department of Computer Science, Master of Computer Application, Christ University, India
Abstract
It is essential to maintain a ratio between privacy protection and knowledge discovery. Internet users depend daily on SSL/HTPS for secure communication on internet.
Over the years, many attacks on the certificate trust model it uses have been evolved. Mutual SSL authentication shared verification alludes to two parties validating each other through checking the digital certificate so that both sides are guaranteed of the other’s identity.
In technical terms, it alludes to a client (web program or client application) authenticate themselves to the server (server application) and that server likewise confirming itself to the client through checking the general public key certificate issued by trusted Certificate Authorities (CA). Since confirmation depends on computerized Certificate, certification authorities, for example, Verisign or Microsoft Declaration Server are a critical part of mutual authentication process.
From an abnormal state perspective, the way toward authenticating and setting up an encrypted channel using certificate-based mutual SSL authentication.
Publisher
Oriental Scientific Publishing Company
Subject
General Earth and Planetary Sciences,General Environmental Science
Reference23 articles.
1. Peter Burkholder, “SSL Man-in-the-Middle Attacks”, SANS Institute InfoSec Reading, 2003.
2. Michael Howard, “Man-in-the-Middle Attack to the HTTPS Protocol”,IEEE computer society, 2009
3. Lakshminarayanan A.1, Jianying Zhou. FlexiCert: merging X.509 identity certificates and attribute certificates. Proceedings. 14th International Workshop on Database and Expert Systems Applications, 2003.
4. F. Stumpf, “Leveraging attestation techniques for trust establishment in distributed systems,” Ph.D. dissertation,Department of Computer Science, Technische Universitat Darmstadt, 2010.
5. Wang K., Fung B. C. M.: Anonymization for Sequential Releases. ACM KDD Conference, 2006.